patch

Results 176 - 200 of 224Sort Results By: Published Date | Title | Company Name

A Definitive Guide to Field Service

Published By: ServiceMax     Published Date: Apr 14, 2014
A step-by-step look at how leading service organizations are automating systems with end-to-end visibility and integration.
Tags : 
service management software, field service management software, field service software, service software, field service management, work order management, dispatch software, service scheduling software
    
ServiceMax

7 Steps to Increase Service Revenue by 22%

Published By: ServiceMax     Published Date: Apr 14, 2014
Discover how to magnify your field service tactical plan so you keep insanely happy customers and higher revenues well within sight.
Tags : 
service management software, field service management software, field service software, service software, field service management, work order management, dispatch software, service scheduling software
    
ServiceMax

Vulnerability Management: What you Need to Know to Prioritize Risk

Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

Modernize Windows 10 Management and Security with Unified Endpoint Management

Published By: VMware     Published Date: Feb 24, 2017
IT organizations are largely siloed between the desktop and mobile management worlds. IT has addressed management of mobile devices with modern enterprise mobility management (EMM) solutions. However, Windows desktops have been managed separately using older PC lifecycle management (PCLM) technologies, which have fallen short of basic IT and end user expectations of today’s evolved, mobile-cloud workforce. The VMware AirWatch® Unified Endpoint Management (UEM) solution is a single, platform-independent approach for managing every device and every operating system across any organizational use case. The solution combines traditional client management requirements with modern EMM efficiencies enabling IT to deliver OS policies, patches, and apps over-the-air. Cloud-first management with instant push technologies and self-service capabilities ensure lower cost management, better security, and peak user experience regardless of the device being used to access the corporate environment.
Tags : 
    
VMware

Proactive Patch Management

Published By: Absolute Software     Published Date: Jan 27, 2010
Deploying patches in a timely fashion soon after they become available helps secure the OS and prevent the majority of data breaches. However, many computer systems are often not patched for months or not at all.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration
    
Absolute Software

Set It and Forget It - Apple Devices in the Enterprise

Published By: Absolute Software     Published Date: Dec 20, 2012
Learn how Under Armour performs patch management, provides Mac and iOS device support and creates reports for business critical data.
Tags : 
apple, devices, patch management, ios, support, end user, security
    
Absolute Software

Unknown Attacks: A Clear and Growing Danger

Published By: Secure Computing     Published Date: Aug 21, 2009
Unknown attacks are quickly becoming the next great information security challenge for today's organizations. Get up to speed on what these threats really are and learn what security measures are available to keep your network safe from these attacks.
Tags : 
security, patch management, security management, web service security, malware, intrusion prevention, internet security, internet attacks
    
Secure Computing

Implementing HIPAA with Active Administrator

Published By: Dell Software     Published Date: Jul 17, 2012
How to meet HIPAA standards
Tags : 
hipaa, techical safeguards, solutions, security management, data security, data management, active directory, permissions
    
Dell Software

EvolveWare’s S2T Technology - Automated Software Analysis, Documentation & Transformation

Published By: Evolveware     Published Date: Nov 06, 2006
Software analysis, documentation, migration, upgrades or replacements are daunting and risky endeavors because they are primarily manual and time-consuming. EvolveWare’s S2T Technology provides a solution to these problems with tools that automate the process up to 90%, thus reducing the time and cost of such initiatives by as much as 40-60%.
Tags : 
software analysis, software documentation, software migration, migration, software upgrades, patch management, s2t, software management
    
Evolveware

Security Design Principles

Published By: Nixu     Published Date: Nov 06, 2006
This white paper is an overview of the Nixu Security System and the various security principles it encompasses.  Topics discussed include security design, application security, OS hardening, patch management, and more.
Tags : 
network security, patch management, firewall, intrusion prevention, application security, security management, nixu, security
    
Nixu

Evolving Your Patch Management Technology to Proactively Combat Security Challenges

Published By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : 
lumension, unix, linux, web 2.0, windows, cve
    
Lumension

TrueUpdate 2.0 Product Brochure

Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
TrueUpdate 2.0 allows any software developer to integrate automated update capabilities into their final product, providing a robust client/server framework for determining required updates, and then retrieving and applying the necessary patch or installation files using Internet or LAN protocols.
Tags : 
software development, updates, update installers, trueupdate, indigo rose
    
Indigo Rose Corporation

Visual Patch 2.0 Product Brochure

Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
There is simply no easier way to make compact, professional quality patches for your software and electronic content. Visual Patch 2.0's point-and-click design workflow takes the difficulty out of building even complex full-history patches.
Tags : 
sofware development, patch, updates, binary patches, indigo rose, software development
    
Indigo Rose Corporation

Visual Patch 2.0 Overview

Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
Visual Patch 2.0 is a fast and efficient solution for software developers and content distributors who need to create software patches. Read through a comprehensive list of features, and learn about the system requirements of Visual Patch 2.0.
Tags : 
software development, software patch, patches, software updates, indigo rose
    
Indigo Rose Corporation

Visual Patch 2.0 Customer Presentation

Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
An introductory view of Visual Patch 2.0 from the ground up. Learn all about Visual Patch 2.0 and see everything it can do. Create secure full-history or binary patches quickly and easily!
Tags : 
software development, software patch, patches, binary patches, software updates, indigo rose
    
Indigo Rose Corporation

Server Security, Patching and Virtualization

Published By: Blue Lane     Published Date: Apr 03, 2007
One of the biggest challenges mirrors a problem in the physical server world: security patching. This paper describes in greater detail the benefits and challenges of server virtualization, and offers insight into how Blue Lane customers are utilizing the PatchPoint(r) System to combat the threat of software vulnerabilities.
Tags : 
virtualization, patching, security, vmware, network security, blue lane, patchpoint, server virtualization
    
Blue Lane

Securing Virtualized Infrastructure: From Static Security to Virtual Shields

Published By: Blue Lane     Published Date: Apr 03, 2007
Andreas Antonopoulos, SVP & Founding Partner of Nemertes Research, discusses the challenges of securing the new virtual datacenter.
Tags : 
virtualization, datacenter, security, vulnerability, vmware, virtualshield, security, patching
    
Blue Lane

Benefits of Securing Servers: Enhanced Security, Compliance and Operational Excellence

Published By: Blue Lane     Published Date: Aug 31, 2007
Needing to implement a patch management solution to comply with SAS 70, Davidson found the solutions on the market lacking. They either required significant resources to test all patches, or were expensive automated solutions. Then, Davidson learned about Blue Lane Technologies, a concept that Davidson loved.
Tags : 
server virtualization, server security, network security, patch management, sas70, sas 70, compliance, sox compliance
    
Blue Lane

The Challenge of Securing Hard to Patch Servers in Health Care Environments

Published By: Blue Lane     Published Date: Oct 01, 2007
The healthcare industry has benefited from the breakneck pace of digitization - spanning everything from payments to patient records to X-ray film - but it has also been increasingly exposed to greater risk. Efforts to increase healthcare provider productivity via increased digitization and system interconnectivity have to be counterbalanced against the growing concerns for patient privacy and a backdrop of increasing liability.
Tags : 
healthcare, health care, patient privacy, privacy, patch management, patch, patch server, hipaa
    
Blue Lane

Protecting Physical Servers and VMs While Preserving Uptime

Published By: Blue Lane     Published Date: Jan 07, 2008
Quantros’ business—an ASP for the health care industry—requires a secure network and maximal uptime—all with a small IT department and a small budget. Quantros was challenged to implement and enforce sound security policies and to keep up with the continuous stream of vendor patches.
Tags : 
high availability, server, virtual server, network security, server vulnerability, vulnerability, vulnerabilities, quantros
    
Blue Lane

Patch Management with GFI LANguard N.S.S. & Microsoft WSUS

Published By: GFI     Published Date: Jun 14, 2007
This white paper provides an overview of how to use GFI LANguard Network Security Scanner (N.S.S.) and Microsoft Windows Software Update Services (WSUS) to keep your network automatically updated with the latest security patches.
Tags : 
patch, patches, patch management, windows, windows patch, windows update, windows updates, network security
    
GFI

Using GFI LANguard Network Security Scanner to Secure Your Internal Network

Published By: GFI     Published Date: Jun 14, 2007
This document shows you how to use GFI LANguard N.S.S. to identify vulnerabilities on your network (excerpt from manual).
Tags : 
vulnerability assessment, vulnerability management, auditing, audit, security management, languard, pki, patch management
    
GFI

Job Monitoring: System Informer or Sixth Sense?

Published By: CCSS     Published Date: Nov 07, 2007
Imagine you had a friend that turned up right before something bad was going to happen and told you how to avoid it. Like if you don't attend to that looping job silently going about its business, the system in India will fall over and the downtime will cost the company hundreds of thousands of dollars in idle work hours. Yes, a friendly forewarning wouldn't be bad. We would suggest employing a job monitor – it's your friend on the inside.
Tags : 
networking, job monitoring, monitoring, network management, network performance, network performance management, job dispatch, productivity
    
CCSS

Vulnerability Management 101: What’s a Risk and How Can I Mitigate as Many as Possible?

Published By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : 
risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit
    
Perimeter

Malicious Software Defense: Have We Moved Beyond Anti-Virus and Spyware Protection Software?

Published By: Perimeter     Published Date: Jul 17, 2007
With the decrease in the total number of viruses, some have theorized that the need for virus protection is becoming less and less necessary. The purpose of this paper is to help individuals understand the scope of the problem, and specific strategies available to combat this continually changing threat.
Tags : 
patch, ips, intrusion prevention, ids, intrusion defense, security policies, spam, spyware
    
Perimeter
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.