patch

Results 26 - 50 of 226Sort Results By: Published Date | Title | Company Name

The three factors slowing down your emergency response times

Published By: HERE Technologies     Published Date: Oct 23, 2019
Public safety organizations are trying to optimize their dispatch centers in order to minimize response times and maximize the total number of lives saved. Most of these organizations, however, are still using legacy location technology that does not properly address some key factors. As one of the world’s leading location platforms, HERE shares insights and solutions to address the 3 main factors currently affecting the speed and efficiency of most emergency dispatch center operations
Tags : 
    
HERE Technologies

Security Analytics: A Required Escalation In Cyber Defenses

Published By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : 
cyber defenses, threat actors, it security, security analytics, application security, firewalls, hacker detection, security management
    
Arbor

Combatting Advanced Threats With Endpoint Security Intelligence

Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM

Endpoint Security: Fighting Cyber Crime with Automated, Centralized Management

Published By: Kaseya     Published Date: May 13, 2015
To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
Kaseya

Improve Cybersecurity with DevOps [Complimentary Forrester Report]

Published By: Puppet     Published Date: May 20, 2016
This July 2015 Forrester Report explores: - Why consistent, automated DevOps processes are essential to closing vulnerabilities and limiting exposure. - Practices, such as infrastructure as code and automated provisioning, for closing holes as soon as patches are available. - How DevOps and security professionals can work together to adopt DevSecOps.
Tags : 
    
Puppet

HQ 2.0: The Next- Generation Corporate Center

Published By: PwC     Published Date: Apr 03, 2019
Not so very long ago, corporate executives commuted to a gleaming headquarters building, often in a beautifully landscaped suburban campus. Greeted by attentive security guards and smiling receptionists, they walked down well-appointed hallways lined with mahogany paneling and expensive artwork to their offices on the executive floor. There, they reviewed petitions that had percolated up the ladder, and dispatched decisions to be executed by the army of troops on the front lines. After decades of hard work, these individuals had ascended to the top of their pyramid, overseeing the processes and practices that made the enterprise work, and enjoying all the perquisites and power of a C-suite functional officer in the corporate center of a major company.
Tags : 
    
PwC

Arrive faster, save more lives

Published By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data
Tags : 
mapping, public saftey, location data
    
HERE Technologies

eBook: Six Reasons to Upgrade Your Database

Published By: IBM     Published Date: Jul 06, 2017
Effectively using and managing information has become critical to driving growth in areas such as pursuing new business opportunities, attracting and retaining customers, and streamlining operations. In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. These needs create a daunting array of workload challenges and place tremendous demands on your underlying IT infrastructure and database systems. In many cases, these systems are no longer up to the task—so it’s time to make a decision. Do you use more staff to keep up with the fixes, patches, add-ons and continual tuning required to make your existing systems meet performance goals, or move to a new database solution so you can assign your staff to new, innovative projects that move your business forward?
Tags : 
database, growth, big data, it infrastructure, information management
    
IBM

High Impact Planning and Budgeting for High Growth Companies

Published By: Oracle     Published Date: Nov 07, 2018
At many organisations, planning and budgeting take too long and devour resources. Finance teams spend too much time on administrative tasks relating to these processes—collecting, consolidating and reconciling data, for example—and are left with little time for analysis, strategy development and target setting. Accuracycan be patchy, results unreliable.
Tags : 
    
Oracle

Oracle Engineered Systems and GDPR

Published By: Oracle     Published Date: Jan 28, 2019
Oracle Engineered Systems are architected to work as a unified whole, so organizations can hit the ground running after deployment. Organizations choose how they want to consume the infrastructure: on-premises, in a public cloud, or in a public cloud located inside the customer’s data center and behind their firewall using Oracle’s “Cloud at Customer” offering. Oracle Exadata and Zero Data Loss Recovery Appliance (Recovery Appliance) offer an attractive alternative to do-it-yourself deployments. Together, they provide an architecture designed for scalability, simplified management, improved cost of ownership, reduced downtime, zero-data loss, and an increased ability to keep software updated with security and patching. Download this whitepaper to discover ten capabilities to consider for protecting your Oracle Database Environments.
Tags : 
    
Oracle

8 Ways Legacy ERP Harms Businesses

Published By: Oracle     Published Date: May 20, 2019
Today’s Outdated State of ERP When was the last time you upgraded your ERP system? Not just patched, fixed or tinkered with it—but implemented a substantive upgrade that enabled real business innovation, generated excitement and unleashed a wave of ideas and productivity from your users? You know—the same kinds of enthusiasm that greets web or iPhone apps like Instagram, Spotify, Netflix, etc.? If you’re like your peers, then the answer is “not in recent memory.” In fact, according to Forrester, “approximately half of ERP customers are on releases that are two versions behind the current release, which may be four years old or more.” Download this whitepaper to find out more about how outdated ERP systems are harming businesses.
Tags : 
    
Oracle

Patch Management Best Practices

Published By: IBM Tivoli     Published Date: Dec 13, 2010
Application exploits are on the rise. And yet industry experts are reporting that most organizations are still not adequately keeping up with security patches for their operating systems, much less their applications. One of the most effective ways to protect against application exploits is to implement security patches within 48 hours of release across your entire organization. Sound impossible?
Tags : 
ibm, tivoli, application management, patch management, best practices, roi
    
IBM Tivoli

Becoming a Trailblazer: GreenThumb keeps customer service in bloom with Field Service Lightning

Published By: Salesforce     Published Date: Nov 18, 2019
GreenThumb wanted to please its current and future customers by offering outstanding service—but its aging business platform made it impossible to deliver a truly digital customer experience. The company integrated Salesforce with a newly installed Sage financial system. Based on this integration, GreenThumb’s dispatchers, call centre staff, and field crew can see all relevant customer data on one screen. GreenThumb will save £400,000 in annual fuel costs, will eliminate 3 million pieces of paperwork per year, and resolves customer inquiries 45 seconds faster on average.
Tags : 
    
Salesforce

The Trailblazer's Guide to Field Service

Published By: Salesforce     Published Date: Nov 18, 2019
Field Service Lightning eliminates the most common obstacles to providing good service. You can assign the right person to the right job, connect your mobile employees to your team back at base, access knowledge articles, and allow employees to collect signatures right from their phones. And give your dispatchers a comprehensive view for tracking service delivery in real time. Read on to find out how Trailblazers are using Field Service Lightning to get the most out of their mobile employees, dispatchers, and managers – in ways that improve their bottom line.
Tags : 
    
Salesforce

Securing the Unpatchable: How to Prevent Security Breaches on Endpoints Is Not an Option

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue vulnerability patches to remediate those flaws, many organizations do not apply all available patches to their production environments.
Tags : 
palo alto, systems, software, security
    
Palo Alto Networks

Growing Government Cyber Intelligence

Published By: IBM     Published Date: Jan 13, 2017
As traditional network perimeters surrounding data centers dissolve, agencies face enormous difficulties fending off attacks using a patchwork of traditional security tools to protect classified or personally identifiable information (PII). Time and again, traditional security practices have proven porous and/or unsustainable. Read this i360Gov Book to understand the importance of: - Transforming federal fortifications into intelligence-driven defense - Intensifying focus on cyber intelligence -Needing a well trained cybersecurity force
Tags : 
ibm, analytics, government, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM

The Future of Security Operations

Published By: Group M_IBM Q119     Published Date: Mar 01, 2019
The velocity of technology infrastructure change continues to accelerate, putting serious stress on Security Operations (SecOps). This has forced security folks to face the fact that operations has never really been their forte. That’s a bit harsh, but denial never helps address problems. The evidence is fairly strong that most organizations are pretty bad at security operations. How many high-profile breaches could have been avoided if one of many alerts was acted upon? How many attacks were made possible by not having properly patched servers or infrastructure? How many successful compromises resulted from human error?
Tags : 
    
Group M_IBM Q119

Getting Started with Vulnerability Mitigation

Published By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with IT’s difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isn’t done as well as it needs to be.
Tags : 
    
Kaseya

Patch Management Best Practices

Published By: ConnectWise     Published Date: Aug 22, 2019
Patches correct bugs, flaws and provide enhancements, which can prevent potential user impact, improve user experience and potentially save your technicians time researching and repairing issues that could have already been resolved or prevented with an existing update. Clients generally understand that their systems need to be patched, but they likely do not have the expertise to comfortably approve and install patches without help. When operating within the IT services industry, patching is one of the first areas that competitors auditing your clients will assess. Developing best practices to manage the risks associated with the approval and deployment of patches is critical to your IT department's service offering.
Tags : 
    
ConnectWise

A Database that Installs, Manages and Upgrades Itself

Published By: Oracle EMEA     Published Date: Oct 08, 2019
Data management doesn’t come easier than this. Thanks to machine learning, artificial intelligence and the power of the cloud just about anyone can gain insight of their data. Easy to install, just tell the service level what you want and it does the rest. Oracle Autonomous Database self-repairs, patches automatically and counters threats with artificial intelligence. Autonomous for Dummies? We think its pretty smart.
Tags : 
    
Oracle EMEA

Securing Hard to Patch Servers in Health Care Environments

Published By: Blue Lane     Published Date: Apr 03, 2007
Find out how Blue Lane's unique approach can help health care IT pros quickly secure hard to patch servers.
Tags : 
ips, intrusion, patching, vulnerability, regulations, fda, security, hipaa
    
Blue Lane

BMC Service Automation Demo

Published By: BMC ESM     Published Date: Aug 20, 2009
BMC Service Automation automates repetitive, manual tasks (such as provisioning, patching and compliance) to reduce the margin for error, allowing IT to get things done more quickly, and across organizational silos.  Software Consultant Ron Coleman provides a demonstration and discusses the key points of Service Automation from BMC Software.
Tags : 
bmc, automation, service automation, silos, software, margin for error, error reduction, patching
    
BMC ESM

BMC Helps Dell IT Automate

Published By: BMC ESM     Published Date: Nov 06, 2009
BMC helped the Dell IT group to consolidate job scheduling and job monitoring within a single dashboard, reduce by 75 percent the number of IT administrators needed for patch management, and accelerate trouble-ticket resolution with automation. Watch the customer video.
Tags : 
bsm esm, dell it, automation, consolidation, configuration management, storage virtualization, business process automation, server virtualization
    
BMC ESM

BMC Service Automation: The next step in the evolution of Business Service Management

Published By: BMC ESM     Published Date: Nov 06, 2009
As you know, automation is a critical component in achieving long-term IT savings. We've compiled a few resources to give you an overview of the benefits of service automation and the technology behind our comprehensive solution.
Tags : 
bsm esm, service automation, business service management, roi, configuration management, patch management, server, auditing
    
BMC ESM

Save Your Company Time and Money with a Vulnerability Management Tool - Try GFI LanGuard for 30 Days

Published By: GFI Software     Published Date: May 18, 2012
GFI LanGuard provides a complete network security overview with minimal administrative effort. Why use GFI LanGuard? Download this free trial to experience the benefits!
Tags : 
gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching, security
    
GFI Software
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.