patch

Results 151 - 175 of 224Sort Results By: Published Date | Title | Company Name

Windows Server 2003 End-of-Support: How to Securely Extend Service Life

Published By: Lumension     Published Date: Jun 05, 2015
Microsoft withdraws support for Windows Server 2003 on July 14, 2015. Here’s how you need to respond to protect your organization’s information assets. Just after enterprises have finished migrating their desktops from Microsoft Windows XP, they now have to turn around and move away from Windows Server 2003. The venerable (and now vulnerable) operating system reaches end of support on July 14, 2015. But many companies will continue to use the software after that deadline, and that has serious security implications.
Tags : 
security, patch, data, regulatory compliance, application security, compliance, intrusion prevention, database development
    
Lumension

SCCM Practical Patch Compliance

Published By: Lumension     Published Date: Jun 05, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : 
it security, data center, patch, software, application, analytical applications, database development, database security
    
Lumension

Understanding the Role of Stolen Credentials in Data Breaches

Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks

Patch Management: Picking the Low-Hanging Fruit

Published By: Lumension     Published Date: May 03, 2011
Why fixing third-party application vulnerabilities is at the core of sound government information security-and how to make sure patch management is optimizing your security posture.
Tags : 
patch management, security, lumension, government security, cyber attack, vulnerability management, application security, hacker detection
    
Lumension

Unruly USB Devices Expose Networks to Malware

Published By: Lumension     Published Date: Feb 04, 2011
With cyberattacks inflicting increasingly greater damage following uncontrolled connection, it's time that government organizations got serious about outside threats.
Tags : 
usb security, network security, patch management, lumension, device management, security, intrusion prevention, mobile workers
    
Lumension

Endpoint Security: Winning the Endgame

Published By: Lumension     Published Date: Apr 15, 2011
Learn how to effectively secure endpoints with a defense-in-depth approach that includes patch management, anti-virus, application whitelisting and device control.
Tags : 
malware, endpoint security, anti-virus, data protection, cyberthreat, anti spam, anti virus, application security
    
Lumension

Prioritizing Vulnerability Remediation In the Age of Threat Disclosure Overload

Published By: Qualys     Published Date: Jan 11, 2017
One of the biggest challenges faced by information security teams today is how to e?ectively prioritize their vulnerability remediation work.Burdened with this overload of vulnerability disclosures, infosec teams often get overwhelmed by the task at hand and throw up their hands in frustration. After all, no IT department has enough sta? and resources to promptly patch every single vulnerability within their environment.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys

Vulnerability Management Buyer's Checklist - Key Questions to Ask Before You Select a VM Solution

Published By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : 
qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking
    
Qualys

Automotive Supplier Finds Long-term Value in Cloud ERP

Published By: Plex Systems     Published Date: Feb 21, 2014
No more upgrades and patches. Plex Cloud ERP replaced more than a dozen separate systems for preventive maintenance, production, gages, problem controls & reporting. And Plex is completely integrated.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity
    
Plex Systems

Managing Vulnerabilities & Updates for Third Party Software

Published By: Secunia     Published Date: Sep 30, 2015
In 2014, the world saw an increased number of security breaches in high profile companies. We will take a look back at some of these cases, and why it’s not only the high profile companies that were breached. Plus we will show you steps you can take to prevent yourself from being hacked in 2015. We will focus on “getting back to the basics” going into detail on why complete patch management means a safer year for any organization.
Tags : 
managing vulnerability, security breaches, security threats, hack prevention, third party software, security
    
Secunia

Rackspace Private Cloud Powered By OpenStack

Published By: Rackspace     Published Date: Jan 19, 2016
Industry analysts expect rapid growth in the private cloud market over the next five years as CIO’s use private clouds to transform their IT environment. This growth expectation is not surprising as private clouds provide businesses with many features of a public cloud along with the security, control, and performance of a dedicated environment. While private clouds provide many advantages, they are also exceedingly complex and are difficult to manage. They must be implemented and managed by experts who understand cloud architecture and know how to upgrade, patch, monitor, and scale a cloud environment.
Tags : 
rackspace, private cloud, openstack, information technology, software development, data center
    
Rackspace

How IT and Audit Can Work Together to Strengthen Cybersecurity

Published By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or “WannaCry,” became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus’ execution method was simple: it exploited a vulnerable Windows SMB protocol to spread – an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
    
AuditBoard

Stepping up the Battle Against Advanced Threats WP

Published By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : 
ibm, malware detection, cybercrime prevention, it security solutions, security, knowledge management, enterprise applications, employee performance
    
IBM

Reducing the cost and complexity of endpoint management

Published By: IBM     Published Date: Jul 15, 2015
This whitepaper talks about more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations.
Tags : 
endpoint management, path compliance, lifecycle management, patch management, vulnerability management, endpoint security, compliance, disaster recovery
    
IBM

Stop Rowing Alone: Integrated Cybersecurity Ecosystems Will Get You Further

Published By: IBM     Published Date: Jun 06, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM

The Total Economic Impact of IBM BigFix Patch And BigFix Compliance

Published By: IBM     Published Date: Sep 06, 2018
How BigFix can automate endpoint management to decrease security risk surfaces, manage configurational drift, and maintain compliance.
Tags : 
    
IBM

Combatting Advanced Threats With Endpoint Security Intelligence

Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM

InfoWorld and Oracle White paper: A Database Appliance That is Simple, Optimized and Affordable

Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"DBAs need help with tackling significant issues, including doing more with fewer resources, quickly responding to upgrade and patch needs, while reducing the time spent on cloning databases. Finally, they need help eliminating the time they spend integrating, testing, and deploying full-stack cloud solutions. How can DBAs reconcile these competing demands? Learn more about expanded offerings in a database appliance that are delivering numerous advantages. These new configurations have the potential to help IT derive new benefits in its efforts to serve the business. "
Tags : 
    
Oracle PaaS/IaaS/Hardware

An Introduction to OS Server Virtualization and a Different Approach to Server Virtualization

Published By: SWsoft     Published Date: Aug 21, 2009
Today's IT organizations are dealing with the consequences of exploring IT Infrastructure growth and complexity. With its growing complexity and volume, the cost of managing the infrastructure from simple patch management to skill sets requirements for IT administrators is increasing.
Tags : 
active directory, bandwidth management, convergence, swsoft, server virtualization, patch management, network management, infrastructure
    
SWsoft

From Social Media to Social CRM: Reinventing the Customer Relationship

Published By: IBM     Published Date: Feb 14, 2014
"Welcome to the age of Social CRM, a different way of thinking about customer relationship management that focuses on using social media to enhance customer engagement. How prepared are companies to make this shift? Despite widespread adoption of social media, for most, Social CRM is still in its early stages, execution is patchy and concerns about ROI remain. To fully exploit the power of social media to connect with customers, organizations need to move beyond isolated projects to integrated programs and, ultimately, a Social CRM strategy."
Tags : 
ibm, marketing, social media, crm, social crm, customer service, customer interaction, customer relationship
    
IBM

5 Tips for Choosing a Next-Generation Endpoint Security Solution

Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco

Virtual Patching: A Proven Cost Savings Strategy

Published By: Trend Micro     Published Date: Oct 12, 2012
This special report, commissioned by Trend Micro, reinforces the security and operational cost savings of host-based virtual patching with the Deep Security and OfficeScan products
Tags : 
infomation security, software costs, trend micro, security, application security, internet security, security management, return on investment
    
Trend Micro

By the Numbers: Lowering Energy Costs at the Desktop

Published By: ScriptLogic     Published Date: Jan 11, 2012
This paper outlines the potential cost and energy savings available when effective power management is exercised across the client computers.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
    
ScriptLogic

Managing Permissions across Servers

Published By: ScriptLogic     Published Date: Jan 11, 2012
In this white paper learn how to manage permissions across hundreds of servers. Learn more and read on.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
    
ScriptLogic

Leveraging Service Software to Increase Revenue: McKinley Equipment

Published By: ServiceMax     Published Date: May 01, 2014
Watch this short video for more insights on how McKinley drastically improved customer service with solutions from ServiceMax.
Tags : 
service management software, field service management software, field service software, service software, field service management, work order management, dispatch software, service scheduling software
    
ServiceMax
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.