IT Management  >   Systems Operations  >   Applications Management  >  

Software Patches

RSS Feed    Add to Google    Add to My Yahoo!
Software Patches Reports
 
Step by Step: Best practices for security patch management
sponsored by SearchSecurity.com
EGUIDE: Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
Posted: 03 Mar 2011 | Published: 03 Mar 2011

SearchSecurity.com

Remediating IT vulnerabilities: Quick hits for risk prioritization
sponsored by SearchSecurity.com
EGUIDE: There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.
Posted: 01 Sep 2011 | Published: 25 Aug 2011

SearchSecurity.com

Maintaining Continuous Compliance – a new best practice approach
sponsored by IBM
WHITE PAPER: When trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

IBM

Understanding Advanced Virtualization Security Practices
sponsored by Intel
EBOOK: SearchCloudSecurity.com presents a comprehensive guide to virtualization security. Our experts help you assess and prioritize the risks and threats to virtual environments. You’ll learn what steps you must take to handle secure multitenancy, hypervisor threats and hypervisor protection, and data management service security.
Posted: 19 Aug 2011 | Published: 18 Aug 2011

Intel

Realizing the Economic Benefits of Oracle Enterprise Manager Ops Center
sponsored by Oracle Corporation
WHITE PAPER: This paper examines areas of potential optimization, shows how day-to-day IT management processes can contribute to – rather than detracts from – that optimization, and provides an ROI analysis with an example scenario based on actual deployments.
Posted: 31 Mar 2011 | Published: 22 Mar 2011

Oracle Corporation

E-Guide: Tips for creating a VDI backup plan
sponsored by Dell and VMware
EGUIDE: This e-guide from SearchVirtualDesktop.com explains how to develop a VDI backup plan to protect your virtual desktops against disaster. Learn why it is essential to focus on both the virtual desktops and the infrastructure when developing a backup strategy.
Posted: 06 Apr 2011 | Published: 06 Apr 2011

Dell and VMware

Security Vs. Flexibility: Must IT Management Choose?
sponsored by Faronics
WHITE PAPER: This white paper focuses on how IT Managers can leverage Centralized Configuration Management (CCM) tools along with other techniques and tools to have it all: security, a uniform standard, and flexibility when needed.
Posted: 22 Aug 2008 | Published: 22 Aug 2008

Faronics

Lumension Endpoint Management and Security Suite
sponsored by Lumension
TRIAL SOFTWARE: A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.
Posted: 13 Sep 2010 | Premiered: 13 Sep 2010

Lumension

Four Steps to Cure Your Patch Management Headache
sponsored by Lumension
WHITE PAPER: The need to speed up patch deployment across today’s highly complex and distributed IT environment has never been more important. Read this free white paper and learn four steps to cure your patch management headache.
Posted: 06 Jan 2011 | Published: 06 Jan 2011

Lumension

Implementing an Effective Vulnerability Management Program
sponsored by Tenable Network Security
WHITE PAPER: Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Tenable Network Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement