IT Management  >   Systems Operations  >   Applications Management  >  

Software Patch Management

RSS Feed    Add to Google    Add to My Yahoo!
Software Patch Management Reports
 
Best Practices for Mobile Device Management
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

SearchSecurity.com

Presentation Transcript: Automating Virtual Machine Configuration
sponsored by ePlus Technology
PRESENTATION TRANSCRIPT: Learn the different methods for automating virtual machine configuration in this expert webcast transcript. Edward L. Haletky also reviews the different automation tools available for automating virtual machine installation and patch management.
Posted: 15 May 2009 | Published: 06 May 2009

ePlus Technology

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges
sponsored by Lumension
VIDEO: In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS.
Posted: 25 Feb 2014 | Premiered: 25 Feb 2014

Lumension

E-Guide: Tips for creating a VDI backup plan
sponsored by Dell and VMware
EGUIDE: This e-guide from SearchVirtualDesktop.com explains how to develop a VDI backup plan to protect your virtual desktops against disaster. Learn why it is essential to focus on both the virtual desktops and the infrastructure when developing a backup strategy.
Posted: 06 Apr 2011 | Published: 06 Apr 2011

Dell and VMware

Change is the Enemy of Security and Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: Read this white paper to learn 10 ways that enterprise environments typically change and what you can do to identify, analyze and manage these changes and their associated risks on an ongoing basis.
Posted: 16 Mar 2009 | Published: 02 Mar 2009

nCircle

Performance, Value and Protection for VMware View
sponsored by FalconStor Software
WHITE PAPER: Desktop virtualization is bringing a new approach to enterprise-wide desktop deployments aimed at providing a better end user and administrator experience than physical desktop deployments, by lowering acquisition and management cost, and offering a highly scalable, easy to deploy and fully protected desktop environment.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

FalconStor Software

La Jolla Institute for Allergy & Immunology: Customer Video
sponsored by Absolute Software
VIDEO: In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.
Posted: 12 Nov 2013 | Premiered: 12 Nov 2013

Absolute Software

3 Strategies to Protect Endpoints from Risky Applications
sponsored by Lumension
WHITE PAPER: Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Lumension

SAP System Build and Landscape Management Activities
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this white paper to learn how to simplify the often cumbersome, critical change management activities needed to simplify SAP solution deployments, increase operational performance, and decrease total cost of ownership (TCO) with a single, cohesive system that includes compute, network, and storage access components.
Posted: 22 Nov 2011 | Published: 30 Jun 2010

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement