ComputerWeekly.com Research Library

Powered by Bitpipe.com

Windows Security Research

  • Looking for a WSUS Alternative

    Sponsored by: Automox

    When Windows Service Update Services (WSUS) was released in 2003, it was revolutionary in automating patch management, which was largely a manual task until then. However, after nearly two decades, it’s time to consider a successor for WSUS – read this article to explore a few potential alternatives.

  • Pros and Cons of Patching With WSUS

    Sponsored by: Automox

    Windows Server Update Services (WSUS) is a widely used patch management tool designed to address challenges related to manual patching. However, there are scalability and usability issues when it comes to using WSUS. This article highlights the pros & cons of using WSUS, read on to see what they are.

  • Manage Windows Updates Without WSUS

    Sponsored by: Automox

    Regular patch management is often recognized as a cybersecurity best practice. However, for today’s Windows users, overly complex patching solutions make regular patching unmanageable. In this article, explore the limitations of WSUS, patch management best practices, and discover why you should consider automated patch management.

  • Key Considerations when Making the Move to Office 365

    Sponsored by: Smarsh

    In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.

  • ZS Solves Office 365 Security Issue with PortSys TAC

    Sponsored by: PortSys

    ZS, a consulting and professional services firm, faced a challenge when making the transition to Microsoft Office 365. In order to solve their problem, ZS decided to implement PortSys' Zero Trust Access Management product, Total Access Control (TAC). In this case study, explore the benefits that ZS saw after implementing TAC.

  • 10 Questions to Ask About Your Office 365 Deployment

    Sponsored by: Mimecast

    Providing robust email security is a critical best practice for any organization in an era of increasingly sophisticated email-borne attacks. While Office 365 provides some native protections, there are limitations to consider. In this research report, explore key issues to consider when evaluating the email security capabilities of Office 365.

  • Is Microsoft O365 Good Enough Protection & Recovery Webinar?

    Sponsored by: Mimecast

    Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.

  • Proofpoint Helps Largest Nordic Building Association OBOS Construct Superior Email Security

    Sponsored by: Proofpoint

    From its beginnings, OBOS has become the largest Nordic cooperative building association. However, as OBOS began to grow they needed to expand their email security protection. In this case study, learn why OBOS decided to deploy Proofpoint's Enterprise Protection and Targeted Attack Protection.

  • Conversational Office 365 Risk Mitigation

    Sponsored by: Mimecast

    Although Microsoft has more control over Office 365 because it's hosted in their cloud, there are still gaps. There are risks. And these reside primarily in the areas of security, data assurance, continuity and backup/recovery. In this e-book, learn more about these risks and discover ways to mitigate them.

  • Updates: The next evolution of operating systems

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.

  • Make the Most of Windows 10: How User Training Can Help

    Sponsored by: Citrix

    Download this e-guide to find out how proper training can help make the most of your Windows 10 deployment.

  • Five Windows 10 security risks that are easy to overlook

    Sponsored by: vmware airwatch

    As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.

  • Why a Windows Security Scan Isn't Enough to Protect your Workstations

    Sponsored by: HP & Intel

    There are a lot of moving parts, and there's no simple fix for Windows security. That said, there are things you can do to reduce desktop vulnerabilities. This e-guide helps you understand the common flaws exploited in Windows security scans and provides 4 ways to take vulnerability management to the next level.

  • Windows 10: Top 10 Features IT Pros Will Love

    Sponsored by: Microsoft

    This expert e-guide describes the 10 most crucial Windows 10 features that IT pros need to know about, including mobile device management, work folders that regulate access to corporate content, the return of the Start Menu, and 7 more.

  • Windows 8 Security: Know All You Need to Know

    Sponsored by: IBM

    This expert e-book describes how to best take advantage of the security features in Windows 8 and 8.1.

  • Windows Shopping: Will 8.1 Meet Your Security Needs?

    Sponsored by: SearchSecurity.com

    Microsoft Windows 8.1 attempts to respond to a demand for new security features for network endpoints and user devices. This technical guide offers a concise review of its security features and whether MS Windows 8.1 fills its promises.

  • DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry

    Sponsored by: FireEye

    This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.

  • Audits, Compliance and Security: IT Pros Share Their Experience

    Sponsored by: Dell Software

    In this white paper, IT pros share how a smarter approach to auditing enabled them to strengthen their security posture and simplify their change monitoring process.

  • How to Limit the Risk of Attack on your XP Assets

    Sponsored by: AT&T Cybersecurity

    This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.

  • Windows XP Migration: Protect and Secure Critical Data

    Sponsored by: Commvault

    This informative whitepaper explores strategies for protecting and securing your data when migrating from Windows XP to your new operating system.

  • Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)

    Sponsored by: Webroot

    This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.

  • Secunia Vulnerability Review 2014

    Sponsored by: Secunia

    This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.

  • Secunia PSI Country Report - Q4 2013 Germany

    Sponsored by: Secunia

    This informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.

  • The Windows XP Era's Coming to an End: What You Can Do to Prepare

    Sponsored by: Citrix

    This brief resource reviews the security threats and cost issues you will face following the end of support date.

  • SharePoint Security Should Not Be an Afterthought

    Sponsored by: Thawte Inc.

    This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.