patch

Results 76 - 100 of 224Sort Results By: Published Date | Title | Company Name

Cost-Effective Database Protection to Meet Your Compliance Requirements

Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization, anti spam, anti spyware, anti virus, application security, business continuity, compliance, disaster recovery, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, vulnerability management, data loss prevention
    
McAfee

A Comprehensive Assessment of the Risk to Your Most Sensitive Data

Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code, anti spam, anti spyware, anti virus, application security, auditing, business continuity, compliance, disaster recovery, encryption, hacker detection, high availability, internet security
    
McAfee

Easy-to-Apply Virtual Patches Protect Sensitive Databases from Potential Breaches

Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.
Tags : 
database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection, access control, anti spyware, anti virus, application security, auditing, business continuity, compliance, disaster recovery, encryption, hacker detection, internet security, intrusion detection, intrusion prevention
    
McAfee

Extend Protection and Compliance to EOL Servers and Databases

Published By: McAfee     Published Date: Mar 08, 2013
Databases don’t take the day off. Neither do we. McAfee security experts remain focused on keeping your sensitive information safe and available while helping your company ensure compliance with internal policies and industry regulations.
Tags : 
database security, database compliance, database virtual patching, database breach, application control, legacy databases, anti spyware, anti virus, internet security, intrusion detection, intrusion prevention, vulnerability management, virtualization, cloud computing
    
McAfee

Watch how you can easily run a comprehensive assessment of the risk to your most sensitive data.

Published By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, disaster recovery, email security
    
McAfee

Minnesota Timberwolves

Published By: Fitbit     Published Date: Nov 12, 2018
A basketball partnership that walks the walk, literally. Employees of the Minnesota Timberwolves get stepping. In 2017, the Minnesota Timberwolves teams signed on to partner with Fitbit. This new sponsorship not only included a Fitbit patch on all team jerseys, but an opportunity to work together both on and off the basketball court. For starters, the Timberwolves knew that creating a culture of wellness was a natural next step for the Fitbit partnership. Learn how this NBA organization: ? Launched a successful wellness program through Fitbit Health Solutions ? Kept momentum (and step counts) high on game days ? Experienced cost decreases on medical claims
Tags : 
    
Fitbit

The Threat Intelligence Handbook

Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more.
Tags : 
    
Recorded Future

The Threat Intelligence Handbook

Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future

The Threat Intelligence Handbook

Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future

Darktrace Antigena: The Future of AI-Powered Autonomous Response

Published By: Darktrace     Published Date: Apr 02, 2019
The current era in cyber security is characterized by three fundamental challenges: the complexity of the enterprise network and connected infrastructure, the speed of newage attacks, and the strain of overwhelmed incident responders. In many ways, the expansion of networks and continual adoption of new technologies - from cloud services to the Internet of Things - has expanded the attack surface and introduced new entry-points through which attackers can gain a foothold. This, combined with the ready availability of exploit kits on the Dark Web, has led to the ‘vicious circle of the SOC’, where incident responders are so busy fire-fighting that they rarely have time to implement the critical patches that would prevent the problem at source. As security teams struggle to keep up with the rising volume of routine attacks, a new generation of cyberthreat has also emerged, characterized in large part by fast-moving threats that make an impact well before humans have time to respond. Thes
Tags : 
    
Darktrace

Quest Workspace Desktop Authority

Published By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority ®-part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : 
desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security, real-time targetin engine, service packs, it infrastructure, patching, auditing, it management, business technology, data center
    
Dell Software

Automating Data Flows to your Business Intelligence System

Published By: Tidal Software     Published Date: Sep 03, 2008
Businesses can gain greater value from their BI investment by improving the way in which data flows to the BI system are managed. Many problems result when the ETL process is handled by a patchwork of scripting, custom coding, and various built-in schedulers that are part of existing ETL solutions, because these systems do not provide end-to-end execution, monitoring, and control of the ETL process.
Tags : 
business intelligence, data warehousing, data management, data integration, etl, extract–transform-load, bi operations, bi management, informatica, cognos, ibm datastage, sas, business objects, crystal enterprise, tidal, tidal software, application integration, analytical applications
    
Tidal Software

Vulnerability Management-Assess, Prioritize, Remediate, Repeat

Published By: Shavlik Technologies     Published Date: Dec 14, 2010
This report provides insights into Best-in-Class practices for assessing vulnerabilities and threats to IT infrastructure, prioritizing fixes based on the business value of resources and acceptable levels of risk, and remediating through the efficient deployment of patches, configuration changes, and other compensating controls.
Tags : 
shavlik security, vulnerability management lifecycle, it infrastructure, risk, deployment, configuration, monitoring and measurement, monitoring, test and measurement, internet security, security management, risk management, configuration management, vulnerability management
    
Shavlik Technologies

IT.Shavlik.com Enhances Hosted Service Offerings and Empowers SMBs

Published By: Shavlik Technologies     Published Date: Dec 14, 2010
DBSi recognized a need for more robust systems management and were seeking a single vendor with broad-reaching capabilities that could be leveraged across their entire customer base.
Tags : 
shavlik security, dbsi, hosted service, smbs, systems management, patch deployment, antivirus, mobile workforce, anti virus, patch management, mobile workers, system management software
    
Shavlik Technologies

Norway MSP chooses Shavlik to improve efficiencies in patch management

Published By: Shavlik Technologies     Published Date: Dec 14, 2010
Norway MSP chooses Shavlik to improve efficiencies in patch management and within a week regains stability, lost weekends and peace of mind.
Tags : 
shavlik security, patch management, network stability, deployment, netchk protect, automation, roi, network security appliance, business process automation, return on investment
    
Shavlik Technologies

Gain Visibility and Efficiency in System Protection through Automated Patch Management

Published By: Shavlik Technologies     Published Date: Dec 14, 2010
Whalen Furniture needed an improved patch management solution that was more efficient, less time consuming, reduced risk, and ensured uptime on a 24/7 basis to support the needs of a rapidly growing global company.
Tags : 
shavlik security, system protection, automated patch management, risk, antivirus, patch deployment, manufacturing, anti virus, patch management, business process automation, risk management, data protection
    
Shavlik Technologies

HP Includes Shavlik in Headache Remedy for PZ Cussons

Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Through its business relationship with HP, PZ Cussons utilises Shavlik NetChk Protect to simplify and automate the patch management process. View the list of benefits.
Tags : 
shavlik, pz cussons, automation, patch management process, customer delivery services, centralised management, patch management, business process automation, customer service
    
Shavlik Technologies

Patch Plus makes managing IT assets fast, easy, and automatic

Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Patch Plus makes managing IT assets fast, easy, and automatic, reducing time to value from months to minutes.
Tags : 
shavlik, patch plus, automation, it asset, virtualization, netchk console, unified management, patch management, storage virtualization, business process automation, server virtualization
    
Shavlik Technologies

The importance of patching non-Microsoft applications (recent industry findings)

Published By: Shavlik Technologies     Published Date: Dec 15, 2010
What follows is a brief summary of research findings that should be considered when determining whether organizations can accept the risk of relative inaction regarding 3rd party application patching.
Tags : 
shavlik, patching, non-microsoft application, 3rd party application patching, storage virtualization, patch management, server virtualization
    
Shavlik Technologies

Shavlik Security Suite

Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.
Tags : 
shavlik, security suite, virtual machine, legacy windows platform, third-party application, protection management, automated discovery, scanning, configuration management, infrastructure, network security, compliance, patch management, business process automation, data protection
    
Shavlik Technologies

Shavlik Any-Patch, Anywhere Solutions Cover All These Products.

Published By: Shavlik Technologies     Published Date: Dec 15, 2010
View this white paper to get a complete list of products that Shavlik covers.
Tags : 
shavlik, 3rd party application, custom patching, microsoft operating system, wsus, adobe, apple, infrastructure, interoperability, network management, network security, servers, patch management
    
Shavlik Technologies

Cloud Computing - 90 seconds to revolutionize the way you manage IT

Published By: Shavlik Technologies     Published Date: Dec 15, 2010
This whitepaper will provide an overview of cloud computing, identify some challenges and considerations for using the cloud, and will look at how best to manage a combination of physical and virtual systems throughout your infrastructure in order to support your business objectives.
Tags : 
shavlik, cloud computing, infrastructure, physical and virtual system, patching, os migration, migration, storage virtualization, server virtualization
    
Shavlik Technologies

Top 10 Ways Shavlik Simplifies Patch Management

Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Fortunately, Shavlik Technologies takes the sting out of the patch management process, while at the same time accelerating and continuously improving security and compliance readiness.
Tags : 
shavlik, patch management, security vulnerabilities, compliance, networking, automation, network security, network security appliance, business process automation, vulnerability management
    
Shavlik Technologies
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.