IT Management  >   Systems Operations  >   Applications Management  >  

Software Patch Management

RSS Feed    Add to Google    Add to My Yahoo!
Software Patch Management Reports
Best Practices for Endpoint Security Software and Devices
sponsored by BitDefender
EGUIDE: Access this expert guide for detailed advice on purchasing the right endpoint security solution, implementing endpoint security best practices, and more.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


Creating a Successful Patch Management Strategy
sponsored by Solarwinds N-able
EGUIDE: In this expert e-Guide, learn how to ensure that your patch management strategy remains secure following the transition from physical to virtual desktops; why delaying security patches puts organizations at risk; and how to build a case for a formal patch management program.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Solarwinds N-able

WP #103: How Monitoring Systems Reduce Human Error in Distributed Server Rooms and Remote Wiring Closets
sponsored by Schneider Electric
WHITE PAPER: Access this white paper to learn how a basic monitoring and automation system can help reduce downtime incidents in your server room and remote wiring closet. Also inside, real-life horror stories from your peers and how they could have been prevented.
Posted: 02 May 2012 | Published: 02 May 2012

Schneider Electric

Presentation Transcript: Overcoming the Challenges with Configuration and Patch Mgmt
sponsored by BigFix
PRESENTATION TRANSCRIPT: In this presentation transcript, you’ll gain insight on how to improve your asset discovery processes, determine the patch level of the machines in your environment, and improve testing and deployment processes to keep pace with Patch Tuesday and quarterly Oracle and Adobe releases.
Posted: 02 Nov 2010 | Published: 01 Nov 2010


Deep Defender Blogs
sponsored by Intel
SOFTWARE DOWNLOAD: Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system.
Posted: 03 Oct 2012 | Premiered: 03 Oct 2012


Reinventing the Desktop
sponsored by Pano Logic, Inc
WHITE PAPER: Pano is a solution built specifically for desktop virtualization and it consists of a palm-sized device that connects a user's keyboard, mouse, monitor, and USB.
Posted: 28 Feb 2008 | Published: 01 Jan 2007

Pano Logic, Inc

3 Strategies to Protect Endpoints from Risky Applications
sponsored by Lumension
WHITE PAPER: Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more.
Posted: 10 Sep 2010 | Published: 10 Sep 2010


Booz Allen Hamilton: Securing the Mobile Enterprise & Ensuring Compliance
sponsored by Lumension
CASE STUDY: Booz Allen Hamilton has incorporated Lumension Security's PatchLink Update into their automated patch management system. With PatchLink Update, the IT team no longer has to inspect each laptop, making it much more efficient and cost effective.
Posted: 07 Feb 2008 | Published: 01 Jan 2007


BDNA for Security: Strengthened Security Through Visibility
sponsored by BDNA
WHITE PAPER: Lack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.
Posted: 07 Jun 2011 | Published: 07 Jun 2011


Implementing an Effective Vulnerability Management Program
sponsored by Tenable Network Security
WHITE PAPER: Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Tenable Network Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement