ComputerWeekly.com Research Library

Powered by Bitpipe.com

Patch Management Research

  • Rebooting Your Servers is Making You Insecure and Noncompliant

    Sponsored by: CloudLinux

    Traditional kernel patching reboots is not just a headache, but leaves your server exposed to security risks. This white paper goes in-depth into the dangers of this approach and outlines how rebootless patching methods can eliminate this difficulty while maintaining server security.

  • Affinity Water: A Case Study

    Sponsored by: CloudLinux

    With such a big operation, Affinity Water rely on a vast and complex computing system. They have to store and process huge amounts of data (personal data too) relating to the logistics of water supply. In this case study, learn how KernelCare freed Affinity Water from having to face the dilemma of sacrificing either security or uptime.

  • Webinar: Live Patching Linux Kernel Vulnerabilities in Scalable Hosting Environments

    Sponsored by: CloudLinux

    In order to ensure Linux server security, organization need to regularly update and reboot the system. However, organizations sometimes delay these disruptive reboots, leading to security vulnerabilities. Watch this webinar to uncover a use case that highlights the benefits live patching to eliminate downtime.

  • RMM & Patch Management: The First Line of Defense Against Cyber Threats

    Sponsored by: Datto, Inc.

    Read the following paper to examine why remote monitoring and management (RMM) and patch management offer a strong defense against cyber threats like ransomware, as well as the benefits of building out these services as an MSP.

  • SIM Technical Guide

    Sponsored by: SearchSecurity.com

    In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.

  • Virtualization Security: Protecting Virtualized Environments

    Sponsored by: ComputerWeekly.com

    This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.

  • Web Application Firewalls: Patching, SDLC Key for Security, Compliance

    Sponsored by: SearchSecurity.com

    In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you canĀ achieve a strategic, defense-in-depth approach to enterprise security by reading on now.

  • Threat prevention techniques: How to build a strong network

    Sponsored by: SearchSecurity.com

    Consult this expert E-Guide to learn how you can develop best practices for threat management and how you can build a strong network. Find out tips from the experts on how you can build a foundation for complete threat protect ion by consulting this guide now.

  • Virtual Data Center E-Zine: Volume 39: Managing Virtualization Patches

    Sponsored by: SearchDataCenter.com

    Keeping all of your patches up-to-date is a tedious but necessary task in order to ensure a fully protected data center. This dedicated e-zine highlights tips and strategies for making patch management easier and less time-consuming.

  • How to Manage Oracle E-Business Suite Apps and Databases

    Sponsored by: Data Intensity

    In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.

  • Cloud Security Designed for Amazon Web Services (AWS)

    Sponsored by: Trend Micro

    This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.

  • VCE Lifecycle Assurance: Doing the Hard Work So You Don't Have To

    Sponsored by: EMC Converged Platforms.

    In this paper, learn how the value a customer derives over the entire lifecycle of his or her systems enables IT to offload the massive expense and risk associated with endless release management and regression testing to VCE, allowing IT to remain focused on strategic initiatives.

  • WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges

    Sponsored by: Lumension

    In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS.

  • Mapping Security For Your Virtual Environment

    Sponsored by: Hewlett Packard Enterprise

    In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.

  • La Jolla Institute for Allergy & Immunology: Customer Video

    Sponsored by: Absolute

    In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.

  • Data Sheet: What's New in Red Hat Satellite 5.6?

    Sponsored by: Red Hat

    Discover the new Red Hat Satellite 5.6 capabilities and features that provide administrators with the means to efficiently manage their systems, lowering per-system deployment and management costs.

  • How to take Advantage of Security Ops that go Beyond the OS

    Sponsored by: Intel and McAfee

    In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.

  • Reducing Your Patch Cycle to Less Than 5 Days

    Sponsored by: Tenable

    This informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.

  • Implementing an Effective Vulnerability Management Program

    Sponsored by: Tenable

    Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.

  • Determining the Most Effective Endpont Management

    Sponsored by: IBM

    This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.

  • SymEd Solutions from Symantec: Endpoint Management and Mobility

    Sponsored by: Insight Public Sector and Symantec

    Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.

  • Patch management: Fixing vulnerabilities before they are exploited

    Sponsored by: GFI LanGuard

    Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.

  • EMA Analyst Report on the Mobile Device Management Marketspace

    Sponsored by: IBM

    Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges.

  • Rewriting the Rules of Patch Management

    Sponsored by: IBM

    By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.

  • Five tips to reduce risk from modern web threats

    Sponsored by: Sophos

    To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.