IT Management  >   Systems Operations  >   Applications Management  >  

Security Patch Management

RSS Feed   
Security Patch Management Reports
 
Cloud One Network Security Datasheet
sponsored by Trend Micro
DATA SHEET: In this data sheet, get a glimpse at some of the key features & capabilities of Trend Micro Cloud One, designed to provide network layer security for your hybrid cloud capabilities. Read on to learn more about the offering and discover if it’s a good fit for your organization’s needs.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

Trend Micro

On-Prem SCCM Patch Management Solution - What is The True Cost Burden?
sponsored by Automox
RESOURCE: Organizations looking into purchasing new software or solutions typically focus on the list price of the license and fail to consider the hidden maintenance costs associated. This article dissects Microsoft’s on-prem SCCM patch management solution to reveal its total cost of ownership by uncovering hidden costs.
Posted: 29 Apr 2020 | Published: 17 Apr 2020


SIM Technical Guide
sponsored by SearchSecurity.com
EZINE: In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

SearchSecurity.com

Looking for a WSUS Alternative
sponsored by Automox
RESOURCE: When Windows Service Update Services (WSUS) was released in 2003, it was revolutionary in automating patch management, which was largely a manual task until then. However, after nearly two decades, it’s time to consider a successor for WSUS – read this article to explore a few potential alternatives.
Posted: 15 Apr 2020 | Published: 02 Apr 2020


Best Practices for Mobile Device Management
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

SearchSecurity.com

Finally, a WSUS Replacement
sponsored by Automox
RESOURCE: As we move into a cloud-integrated world, and an increasingly remote workforce, a traditional WSUS deployment won’t be enough to meet today’s patch management challenges. Organizations need a cloud-based automated patch management tool to replace WSUS. In this article, you’ll find a potential successor.
Posted: 16 Apr 2020 | Published: 23 May 2019


Determining the Most Effective Endpont Management
sponsored by IBM
WHITE PAPER: This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
Posted: 09 Sep 2013 | Published: 31 May 2013

IBM

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security
sponsored by Trend Micro, Inc.
WHITE PAPER: An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

Trend Micro, Inc.

Unix, Linux Uptime and Reliability Increase; Patch Management Woes Plague Windows
sponsored by IBM
WHITE PAPER: Use this report, the Yankee Group's Global Server Operating System Reliability Survey, to make an informed choice on which servers best fit your needs.
Posted: 17 Jun 2008 | Published: 01 Jan 2008

IBM

E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals
sponsored by Lumension
WHITE PAPER: Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
Posted: 23 Jan 2012 | Published: 23 Jan 2012

Lumension
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info