IT Management  >   Systems Operations  >   Applications Management  >  

Software Patch Management

RSS Feed    Add to Google    Add to My Yahoo!
Software Patch ManagementReports
 
Five Tips to Improve a Threat and Vulnerability Management Program
sponsored by Alert Logic
EGUIDE: This expert e-guide explains how to improve your enterprise's threat and vulnerability management program in 5 simple steps.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

Patch Management Best Practices
sponsored by LabTech Software
WHITE PAPER: A top priority for IT service providers is to keep clients' critical systems free from known vulnerabilities. This is where patch management comes into play. Access this white paper today to find best practices for various kinds of patches so you can keep critical systems safer.
Posted: 31 Jan 2014 | Published: 31 Dec 2012

LabTech Software

Virtualization Security: Protecting Virtualized Environments
sponsored by ComputerWeekly.com
BOOK: This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

ComputerWeekly.com

Performance, Value and Protection for VMware View
sponsored by FalconStor Software
WHITE PAPER: Desktop virtualization is bringing a new approach to enterprise-wide desktop deployments aimed at providing a better end user and administrator experience than physical desktop deployments, by lowering acquisition and management cost, and offering a highly scalable, easy to deploy and fully protected desktop environment.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

FalconStor Software

IT Security Management McAfee ePolicy Orchestrator Deep Command
sponsored by Intel
WHITE PAPER: This white paper outlines a security and management solution that allows you to remotely diagnose and update your enterprise even when endpoints are disabled or powered off. Discover how advances in malware and cyberthreats are driving the need for this capability and see if this solution is right for you by reading on now.
Posted: 02 Jan 2013 | Published: 31 Dec 2011

Intel

Three simple steps to better patch security
sponsored by Sophos, Inc.
WHITE PAPER: Security experts estimate that 90% of successful attacks against software vulnerabilities could be prevented with an existing patch or configuration setting. Still, many computers in organizations remain unpatched and unprotected. In this whitepaper, uncover three best practices for improving your security and compliance with patch assessment.
Posted: 01 Jan 2012 | Published: 16 Dec 2011

Sophos, Inc.

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

nCircle

Patch management: Fixing vulnerabilities before they are exploited
sponsored by GFI LanGuard
WHITE PAPER: Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard

Presentation Transcript: Automating Virtual Machine Configuration
sponsored by ePlus Technology
PRESENTATION TRANSCRIPT: Learn the different methods for automating virtual machine configuration in this expert webcast transcript. Edward L. Haletky also reviews the different automation tools available for automating virtual machine installation and patch management.
Posted: 15 May 2009 | Published: 06 May 2009

ePlus Technology

BDNA for Security: Strengthened Security Through Visibility
sponsored by BDNA
WHITE PAPER: Lack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

BDNA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement