IT Management  >   Systems Operations  >   Applications Management  >  

Security Patches

RSS Feed    Add to Google    Add to My Yahoo!
Security Patches Reports
 
Threat prevention techniques: How to build a strong network
sponsored by SearchSecurity.com
EGUIDE: Consult this expert E-Guide to learn how you can develop best practices for threat management and how you can build a strong network. Find out tips from the experts on how you can build a foundation for complete threat protect ion by consulting this guide now.
Posted: 25 Oct 2012 | Published: 18 Oct 2012

SearchSecurity.com

Panduit 28 AWG Patch Cords Installation Guideline
sponsored by Panduit
RESOURCE: Discover now three sets of patch cords that will improve airflow and reduce operational costs in your cable rooms, all while capitalizing on the best use of space in the data center environment. Enable your infrastructure to be scalable and easily manageable, while supporting Ethernet communications at ever-increasing data rates.
Posted: 25 May 2016 | Published: 25 May 2016

Panduit

Case Study: Liverpool Women's NHS Foundation Trust
sponsored by Kaseya International Limited
CASE STUDY: Access this exclusive resource to learn how one organisation within the health care industry updated their whole IT infrastructure by automating their IT support and service to improve system uptime and staff productivity. Dscover how this automation platform that can help your company manage your entire infrastructure while reducing costs.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

Kaseya International Limited

Why "Free" Patch Management Tools Could Cost You More
sponsored by Lumension
WHITE PAPER: While "free" tools appear to be an enticing solution for patch management, looking deeper into the needs of the organization leads to selection of a more complete patch management solution which results in reduced long-term risk and optimized operating expense.
Posted: 12 Aug 2009 | Published: 01 Nov 2008

Lumension

Understanding Advanced Virtualization Security Practices
sponsored by Intel
EBOOK: SearchCloudSecurity.com presents a comprehensive guide to virtualization security. Our experts help you assess and prioritize the risks and threats to virtual environments. You’ll learn what steps you must take to handle secure multitenancy, hypervisor threats and hypervisor protection, and data management service security.
Posted: 19 Aug 2011 | Published: 18 Aug 2011

Intel

Presentation Transcript: Automating Virtual Machine Configuration
sponsored by ePlus Technology
PRESENTATION TRANSCRIPT: Learn the different methods for automating virtual machine configuration in this expert webcast transcript. Edward L. Haletky also reviews the different automation tools available for automating virtual machine installation and patch management.
Posted: 15 May 2009 | Published: 06 May 2009

ePlus Technology

Integrating Vulnerability Assessment and Remediation
sponsored by Lumension
WHITE PAPER: An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies.
Posted: 10 Jul 2008 | Published: 01 Oct 2007

Lumension

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Tivoli Endpoint Manager: Continuous Compliance in a Distributed World
sponsored by Mainline Information Systems
PRESENTATION TRANSCRIPT: This presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues.
Posted: 17 Jun 2011 | Published: 16 Jun 2011

Mainline Information Systems

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement