Networking Research Library

Powered by Bitpipe.com

Patch ManagementWhite Papers

  • Patch Management Best Practices for IT Professionals

    Sponsored by: LabTech Software

    Keeping systems up-to-date with patches is a full-time job, and the lag time between when vulnerability is discovered and when a virus or worm appears is now measured in days or weeks rather than months. This free eBook provides best practices you can follow to ensure your organizations' systems are always up-to-date.

  • Top Tips for Managing a Mobile Workforce

    Sponsored by: GFI Cloud

    This white paper introduces several tips for managing and protecting a mobile workforce, including solutions compatible with cloud computing.

  • GFI CloudTM Case Study - MacDermid Offshore Solutions UK

    Sponsored by: GFI Cloud

    This informative case study details a success story with one server monitoring solution. Read on to find out how you can have a single view of key software without integration and compatibility worries instead of different vendors for different pieces of software, and ensure that your primary servers are always up with key services running.

  • GFI CloudTM Case Study - Central Bank & Trust

    Sponsored by: GFI Cloud

    This case study examines a cloud solution that has improved network security for a banking organization.

  • VCE Lifecycle Assurance: Doing the Hard Work So You Don't Have To

    Sponsored by: VCE

    In this paper, learn how the value a customer derives over the entire lifecycle of his or her systems enables IT to offload the massive expense and risk associated with endless patch management and regression testing to VCE, allowing IT to remain focused on strategic initiatives.

  • How to Deal with Todays Multi-Platform, Multi-Vendor Patch Management Mess

    Sponsored by: Lumension

    This exclusive resource discusses a patch management solution that provides endpoint protection that goes well beyond the typical operating system, allowing your organization to ensure that patches run smoothly and that any security holes are plugged up.

  • Automation Suite for NERC CIP Compliance

    Sponsored by: LogRhythm, Inc.

    Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.

  • SIM Technical Guide

    Sponsored by: SearchSecurity.com

    In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.

  • Virtualization Security: Protecting Virtualized Environments

    Sponsored by: ComputerWeekly.com

    This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.

  • Web Application Firewalls: Patching, SDLC Key for Security, Compliance

    Sponsored by: SearchSecurity.com

    In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.

  • Taking a Proactive Approach to Linux Server Patch Management

    Sponsored by: SearchDataCenter.com

    In this white paper, discover how to take a proactive approach to Linux server patch management. Learn more about overcoming common challenges for Linux server patch management, what to patch and when, patch management in the cloud and more.

  • Threat prevention techniques: How to build a strong network

    Sponsored by: SearchSecurity.com

    Consult this expert E-Guide to learn how you can develop best practices for threat management and how you can build a strong network. Find out tips from the experts on how you can build a foundation for complete threat protect ion by consulting this guide now.

  • Lumension Guide to Patch Management Best Practices

    Sponsored by: Lumension

    Access this white paper to discover patch management best practices. Learn how to better mitigate risk and remediate vulnerabilities.

  • Virtual Data Center E-Zine: Volume 39: Managing Virtualization Patches

    Sponsored by: SearchDataCenter.com

    Keeping all of your patches up-to-date is a tedious but necessary task in order to ensure a fully protected data center. This dedicated e-zine highlights tips and strategies for making patch management easier and less time-consuming.

  • Cloud Security Designed for Amazon Web Services (AWS)

    Sponsored by: Trend Micro

    This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.

  • Mapping Security For Your Virtual Environment

    Sponsored by: Hewlett-Packard Company

    In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.

  • Data Sheet: What's New in Red Hat Satellite 5.6?

    Sponsored by: Red Hat

    Discover the new Red Hat Satellite 5.6 capabilities and features that provide administrators with the means to efficiently manage their systems, lowering per-system deployment and management costs.

  • Implementing an Effective Vulnerability Management Program

    Sponsored by: Tenable Network Security

    Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.

  • Select the Right Solution for Endpoint Management

    Sponsored by: IBM

    This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.

  • Endpoint Security Suites Take Center Stage in the Enterprise

    Sponsored by: Symantec Corporation

    This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other.

  • SymEd Solutions from Symantec: Endpoint Management and Mobility

    Sponsored by: Insight Public Sector and Symantec

    Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.

  • IT Security Management McAfee ePolicy Orchestrator Deep Command

    Sponsored by: Intel

    This white paper outlines a security and management solution that allows you to remotely diagnose and update your enterprise even when endpoints are disabled or powered off. Discover how advances in malware and cyberthreats are driving the need for this capability and see if this solution is right for you by reading on now.

  • Patch management: Fixing vulnerabilities before they are exploited

    Sponsored by: GFI LanGuard

    Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.

  • EMA Analyst Report on the Mobile Device Management Marketspace

    Sponsored by: IBM

    Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges.

  • Rewriting the Rules of Patch Management

    Sponsored by: IBM

    By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Networking Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.