Patch Management White Papers

Patch Management is the process of using a strategy and plan of what patches should be applied to which systems at a specified time.
Results 1 - 25 of 80Sort Results By: Published Date | Title | Company Name
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Qualys     Published Date: Nov 05, 2013

Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process. This white paper describes an approach to patch management that allows you to prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied. Also inside, find ten steps to improve patching – read on to learn more.

Tags : qualys, qualysguard, security, patch acceleration, vulnerability, vulnerability management, robustness, patching system
    
By: EMC     Published Date: Apr 18, 2013

See for yourself how easy it is to implement RSA Archer Business Continuity Management & Operations right out of the box. Try it free for 30 days, then take advantage of the special purchase offer through 7/31/13.

Tags : business continuity, disaster recovery, encryption, hacker detection, high availability, identity management, internet security, intrusion detection
    
By: Kaseya     Published Date: Apr 04, 2013

A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.

Tags : it security, anti-virus, vulnerability management, intrusion prevention, access control, anti spam, anti spyware, anti virus
    
By: McAfee     Published Date: Mar 08, 2013

McAfee Virtual Patching for Databases makes perfect sense for closing the window of risk, while saving dollars and minimizing business disruption.

Tags : database security, database patching, database compliance, database security patches, virtual patching, hipaa, pci dss, anti spyware
    
By: McAfee     Published Date: Feb 06, 2013

Users who take work with them everywhere unknowingly jeopardize networks and systems.

Tags : windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000
    
By: McAfee     Published Date: Feb 06, 2013

Protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, and for ensuring regulatory compliance.

Tags : vulnerability management, database security, dbms security, database activity monitoring, virtual patching, virtual patching for databases, anti spam, anti spyware
    
By: McAfee     Published Date: Jan 23, 2013

Vulnerabilities lead to risk exposure and downtime. Protect your critical assets with virtual patching.

Tags : virtual patching, network breaches, critical patches, software patches, change management, anti spam, anti spyware, network security appliance
    
By: Lumension     Published Date: Jan 22, 2013

In this fast-paced webinar, I’ll look at everything that’s new as far as security in Windows 8, with a special focus on mobility.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile
    
By: Lumension     Published Date: Jan 22, 2013

Find out from Derek Brink at Aberdeen Group how their latest research confirms – and quantifies – the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spam
    
By: Lumension     Published Date: Jan 22, 2013

You just can’t cut corners today. In fact you need to be very careful about even “optimizing” your security efforts because it’s so easy to misjudge what needs to be secured and what doesn’t; what deserves your attention and what doesn’t.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spyware
    
By: Lumension     Published Date: Jan 22, 2013

With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti virus
    
By: Lumension     Published Date: Jan 22, 2013

In this age of APTs you can’t leave a single PC unpatched and vulnerable. In this on-demand webcast, Randy Franklin Smith from Ultimate Windows Security will deal with this whole topic.

Tags : software updates, security, patch, network security, patch management, remediation solutions, access control, anti spam
    
By: Lumension     Published Date: Jan 18, 2013

News of the Flame attack has spread faster than wildfire. While the attack effected only a small number of Endpoints, Flame signifies a new level of cyber threat that all IT security professionals need to understand in-depth.

Tags : security, network security, network protection, data security, data protection, cyber attack, case study, encryption
    
By: Lumension     Published Date: Jan 18, 2013

Watch this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address

Tags : whitelisting, endpoint security, av signatures, patch management, compliance, encryption, network security appliance, security management
    
By: Lumension     Published Date: Jan 18, 2013

Learn the recommended steps to cure your patch management headache as we dive into a technical discussion of what the critical items to address.

Tags : patch, best practices, networking, risk mitigation, network security, security, monitoring, network management
    
By: Symantec     Published Date: Apr 09, 2012

Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Lumension     Published Date: Jan 11, 2012

There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: Webroot     Published Date: Dec 06, 2011

Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.

Tags : saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring
    
By: CenturyLink     Published Date: Nov 18, 2011

Only companies with a disaster-ready infrastructure and solid business continuity plan can come through such events with minimal downtime and cost.

Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
By: Secunia     Published Date: Oct 12, 2011

This study identifies the 3rd party program vulnerabilities and the threat they represent.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
Start   Previous   1 2 3 4    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.