ComputerWeekly.com Research Library

Powered by Bitpipe.com

Patch Management Research

  • Threat prevention techniques: How to build a strong network

    Sponsored by: SearchSecurity.com

    Consult this expert E-Guide to learn how you can develop best practices for threat management and how you can build a strong network. Find out tips from the experts on how you can build a foundation for complete threat protect ion by consulting this guide now.

  • Virtual Data Center E-Zine: Volume 39: Managing Virtualization Patches

    Sponsored by: SearchDataCenter.com

    Keeping all of your patches up-to-date is a tedious but necessary task in order to ensure a fully protected data center. This dedicated e-zine highlights tips and strategies for making patch management easier and less time-consuming.

  • Best Practices for Mobile Device Management

    Sponsored by: SearchSecurity.com

    This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.

  • E-Guide: Remediating IT vulnerabilities: Expert Tips

    Sponsored by: SearchSecurity.com

    This expert E-Guide uncovers 3 quick ways you can remediate IT vulnerabilities and discusses best practices for improved vulnerability management.

  • Remediating IT vulnerabilities: Quick hits for risk prioritization

    Sponsored by: SearchSecurity.com

    There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.

  • Patch management: Fixing vulnerabilities before they are exploited

    Sponsored by: GFI LanGuard

    Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.

  • EMA Analyst Report on the Mobile Device Management Marketspace

    Sponsored by: IBM

    Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges.

  • Rewriting the Rules of Patch Management

    Sponsored by: IBM

    By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.

  • Five tips to reduce risk from modern web threats

    Sponsored by: Sophos

    To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.

  • E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals

    Sponsored by: Lumension

    Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.

  • Why Free Patch Management Tools Could Cost You More

    Sponsored by: Lumension

    This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.

  • 10 VDI Benefits You Can Achieve Without VDI

    Sponsored by: Dell, Inc. and Intel®

    Discover how you can achieve VDI levels of manageability with traditional PCs in this resource.

  • SAP System Build and Landscape Management Activities

    Sponsored by: Cisco Systems, Inc.

    Read this white paper to learn how to simplify the often cumbersome, critical change management activities needed to simplify SAP solution deployments, increase operational performance, and decrease total cost of ownership (TCO) with a single, cohesive system that includes compute, network, and storage access components.

  • Understanding Advanced Virtualization Security Practices

    Sponsored by: Intel

    SearchCloudSecurity.com presents a comprehensive guide to virtualization security. Our experts help you assess and prioritize the risks and threats to virtual environments. You’ll learn what steps you must take to handle secure multitenancy, hypervisor threats and hypervisor protection, and data management service security.

  • Dell KACE K Series Overview

    Sponsored by: Dell KACE

    This series overview points out the challenges of IT systems management and showcases technologies designed to overcome them. Learn how to simplify hardware and software inventory, patching, and more across your organization.

  • Best Practices in Lifecycle Management: Comparing Suites from Dell KACE, Symantec, LANDesk, and Microsoft

    Sponsored by: Dell KACE

    This white paper points out the challenges of selecting a lifecycle management tool and presents a comparison of various technologies on the market. Explore 45 key features across seven areas, including discovery, inventory, asset management, and more.

  • Rewriting the Rules of Patch Management

    Sponsored by: IBM

    In the following white paper, you'll find the information you need to spearhead your patch automation initiatives. Read now and discover a fresh approach to patch management that deploys patches organization-wide in hours.

  • Maintaining Continuous Compliance – a new best practice approach

    Sponsored by: IBM

    When trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager.

  • Tivoli Endpoint Manager: Continuous Compliance in a Distributed World

    Sponsored by: Mainline Information Systems

    This presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues.

  • BDNA for Security: Strengthened Security Through Visibility

    Sponsored by: BDNA

    Lack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.

  • 2010 Endpoint Risk Assessment: Internal Vulnerabilities

    Sponsored by: Promisec

    This study will show you the most common security issues that were found and how they were dealt with by the various organizations.

  • Presentation Transcript: Patch Management for the IT Infrastructure

    Sponsored by: GFI Software

    Keeping up with patches is a tedious and time consuming task for security pros, and often prompts them to look for a more efficient and effective solution. This presentation transcript discusses a patch management approach that offers effective monitoring and increased productivity.

  • Presentation Transcript: Best Practices for Scheduled Security Update Cycle

    Sponsored by: GFI Software

    In this presentation transcript, Nick Lewis discusses the best ways to efficiently handle vendor security updates, how to prioritize patch deployment on mission-critical and non-mission critical systems, and why testing patches before deployment is such a crucial step.

  • Five tips to reduce risk from modern web threats

    Sponsored by: Sophos

    User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.

  • E-Guide: Tips for creating a VDI backup plan

    Sponsored by: Dell and VMware

    This e-guide from SearchVirtualDesktop.com explains how to develop a VDI backup plan to protect your virtual desktops against disaster. Learn why it is essential to focus on both the virtual desktops and the infrastructure when developing a backup strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.