ComputerWeekly.com Research Library

Powered by Bitpipe.com

Patch Management Research

  • BVOXY

    Sponsored by: ControlNow

    Access this case study to learn how she used a single web-based tool that would help provide secure computers and a healthy network environment.

  • Comply Before You Connect: Security for Federal Agencies

    Sponsored by: IBM

    This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.

  • Creating a Successful Patch Management Strategy

    Sponsored by: N-able Technologies

    In this expert e-Guide, learn how to ensure that your patch management strategy remains secure following the transition from physical to virtual desktops; why delaying security patches puts organizations at risk; and how to build a case for a formal patch management program.

  • Reducing security risks from open source software

    Sponsored by: Hewlett-Packard Company

    This white paper highlights how your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.

  • VCE Lifecycle Assurance: Doing the Hard Work So You Don't Have To

    Sponsored by: VCE

    In this paper, learn how the value a customer derives over the entire lifecycle of his or her systems enables IT to offload the massive expense and risk associated with endless patch management and regression testing to VCE, allowing IT to remain focused on strategic initiatives.

  • 9 Simple (but Critical) Tips for Effective Patch Management

    Sponsored by: Dell, Inc. and Intel®

    This resource offers 9 patch management best practices. Click now to reveal a comprehensive solution that will help you achieve effective patch management without suffering high costs.

  • Patching Best Practices for IT Service Providers

    Sponsored by: LabTech Software

    A top priority for IT service providers is to keep clients' critical systems free from known vulnerabilities. This is where patch management comes into play. Access this white paper today to find best practices for various kinds of patches so you can keep critical systems safer.

  • Enable Quicker Software Deployment with Centralized Endpoint Management

    Sponsored by: IBM

    This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.

  • SIM Technical Guide

    Sponsored by: SearchSecurity.com

    In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.

  • Virtualization Security: Protecting Virtualized Environments

    Sponsored by: ComputerWeekly.com

    This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.

  • Web Application Firewalls: Patching, SDLC Key for Security, Compliance

    Sponsored by: SearchSecurity.com

    In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.

  • Threat prevention techniques: How to build a strong network

    Sponsored by: SearchSecurity.com

    Consult this expert E-Guide to learn how you can develop best practices for threat management and how you can build a strong network. Find out tips from the experts on how you can build a foundation for complete threat protect ion by consulting this guide now.

  • Cloud Security Designed for Amazon Web Services (AWS)

    Sponsored by: Trend Micro

    This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.

  • WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges

    Sponsored by: Lumension

    In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS.

  • Mapping Security For Your Virtual Environment

    Sponsored by: Hewlett-Packard Company

    In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.

  • La Jolla Institute for Allergy & Immunology: Customer Video

    Sponsored by: Absolute Software

    In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.

  • Data Sheet: What's New in Red Hat Satellite 5.6?

    Sponsored by: Red Hat

    Discover the new Red Hat Satellite 5.6 capabilities and features that provide administrators with the means to efficiently manage their systems, lowering per-system deployment and management costs.

  • How to take Advantage of Security Ops that go Beyond the OS

    Sponsored by: Intel and McAfee

    In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.

  • Reducing Your Patch Cycle to Less Than 5 Days

    Sponsored by: Tenable Network Security

    This informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.

  • Implementing an Effective Vulnerability Management Program

    Sponsored by: Tenable Network Security

    Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.

  • Endpoint Security Suites Take Center Stage in the Enterprise

    Sponsored by: Symantec Corporation

    This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other.

  • SymEd Solutions from Symantec: Endpoint Management and Mobility

    Sponsored by: Insight Public Sector and Symantec

    Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.

  • IT Security Management McAfee ePolicy Orchestrator Deep Command

    Sponsored by: Intel

    This white paper outlines a security and management solution that allows you to remotely diagnose and update your enterprise even when endpoints are disabled or powered off. Discover how advances in malware and cyberthreats are driving the need for this capability and see if this solution is right for you by reading on now.

  • Deep Defender Blogs

    Sponsored by: Intel

    Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system.

  • SecuritySCAPE Virtual Conference 2012: IT Security Made Simple

    Sponsored by: Lumension

    Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.