Software Patches Reports

Performance, Value and Protection for VMware View
sponsored by FalconStor Software
WHITE PAPER: Desktop virtualization is bringing a new approach to enterprise-wide desktop deployments aimed at providing a better end user and administrator experience than physical desktop deployments, by lowering acquisition and management cost, and offering a highly scalable, easy to deploy and fully protected desktop environment.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

FalconStor Software

Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER: In the following white paper, you'll find the information you need to spearhead your patch automation initiatives. Read now and discover a fresh approach to patch management that deploys patches organization-wide in hours.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

IBM

Integrated System Management and Support
sponsored by Oracle Corporation
WHITE PAPER: In the typical IT environment, organizations operate in a divided world of systems management and support. IT departments often treat these two fundamental areas as distinct silos causing gaps for IT employees, who spend too much time and manual effort resolving system problems. This creates both higher risks and higher costs for IT.
Posted: 30 Mar 2011 | Published: 22 Mar 2011

Oracle Corporation

Five tips to reduce risk from modern web threats
sponsored by Sophos
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos

Five tips to reduce risk from modern web threats
sponsored by Sophos
WHITE PAPER: To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.
Posted: 06 Apr 2012 | Published: 05 Apr 2012

Sophos

Presentation Transcript: Overcoming the Challenges with Configuration and Patch Mgmt
sponsored by BigFix
PRESENTATION TRANSCRIPT: In this presentation transcript, you’ll gain insight on how to improve your asset discovery processes, determine the patch level of the machines in your environment, and improve testing and deployment processes to keep pace with Patch Tuesday and quarterly Oracle and Adobe releases.
Posted: 02 Nov 2010 | Published: 01 Nov 2010

BigFix

Maintaining Continuous Compliance – a new best practice approach
sponsored by IBM
WHITE PAPER: When trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

IBM

Guide: Desktop Authority
sponsored by ScriptLogic Corporation
WHITE PAPER: Desktop Authority comprehensively manages the Windows desktop throughout the desktop lifecycle, reducing the total cost of desktop and application ownership.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Intel Centrino Pro and Intel vPro Processor Technology
sponsored by Intel Corporation
WHITE PAPER: Learn how to improve security and management capabilities with Intel vPro processor technology. This white paper discusses how remote management can simplify systems management and save time for IT administrators.
Posted: 21 Nov 2007 | Published: 01 Nov 2007

Intel Corporation

SIM Technical Guide
sponsored by TechTarget Security
EZINE: In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

TechTarget Security