IT Management  >   Systems Operations  >   Applications Management  >  

Software Patches

RSS Feed    Add to Google    Add to My Yahoo!
Software Patches Reports
 
Web Application Firewalls: Patching, SDLC Key for Security, Compliance
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

SearchSecurity.com

Niksun NetX Data Sheet
sponsored by NIKSUN
HARDWARE LISTING: NIKSUN NetX provides centralized, enterprise-wide reports and analysis on application, service and network security/performance.
Posted: 30 Jan 2008 | Published: 01 Jan 2005

NIKSUN

Best Practices in Lifecycle Management: Comparing Suites from Dell KACE, Symantec, LANDesk, and Microsoft
sponsored by Dell KACE
WHITE PAPER: This white paper points out the challenges of selecting a lifecycle management tool and presents a comparison of various technologies on the market. Explore 45 key features across seven areas, including discovery, inventory, asset management, and more.
Posted: 08 Aug 2011 | Published: 01 Jan 2011

Dell KACE

Integrated System Management and Support
sponsored by Oracle Corporation
WHITE PAPER: In the typical IT environment, organizations operate in a divided world of systems management and support. IT departments often treat these two fundamental areas as distinct silos causing gaps for IT employees, who spend too much time and manual effort resolving system problems. This creates both higher risks and higher costs for IT.
Posted: 30 Mar 2011 | Published: 22 Mar 2011

Oracle Corporation

SharePoint E-Zine Volume 19: Time to Beef Up Code Retention Policies
sponsored by SearchWinIT
EZINE: When a separate team is tasked with patching your SharePoint servers, play it safe by adding code retention policies to your governance plan. In this month's issue, learn how to use governance policies effectively so you can respond quickly when a buggy patch puts SharePoint at risk.
Posted: 18 May 2010 | Published: 18 May 2010

SearchWinIT

Three simple steps to better patch security
sponsored by Sophos, Inc.
WHITE PAPER: Security experts estimate that 90% of successful attacks against software vulnerabilities could be prevented with an existing patch or configuration setting. Still, many computers in organizations remain unpatched and unprotected. In this whitepaper, uncover three best practices for improving your security and compliance with patch assessment.
Posted: 01 Jan 2012 | Published: 16 Dec 2011

Sophos, Inc.

EMA Analyst Report on the Mobile Device Management Marketspace
sponsored by IBM
WHITE PAPER: Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

IBM

Data Sheet: What's New in Red Hat Satellite 5.6?
sponsored by Red Hat
WHITE PAPER: Discover the new Red Hat Satellite 5.6 capabilities and features that provide administrators with the means to efficiently manage their systems, lowering per-system deployment and management costs.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

Red Hat

Unix, Linux Uptime and Reliability Increase; Patch Management Woes Plague Windows
sponsored by IBM
WHITE PAPER: Use this report, the Yankee Group's Global Server Operating System Reliability Survey, to make an informed choice on which servers best fit your needs.
Posted: 17 Jun 2008 | Published: 01 Jan 2008

IBM

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security
sponsored by Trend Micro, Inc.
WHITE PAPER: An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

Trend Micro, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement