IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Windows Flaws

RSS Feed    Add to Google    Add to My Yahoo!
Windows FlawsReports
 
Managing Non-Microsoft Updates
sponsored by Secunia
WHITE PAPER: This guide focuses on the importance of security patches and how you can easily update your configuration from one centralized location.
Posted: 18 Mar 2014 | Published: 31 Dec 2012

Secunia

Protecting the Windows Environment: A Blueprint for Small and Mid-sized Organizations
sponsored by Symantec Corporation
WHITE PAPER: Many companies rely on a Microsoft® Windows® environment. But many fail to recognize the vulnerabilities in Windows based systems. Explore the challenges and learn about a strategy for mitigating risk without adding cost and complexity.
Posted: 25 Oct 2006 | Published: 01 Oct 2006

Symantec Corporation

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.

Minimize the Impact of Patch Tuesday
sponsored by Shavlik Technologies
WEBCAST: Register for this webcast held monthly on the Wednesday after Patch Tuesday starting at 12:00 PM, ET. Get information on the latest Microsoft Patches and how they could affect you and your network environment.
Posted: 29 Nov 2007 | Premiered: Dec 12, 2007, 12:00 EST (17:00 GMT)

Shavlik Technologies

E-Book: Technical Guide on Combatting Emerging Web Threats
sponsored by SearchSecurity.com
EBOOK: Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
Posted: 09 Jun 2010 | Published: 09 Jun 2010

SearchSecurity.com

Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements
sponsored by Dell and Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business.
Posted: 19 Nov 2010 | Published: 19 Nov 2010

Dell and Microsoft

How to collect Windows Event logs to detect a targeted attack
sponsored by M86 Security
EGUIDE: Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

M86 Security

A Guide to Utilizing Virtualization in a Disaster Recovery Strategy
sponsored by Dell and Microsoft
EGUIDE: In this expert E-Guide, brought to you by SearchServerVirtualization.com and Dell, you will discover the steps essential for effectively integrating server virtualization into your disaster recovery strategy.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

Dell and Microsoft

Evaluating Business Continuity Solutions: Ten Factors to Consider Before Buying
sponsored by Asempra Technologies, Inc.
WHITE PAPER: In order to evaluate a business continuity solution, you should have properly defined metrics. This paper describes ten parameters that should be assessed when evaluating and measuring business continuity solutions before you make your purchase.
Posted: 25 Apr 2007 | Published: 01 Apr 2007

Asempra Technologies, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement