IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Windows Flaws

RSS Feed    Add to Google    Add to My Yahoo!
Windows Flaws Reports
 
Still Migrating from Windows Server 2003? A Guide to Best Practices and Tips
sponsored by Acronis
WHITE PAPER: In this white paper, learn the six biggest reasons to start planning to move away from Windows Server 2003. Additionally, learn about migration challenges, as well as best practices for executing a smooth migration, including: backup your original environment, convert backup to a standby virtual machine, and 3 more.
Posted: 18 Jan 2016 | Published: 31 Dec 2014

Acronis

CW Buyer's Guide: Windows 8
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page buyer's guide looks at the implications of Windows 8 for corporate IT.
Posted: 23 Oct 2012 | Published: 23 Oct 2012

ComputerWeekly.com

Planning for the Security Features of Windows 7 Professional
sponsored by Dell, Inc. and Microsoft Windows 7
ANALYST REPORT: With Windows 7 Professional, Microsoft has added and extended many security capabilities in its flagship Windows operating system (OS). Deciding which features to activate as well as testing will impact the planning for every Windows 7 rollout. This analyst report will analyze the major security capabilities of Windows 7 in order of importance.
Posted: 14 Dec 2009 | Published: 21 Oct 2009

Dell, Inc. and Microsoft Windows 7

Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements
sponsored by Dell EMC and Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business.
Posted: 19 Nov 2010 | Published: 19 Nov 2010

Dell EMC and Microsoft

Justifying an Active Directory Disaster Recovery Plan
sponsored by Dell Software
WHITE PAPER: Active Directory (AD) downtime can be disastrous to organizations. Learn the risks, costs and unexpected consequences associated with AD interruptions, the importance of an AD recovery plan and the pitfalls of relying solely on native recovery methods.
Posted: 12 Oct 2006 | Published: 09 Apr 2007

Dell Software

A Guide to Utilizing Virtualization in a Disaster Recovery Strategy
sponsored by Dell EMC and Microsoft
EGUIDE: In this expert E-Guide, brought to you by SearchServerVirtualization.com and Dell, you will discover the steps essential for effectively integrating server virtualization into your disaster recovery strategy.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

Dell EMC and Microsoft

Active Directory Provisioning: Overcoming Top Challenges
sponsored by Dell Software
WHITE PAPER: In this new Quest white paper, learn about the challenges of managing Active Directory using native tools – and how provisioning in your diverse environment is equally difficult. Then, discover a third-party solution that not only delivers a comprehensive provisioning solution, but one that makes it quick, easy and painless.
Posted: 01 Jul 2010 | Published: 01 Jul 2010

Dell Software

Seven for 7: Best Practices For Implementing Windows 7
sponsored by Sophos, Inc.
WHITE PAPER: In February 2011, Microsoft released its first major update to Windows 7, Service Pack 1. And now that this operating system holds more than 20% of marketshare, there’s no question that more enterprises will plan major migrations to Windows 7 in 2011. As businesses retire older versions of Windows, it’s the perfect opportunity to assess your...
Posted: 18 Mar 2011 | Published: 18 Mar 2011

Sophos, Inc.

Antimalware E-Guide
sponsored by Sunbelt Software
EGUIDE: This E-Guide from SearchEnterpriseDesktop.com and Sunbelt Software defines the malware problem, discusses the enhancements and gaps in Windows Vista and offers some suggestions of how to remove malware from windows systems.
Posted: 25 Nov 2008 | Published: 01 Jun 2007

Sunbelt Software

Information Security Magazine: May 2010 - Data: Do you know where it’s going?
sponsored by Information Security Magazine
EZINE: This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.
Posted: 03 May 2010 | Published: 03 May 2010

Information Security Magazine
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement