IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Windows Flaws

RSS Feed   
Windows Flaws Reports
 
A Guide to Utilizing Virtualization in a Disaster Recovery Strategy
sponsored by Dell EMC and Microsoft
EGUIDE: In this expert E-Guide, brought to you by SearchServerVirtualization.com and Dell, you will discover the steps essential for effectively integrating server virtualization into your disaster recovery strategy.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

Dell EMC and Microsoft

Operating System Migration - The 5 Essential Steps
sponsored by RES Software
WHITE PAPER: Throughout this white paper you will learn in five easy steps how the traditional challenges of migrating from one operating system to another can become a thing of the past by using a user workspace management solution.
Posted: 19 Feb 2010 | Published: 19 Feb 2010

RES Software

SharePoint E-Zine Volume 11: Managing Documents By Content Type
sponsored by SearchWinIT
EZINE: SharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your...
Posted: 19 Jun 2009 | Published: 19 Jun 2009

SearchWinIT

Protecting the Windows Environment: A Blueprint for Small and Mid-sized Organizations
sponsored by Symantec Corporation
WHITE PAPER: Many companies rely on a Microsoft® Windows® environment. But many fail to recognize the vulnerabilities in Windows based systems. Explore the challenges and learn about a strategy for mitigating risk without adding cost and complexity.
Posted: 25 Oct 2006 | Published: 01 Oct 2006

Symantec Corporation

Well-Planned Desktop Auditing: Avoid Issues and Tackle Windows Configuration
sponsored by Dell Software
EGUIDE: This expert e-guide highlights the importance of well-planned desktop auditing and several key considerations to keep in mind to maximize the effectiveness of your next desktop audit. Access now and you'll also learn what's causing some IT professionals to resort to lying to get their audits passed.
Posted: 06 Oct 2016 | Published: 05 Oct 2016

Dell Software

Discover True Advanced Threat Detection
sponsored by Microsoft
RESOURCE: In this infographic, explore a service that enables you to detect, investigate and respond to complex targeted attacks on your networks.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

Microsoft

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.

7 Reasons Why IT Leaders Want to Improve Data Protection and BitLocker Management
sponsored by WinMagic
WHITE PAPER: Discover 7 reasons why IT leaders are looking at increasingly intelligent ways to protect their data and improve BitLocker management with a centralized approach to encryption.
Posted: 09 May 2018 | Published: 09 May 2018

WinMagic

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault

Top four considerations for securing Microsoft SharePoint
sponsored by Sophos
WEBCAST: This webcast discusses the key risks and best practices to securing Microsoft SharePoint and protecting your organization's digital assets.
Posted: 08 Mar 2011 | Premiered: Mar 8, 2011

Sophos
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement