software patch

Results 1 - 25 of 32Sort Results By: Published Date | Title | Company Name

Secure at the Source

Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
Ounce Labs, an IBM Company

Three Steps to Securing Software Patches: Vulnerability Intelligence Matters

Published By: Flexera     Published Date: Sep 16, 2016
Download this white paper to learn more about these three steps to securing software patches: Play to strengths and know your weaknesses Prioritize for Bottom Line Value Design a Process to Support Desired Outcomes
Tags : 
software patch, patch management, third-party patching, software vulnerability management, vulnerability intelligence, enterprise risk, flexera, risk reduction
    
Flexera

Endpoint Security: Fighting Cyber Crime with Automated, Centralized Management

Published By: Kaseya     Published Date: May 13, 2015
To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, security, anti spyware, application security, authentication, compliance, encryption, hacker detection, identity management, internet security, intrusion detection, intrusion prevention
    
Kaseya

Oracle Engineered Systems and GDPR

Published By: Oracle     Published Date: Jan 28, 2019
Oracle Engineered Systems are architected to work as a unified whole, so organizations can hit the ground running after deployment. Organizations choose how they want to consume the infrastructure: on-premises, in a public cloud, or in a public cloud located inside the customer’s data center and behind their firewall using Oracle’s “Cloud at Customer” offering. Oracle Exadata and Zero Data Loss Recovery Appliance (Recovery Appliance) offer an attractive alternative to do-it-yourself deployments. Together, they provide an architecture designed for scalability, simplified management, improved cost of ownership, reduced downtime, zero-data loss, and an increased ability to keep software updated with security and patching. Download this whitepaper to discover ten capabilities to consider for protecting your Oracle Database Environments.
Tags : 
    
Oracle

Securing the Unpatchable: How to Prevent Security Breaches on Endpoints Is Not an Option

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue vulnerability patches to remediate those flaws, many organizations do not apply all available patches to their production environments.
Tags : 
palo alto, systems, software, security
    
Palo Alto Networks

Getting Started with Vulnerability Mitigation

Published By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with IT’s difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isn’t done as well as it needs to be.
Tags : 
    
Kaseya

BMC Service Automation Demo

Published By: BMC ESM     Published Date: Aug 20, 2009
BMC Service Automation automates repetitive, manual tasks (such as provisioning, patching and compliance) to reduce the margin for error, allowing IT to get things done more quickly, and across organizational silos.  Software Consultant Ron Coleman provides a demonstration and discusses the key points of Service Automation from BMC Software.
Tags : 
bmc, automation, service automation, silos, software, margin for error, error reduction, patching, provisioning, compliance, manual task, business process automation, international computing
    
BMC ESM

Save Your Company Time and Money with a Vulnerability Management Tool - Try GFI LanGuard for 30 Days

Published By: GFI Software     Published Date: May 18, 2012
GFI LanGuard provides a complete network security overview with minimal administrative effort. Why use GFI LanGuard? Download this free trial to experience the benefits!
Tags : 
gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching, security
    
GFI Software

Explore Epicor BisTrack Software for LBM Dealers and Distributors

Published By: Epicor     Published Date: Jun 22, 2017
Professionals in the lumber and building materials (LBM) industry know that getting the job done right is all about having the right tools. Lumber and business materials manufacturers and distributors need intuitive software that’s smart enough to simplify the complexities of your business, leverage data to gain valuable sales insight, and deliver exceptional customer service. Epicor BisTrack software is uniquely optimized to help LBM retailers, pro dealers, and distributors grow your business. Learn about the LBM industry-specific functionality that BisTrack offers, like: • Supporting pro dealers and distributors • Optimizing inventory and purchasing • Managing and tracking customer relationships • Improving delivery dispatch efficiency • Introducing mobility and mobile access Take the tour today to see how Epicor BisTrack can help your business.
Tags : 
lumber, building materials, lbm, erp, bistrack, building materials distributors, lumber distributors, lumber manufacturers
    
Epicor

Three Steps to Securing Software Patches Vulnerability Intelligence Matters

Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy, risk, management, security, enterprise applications
    
Flexera

Protect Critical Assets with Virtual Patching

Published By: McAfee     Published Date: Jan 23, 2013
Vulnerabilities lead to risk exposure and downtime. Protect your critical assets with virtual patching.
Tags : 
virtual patching, network breaches, critical patches, software patches, change management, anti spam, anti spyware, network security appliance, patch management
    
McAfee

Cybercriminals do not need administrative users

Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia

How to Secure a Moving Target with Limited Resources

Published By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia

The (In)Security State of SCADA Software Systems

Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the vulnerable components of SCADA systems based on analysis from Secunia while verifying the reported reported vulnerabilities.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia

The Threat of the End-User PC

Published By: Secunia     Published Date: Oct 12, 2011
This study identifies the 3rd party program vulnerabilities and the threat they represent.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia

IT Systems Management for Financial Institutions

Published By: Kaseya     Published Date: Mar 12, 2015
Banks want to use technology to work smarter, better and faster to maintain regulatory compliance, reduce risk and increase productivity. Automated IT systems management is helping them reach those goals in a seamless, efficient manner.
Tags : 
automated management systems, software management, it automation, financial institutions, regulatory compliance, security management, software patches, audit violations, network performance management, compliance, data protection, database security, infrastructure
    
Kaseya

Save Your Company Time and Money with a Vulnerability Management Tool

Published By: GFI Software     Published Date: Apr 05, 2011
GFI LANguard provides a complete network security overview with minimal administrative effort. Why use GFI LANguard? Download this free trial to experience the benefits!
Tags : 
gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching, network security, auditing, patch management, vulnerability management
    
GFI Software

Stopping the Adobe, Apple and Java Software Updater Insanity

Published By: Lumension     Published Date: Jan 22, 2013
In this age of APTs you can’t leave a single PC unpatched and vulnerable. In this on-demand webcast, Randy Franklin Smith from Ultimate Windows Security will deal with this whole topic.
Tags : 
software updates, security, patch, network security, patch management, remediation solutions, access control, anti spam, anti spyware, anti virus, application security, business continuity, compliance, firewalls, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, network security appliance
    
Lumension

Why Renew? Let IBM tell you why!

Published By: IBM     Published Date: Jul 19, 2012
Cyber criminals constantly look for ways to attack systems through flaws in browsers, operating systems, and other software. Software vendors patch flaws as quickly as they can. If you don't apply their patches, you're asking for trouble. Watch htis video to learn more.
Tags : 
technology, ibm, software, subscription, renew, business management, business technology, research
    
IBM

Patch Acceleration for Stronger Security

Published By: Qualys     Published Date: Nov 05, 2013
Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process. This white paper describes an approach to patch management that allows you to prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied. Also inside, find ten steps to improve patching – read on to learn more.
Tags : 
qualys, qualysguard, security, patch acceleration, vulnerability, vulnerability management, robustness, patching system, patching vulnerabilities, remediation, cloud platform, patching, patch report, it infastructure, infrastructure, network security, patch management, business technology, cloud computing
    
Qualys

How IT and Audit Can Work Together to Strengthen Cybersecurity

Published By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or “WannaCry,” became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus’ execution method was simple: it exploited a vulnerable Windows SMB protocol to spread – an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
    
AuditBoard

EvolveWare’s S2T Technology - Automated Software Analysis, Documentation & Transformation

Published By: Evolveware     Published Date: Nov 06, 2006
Software analysis, documentation, migration, upgrades or replacements are daunting and risky endeavors because they are primarily manual and time-consuming. EvolveWare’s S2T Technology provides a solution to these problems with tools that automate the process up to 90%, thus reducing the time and cost of such initiatives by as much as 40-60%.
Tags : 
software analysis, software documentation, software migration, migration, software upgrades, patch management, s2t, software management, cost control, productivity, evolveware, it management, enterprise applications, auditing, compliance, application integration, business analytics, document management, records management, software compliance
    
Evolveware
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.