ComputerWeekly.com Research Library

Powered by Bitpipe.com

Patch Management Research

  • E-Guide: Remediating IT vulnerabilities: Expert Tips

    Sponsored by: SearchSecurity.com

    This expert E-Guide uncovers 3 quick ways you can remediate IT vulnerabilities and discusses best practices for improved vulnerability management.

  • Remediating IT vulnerabilities: Quick hits for risk prioritization

    Sponsored by: SearchSecurity.com

    There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.

  • Step by Step: Best practices for security patch management

    Sponsored by: SearchSecurity.com

    Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.

  • SAP System Build and Landscape Management Activities

    Sponsored by: Cisco Systems, Inc.

    Read this white paper to learn how to simplify the often cumbersome, critical change management activities needed to simplify SAP solution deployments, increase operational performance, and decrease total cost of ownership (TCO) with a single, cohesive system that includes compute, network, and storage access components.

  • Understanding Advanced Virtualization Security Practices

    Sponsored by: Intel

    SearchCloudSecurity.com presents a comprehensive guide to virtualization security. Our experts help you assess and prioritize the risks and threats to virtual environments. You’ll learn what steps you must take to handle secure multitenancy, hypervisor threats and hypervisor protection, and data management service security.

  • Dell KACE K Series Overview

    Sponsored by: Dell KACE

    This series overview points out the challenges of IT systems management and showcases technologies designed to overcome them. Learn how to simplify hardware and software inventory, patching, and more across your organization.

  • Best Practices in Lifecycle Management: Comparing Suites from Dell KACE, Symantec, LANDesk, and Microsoft

    Sponsored by: Dell KACE

    This white paper points out the challenges of selecting a lifecycle management tool and presents a comparison of various technologies on the market. Explore 45 key features across seven areas, including discovery, inventory, asset management, and more.

  • Maintaining Continuous Compliance – a new best practice approach

    Sponsored by: IBM

    When trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager.

  • Rewriting the Rules of Patch Management

    Sponsored by: IBM

    In the following white paper, you'll find the information you need to spearhead your patch automation initiatives. Read now and discover a fresh approach to patch management that deploys patches organization-wide in hours.

  • Tivoli Endpoint Manager: Continuous Compliance in a Distributed World

    Sponsored by: Mainline Information Systems

    This presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues.

  • BDNA for Security: Strengthened Security Through Visibility

    Sponsored by: BDNA

    Lack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.

  • 2010 Endpoint Risk Assessment: Internal Vulnerabilities

    Sponsored by: Promisec

    This study will show you the most common security issues that were found and how they were dealt with by the various organizations.

  • Presentation Transcript: Patch Management for the IT Infrastructure

    Sponsored by: GFI Software

    Keeping up with patches is a tedious and time consuming task for security pros, and often prompts them to look for a more efficient and effective solution. This presentation transcript discusses a patch management approach that offers effective monitoring and increased productivity.

  • Presentation Transcript: Best Practices for Scheduled Security Update Cycle

    Sponsored by: GFI Software

    In this presentation transcript, Nick Lewis discusses the best ways to efficiently handle vendor security updates, how to prioritize patch deployment on mission-critical and non-mission critical systems, and why testing patches before deployment is such a crucial step.

  • Five tips to reduce risk from modern web threats

    Sponsored by: Sophos

    User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.

  • E-Guide: Tips for creating a VDI backup plan

    Sponsored by: Dell and VMware

    This e-guide from SearchVirtualDesktop.com explains how to develop a VDI backup plan to protect your virtual desktops against disaster. Learn why it is essential to focus on both the virtual desktops and the infrastructure when developing a backup strategy.

  • Realizing the Economic Benefits of Oracle Enterprise Manager Ops Center

    Sponsored by: Oracle Corporation

    This paper examines areas of potential optimization, shows how day-to-day IT management processes can contribute to – rather than detracts from – that optimization, and provides an ROI analysis with an example scenario based on actual deployments.

  • Integrated System Management and Support

    Sponsored by: Oracle Corporation

    In the typical IT environment, organizations operate in a divided world of systems management and support. IT departments often treat these two fundamental areas as distinct silos causing gaps for IT employees, who spend too much time and manual effort resolving system problems. This creates both higher risks and higher costs for IT.

  • Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security

    Sponsored by: Trend Micro, Inc.

    An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.

  • TechFocus: Windows 7 Migration - Why a Windows 7 Upgrade Is Worth It

    Sponsored by: Dell EMC and Microsoft

    Microsoft Windows 7 addresses user frustrations, but satisfied users are just one benefit of migrating to the new operating system. This expert guide will discuss key features that can make a Windows 7 migration worth the investment.

  • Presentation Transcript: Overcoming the Challenges with Configuration and Patch Mgmt

    Sponsored by: BigFix

    In this presentation transcript, you’ll gain insight on how to improve your asset discovery processes, determine the patch level of the machines in your environment, and improve testing and deployment processes to keep pace with Patch Tuesday and quarterly Oracle and Adobe releases.

  • Performance, Value and Protection for VMware View

    Sponsored by: FalconStor Software

    Desktop virtualization is bringing a new approach to enterprise-wide desktop deployments aimed at providing a better end user and administrator experience than physical desktop deployments, by lowering acquisition and management cost, and offering a highly scalable, easy to deploy and fully protected desktop environment.

  • Lumension Endpoint Management and Security Suite

    Sponsored by: Lumension

    A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.

  • E-Book: Why a Windows 7 Upgrade is Worth It

    Sponsored by: Kaseya

    Microsoft Windows 7 addresses user frustrations, but satisfied users are just one benefit of migrating to the new operating system. These features can make it worth the investment. Read this new E-Book to learn more.

  • E-Book: Technical Guide on Vulnerability Management

    Sponsored by: SearchSecurity.com

    SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.