IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Windows Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Windows Vulnerabilities Reports
CW Buyer's Guide: Windows 8
sponsored by
ESSENTIAL GUIDE: This 11 page buyer's guide looks at the implications of Windows 8 for corporate IT.
Posted: 23 Oct 2012 | Published: 23 Oct 2012

Windows XP Migration: Protect and Secure Critical Data
sponsored by Commvault
WHITE PAPER: This informative whitepaper explores strategies for protecting and securing your data when migrating from Windows XP to your new operating system.
Posted: 30 Apr 2014 | Published: 30 Apr 2014


How to Develop Mobile Applications Using Windows 10
sponsored by Pluralsight
WEBCAST: To learn what else Windows 10 can do for mobile app developers, access this webinar, which outlines the development capabilities built into the Windows 10 upgrade. View now to access guiding principles to help you get started developing Windows apps today.
Posted: 03 Sep 2015 | Premiered: Sep 3, 2015


Evaluating Business Continuity Solutions: Ten Factors to Consider Before Buying
sponsored by Asempra Technologies, Inc.
WHITE PAPER: In order to evaluate a business continuity solution, you should have properly defined metrics. This paper describes ten parameters that should be assessed when evaluating and measuring business continuity solutions before you make your purchase.
Posted: 25 Apr 2007 | Published: 01 Apr 2007

Asempra Technologies, Inc.

Top four considerations for securing Microsoft SharePoint
sponsored by Sophos, Inc.
WEBCAST: This webcast discusses the key risks and best practices to securing Microsoft SharePoint and protecting your organization's digital assets.
Posted: 08 Mar 2011 | Premiered: Mar 8, 2011

Sophos, Inc.

Sharks in the AppPool: Managing Your Web Presence While Protecting the Hosting Resources You Pay For
sponsored by Verio
WHITE PAPER: This white paper details hosting best practices, discussing the advantages associated with the use of isolated, rather than shared, AppPools in a Windows-based hosting environment.
Posted: 27 Aug 2007 | Published: 01 Sep 2006


Active Directory Provisioning: Overcoming Top Challenges
sponsored by Dell Software
WHITE PAPER: In this new Quest white paper, learn about the challenges of managing Active Directory using native tools – and how provisioning in your diverse environment is equally difficult. Then, discover a third-party solution that not only delivers a comprehensive provisioning solution, but one that makes it quick, easy and painless.
Posted: 01 Jul 2010 | Published: 01 Jul 2010

Dell Software

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.

Mail Security for Microsoft Exchange Server
sponsored by Symantec Corporation
PODCAST: This Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.
Posted: 19 Feb 2007 | Premiered: Feb 1, 2007

Symantec Corporation

Best Practices for Windows Vista Planning, Migration, and Ongoing Management
sponsored by Symantec Corporation
WHITE PAPER: It is vital to ensure PC system and data security during migration to Windows Vista. This white paper highlights considerations that must be addressed over the entire migration process.
Posted: 02 Jul 2007 | Published: 01 Jun 2007

Symantec Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement