IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Windows Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Windows VulnerabilitiesReports
 
Top 10 Steps to Ensure a Successful Transition to Windows Server 2012
sponsored by Dell and Microsoft
WHITE PAPER: In this expert white paper, discover 10 steps to ensure a successful migration to Windows Server 2012.
Posted: 17 Oct 2014 | Published: 16 Oct 2014

Dell and Microsoft

The New Windows Security- Achieving PC Lockdown without User Backlash
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Organizations need to give users the tools and flexibility they need to do their jobs while avoiding the security, compliance and other risks that local administrative rights introduce. By implementing the best practices outlined in this paper, enterprises can maximize user productivity while maintaining centralized control over security policies.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

Dell, Inc. and Intel®

BareTail
sponsored by Bare Metal Software
TRIAL SOFTWARE: Free real-time log file monitoring tool for Windows.
Posted: 05 Dec 2006 | Premiered: 19 Jun 2007


Active Directory Provisioning: Overcoming Top Challenges
sponsored by Dell Software
WHITE PAPER: In this new Quest white paper, learn about the challenges of managing Active Directory using native tools – and how provisioning in your diverse environment is equally difficult. Then, discover a third-party solution that not only delivers a comprehensive provisioning solution, but one that makes it quick, easy and painless.
Posted: 01 Jul 2010 | Published: 01 Jul 2010

Dell Software

Windows 7 Migrations Provide the Ideal Time to Lock Down Endpoints
sponsored by Viewfinity
WHITE PAPER: Rather than deploying yet another desktop operating system without addressing endpoint security problems, the smarter choice may be to deal with the issue once and for all during your Windows 7 system migrations. In this resource, explore 6 frequently asked questions to help you on your way.
Posted: 30 Dec 2011 | Published: 30 Dec 2011

Viewfinity

What is FakeAV?
sponsored by Sophos UK
WHITE PAPER: Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

Sophos UK

Minimize the Impact of Patch Tuesday
sponsored by Shavlik Technologies
WEBCAST: Attend this monthly webcast to learn about Microsoft Patches and which are the most relevant to protecting your network environment.
Posted: 27 Aug 2007 | Premiered: Oct 10, 2007, 12:00 EDT (16:00 GMT)

Shavlik Technologies

Justifying an Active Directory Disaster Recovery Plan
sponsored by Dell Software
WHITE PAPER: Active Directory (AD) downtime can be disastrous to organizations. Learn the risks, costs and unexpected consequences associated with AD interruptions, the importance of an AD recovery plan and the pitfalls of relying solely on native recovery methods.
Posted: 12 Oct 2006 | Published: 09 Apr 2007

Dell Software

GFI LANguard Security Event Log Monitor - Downloads
sponsored by GFI Software
TRIAL SOFTWARE: GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system.
Posted: 02 May 2006 | Premiered: 01 May 2006

GFI Software

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement