Security Patch Management Reports

Presentation Transcript: Best Practices for Scheduled Security Update Cycle
sponsored by GFI Software
PRESENTATION TRANSCRIPT: In this presentation transcript, Nick Lewis discusses the best ways to efficiently handle vendor security updates, how to prioritize patch deployment on mission-critical and non-mission critical systems, and why testing patches before deployment is such a crucial step.
Posted: 04 May 2011 | Published: 04 May 2011

GFI Software

Presentation Transcript: Patch Management for the IT Infrastructure
sponsored by GFI Software
PRESENTATION TRANSCRIPT: Keeping up with patches is a tedious and time consuming task for security pros, and often prompts them to look for a more efficient and effective solution. This presentation transcript discusses a patch management approach that offers effective monitoring and increased productivity.
Posted: 04 May 2011 | Published: 04 May 2011

GFI Software

E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals
sponsored by Lumension
WHITE PAPER: Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
Posted: 23 Jan 2012 | Published: 23 Jan 2012

Lumension

SharePoint E-Zine Volume 19: Time to Beef Up Code Retention Policies
sponsored by TechTarget Search Windows Server
EZINE: When a separate team is tasked with patching your SharePoint servers, play it safe by adding code retention policies to your governance plan. In this month's issue, learn how to use governance policies effectively so you can respond quickly when a buggy patch puts SharePoint at risk.
Posted: 18 May 2010 | Published: 18 May 2010

TechTarget Search Windows Server

SAP System Build and Landscape Management Activities
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this white paper to learn how to simplify the often cumbersome, critical change management activities needed to simplify SAP solution deployments, increase operational performance, and decrease total cost of ownership (TCO) with a single, cohesive system that includes compute, network, and storage access components.
Posted: 22 Nov 2011 | Published: 30 Jun 2010

Cisco Systems, Inc.

Unix, Linux Uptime and Reliability Increase; Patch Management Woes Plague Windows
sponsored by IBM
WHITE PAPER: Use this report, the Yankee Group's Global Server Operating System Reliability Survey, to make an informed choice on which servers best fit your needs.
Posted: 17 Jun 2008 | Published: 01 Jan 2008

IBM

Dell KACE K Series Overview
sponsored by Dell KACE
PRODUCT OVERVIEW: This series overview points out the challenges of IT systems management and showcases technologies designed to overcome them. Learn how to simplify hardware and software inventory, patching, and more across your organization.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

Dell KACE

E-Guide: Remediating IT vulnerabilities: Expert Tips
sponsored by TechTarget Security
EGUIDE: This expert E-Guide uncovers 3 quick ways you can remediate IT vulnerabilities and discusses best practices for improved vulnerability management.
Posted: 10 Nov 2011 | Published: 09 Nov 2011

TechTarget Security

Web Application Firewalls: Patching, SDLC Key for Security, Compliance
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

TechTarget Security

Remediating IT vulnerabilities: Quick hits for risk prioritization
sponsored by TechTarget Security
EGUIDE: There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.
Posted: 01 Sep 2011 | Published: 25 Aug 2011

TechTarget Security