Security Patch Management Reports

Intel Centrino Pro and Intel vPro Processor Technology
sponsored by Intel Corporation
WHITE PAPER: Learn how to improve security and management capabilities with Intel vPro processor technology. This white paper discusses how remote management can simplify systems management and save time for IT administrators.
Posted: 21 Nov 2007 | Published: 01 Nov 2007

Intel Corporation

Presentation Transcript: Best Practices for Scheduled Security Update Cycle
sponsored by GFI Software
PRESENTATION TRANSCRIPT: In this presentation transcript, Nick Lewis discusses the best ways to efficiently handle vendor security updates, how to prioritize patch deployment on mission-critical and non-mission critical systems, and why testing patches before deployment is such a crucial step.
Posted: 04 May 2011 | Published: 04 May 2011

GFI Software

Web Application Firewalls: Patching, SDLC Key for Security, Compliance
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

TechTarget Security

SAP System Build and Landscape Management Activities
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this white paper to learn how to simplify the often cumbersome, critical change management activities needed to simplify SAP solution deployments, increase operational performance, and decrease total cost of ownership (TCO) with a single, cohesive system that includes compute, network, and storage access components.
Posted: 22 Nov 2011 | Published: 30 Jun 2010

Cisco Systems, Inc.

Mapping Security For Your Virtual Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.
Posted: 15 Nov 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

Data Sheet: What's New in Red Hat Satellite 5.6?
sponsored by Red Hat
WHITE PAPER: Discover the new Red Hat Satellite 5.6 capabilities and features that provide administrators with the means to efficiently manage their systems, lowering per-system deployment and management costs.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

Red Hat

Determining the Most Effective Endpont Management
sponsored by IBM
WHITE PAPER: This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
Posted: 09 Sep 2013 | Published: 31 May 2013

IBM

Presentation Transcript: Patch Management for the IT Infrastructure
sponsored by GFI Software
PRESENTATION TRANSCRIPT: Keeping up with patches is a tedious and time consuming task for security pros, and often prompts them to look for a more efficient and effective solution. This presentation transcript discusses a patch management approach that offers effective monitoring and increased productivity.
Posted: 04 May 2011 | Published: 04 May 2011

GFI Software

Applying Updates for Dell PowerEdge Servers Using Microsoft Systems Management Server 2003 Part 1
sponsored by DellEMC and Intel®
WHITE PAPER: Managing hardware updates is a key aspect of the MS Systems Management Server (SMS) 2003 with the introduction of the SMS 2003 Inventory Tool for Dell Update. This article provides guidelines for the process and is the first segment of a two part series.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

DellEMC and Intel®

Best Practices for Mobile Device Management
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

TechTarget Security