ComputerWeekly.com Research Library

Powered by Bitpipe.com

Patch Management Research

  • State of Software Security: Volume 10

    Sponsored by: Veracode, Inc.

    For the last decade, Veracode has been conducting studies and releasing annual reports regarding the current trends and challenges within software security. In this year’s edition, examine key statistics surrounding trending themes like compliance, security debt, scanning for flaws, and more. Read on to unlock the full report.

  • On-Prem SCCM Patch Management Solution - What is The True Cost Burden?

    Sponsored by: Automox

    Organizations looking into purchasing new software or solutions typically focus on the list price of the license and fail to consider the hidden maintenance costs associated. This article dissects Microsoft’s on-prem SCCM patch management solution to reveal its total cost of ownership by uncovering hidden costs.

  • Finally, a WSUS Replacement

    Sponsored by: Automox

    As we move into a cloud-integrated world, and an increasingly remote workforce, a traditional WSUS deployment won’t be enough to meet today’s patch management challenges. Organizations need a cloud-based automated patch management tool to replace WSUS. In this article, you’ll find a potential successor.

  • Looking for a WSUS Alternative

    Sponsored by: Automox

    When Windows Service Update Services (WSUS) was released in 2003, it was revolutionary in automating patch management, which was largely a manual task until then. However, after nearly two decades, it’s time to consider a successor for WSUS – read this article to explore a few potential alternatives.

  • Cloud One Network Security Datasheet

    Sponsored by: Trend Micro

    In this data sheet, get a glimpse at some of the key features & capabilities of Trend Micro Cloud One, designed to provide network layer security for your hybrid cloud capabilities. Read on to learn more about the offering and discover if it’s a good fit for your organization’s needs.

  • Pros and Cons of Patching With WSUS

    Sponsored by: Automox

    Windows Server Update Services (WSUS) is a widely used patch management tool designed to address challenges related to manual patching. However, there are scalability and usability issues when it comes to using WSUS. This article highlights the pros & cons of using WSUS, read on to see what they are.

  • Manage Windows Updates Without WSUS

    Sponsored by: Automox

    Regular patch management is often recognized as a cybersecurity best practice. However, for today’s Windows users, overly complex patching solutions make regular patching unmanageable. In this article, explore the limitations of WSUS, patch management best practices, and discover why you should consider automated patch management.

  • 2020 Cyber Hygiene Report

    Sponsored by: Automox

    Cyber hygiene, as defined by the Center for Internet Security, is a set of practices designed for proactively protecting organizations from threats. This report contains the findings from recent study into the overall cyber hygiene benefits and challenges across several organizations. Read on to see how you stack up to your peers.

  • Webinar: The TCO of Automated, Cloud-Native Patch Management

    Sponsored by: Automox

    Most enterprises currently employ an on-premises patch management solution for addressing key risk areas. However, like most modern business tools, going cloud-native can decrease overhead while improving agility and scale. Watch this webinar to learn how to improve your patch management by going cloud-native.

  • What is the Difference Between SCCM and WSUS?

    Sponsored by: Automox

    What is the difference between SCCM and WSUS? Both are patch management solutions offered by Microsoft, but there are some significant differences between the two. Tap into this blog to learn more.

  • SIM Technical Guide

    Sponsored by: SearchSecurity.com

    In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.

  • Virtualization Security: Protecting Virtualized Environments

    Sponsored by: ComputerWeekly.com

    This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.

  • Web Application Firewalls: Patching, SDLC Key for Security, Compliance

    Sponsored by: SearchSecurity.com

    In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.

  • How to Manage Oracle E-Business Suite Apps and Databases

    Sponsored by: Data Intensity

    In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.

  • Cloud Security Designed for Amazon Web Services (AWS)

    Sponsored by: Trend Micro

    This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.

  • VCE Lifecycle Assurance: Doing the Hard Work So You Don't Have To

    Sponsored by: EMC Converged Platforms.

    In this paper, learn how the value a customer derives over the entire lifecycle of his or her systems enables IT to offload the massive expense and risk associated with endless release management and regression testing to VCE, allowing IT to remain focused on strategic initiatives.

  • WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges

    Sponsored by: Lumension

    In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS.

  • Mapping Security For Your Virtual Environment

    Sponsored by: Hewlett Packard Enterprise

    In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.

  • La Jolla Institute for Allergy & Immunology: Customer Video

    Sponsored by: Absolute

    In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.

  • Data Sheet: What's New in Red Hat Satellite 5.6?

    Sponsored by: Red Hat

    Discover the new Red Hat Satellite 5.6 capabilities and features that provide administrators with the means to efficiently manage their systems, lowering per-system deployment and management costs.

  • How to take Advantage of Security Ops that go Beyond the OS

    Sponsored by: Intel and McAfee

    In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.

  • Reducing Your Patch Cycle to Less Than 5 Days

    Sponsored by: Tenable

    This informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.

  • Implementing an Effective Vulnerability Management Program

    Sponsored by: Tenable

    Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.

  • Determining the Most Effective Endpont Management

    Sponsored by: IBM

    This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.

  • SymEd Solutions from Symantec: Endpoint Management and Mobility

    Sponsored by: Insight Public Sector and Symantec

    Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.