Security Patch Management Reports

Best Practices in Lifecycle Management: Comparing Suites from Dell KACE, Symantec, LANDesk, and Microsoft
sponsored by Dell KACE
WHITE PAPER: This white paper points out the challenges of selecting a lifecycle management tool and presents a comparison of various technologies on the market. Explore 45 key features across seven areas, including discovery, inventory, asset management, and more.
Posted: 08 Aug 2011 | Published: 01 Jan 2011

Dell KACE

E-Book: Why a Windows 7 Upgrade is Worth It
sponsored by Kaseya
EBOOK: Microsoft Windows 7 addresses user frustrations, but satisfied users are just one benefit of migrating to the new operating system. These features can make it worth the investment. Read this new E-Book to learn more.
Posted: 17 Aug 2010 | Published: 17 Aug 2010

Kaseya

Determining the Most Effective Endpont Management
sponsored by IBM
WHITE PAPER: This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
Posted: 09 Sep 2013 | Published: 31 May 2013

IBM

VCE Lifecycle Assurance: Doing the Hard Work So You Don't Have To
sponsored by EMC Converged Platforms.
WHITE PAPER: In this paper, learn how the value a customer derives over the entire lifecycle of his or her systems enables IT to offload the massive expense and risk associated with endless release management and regression testing to VCE, allowing IT to remain focused on strategic initiatives.
Posted: 21 Apr 2014 | Published: 31 Jul 2013

EMC Converged Platforms.

Performance, Value and Protection for VMware View
sponsored by FalconStor Software
WHITE PAPER: Desktop virtualization is bringing a new approach to enterprise-wide desktop deployments aimed at providing a better end user and administrator experience than physical desktop deployments, by lowering acquisition and management cost, and offering a highly scalable, easy to deploy and fully protected desktop environment.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

FalconStor Software

E-Guide: Remediating IT vulnerabilities: Expert Tips
sponsored by TechTarget Security
EGUIDE: This expert E-Guide uncovers 3 quick ways you can remediate IT vulnerabilities and discusses best practices for improved vulnerability management.
Posted: 10 Nov 2011 | Published: 09 Nov 2011

TechTarget Security

WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges
sponsored by Lumension
VIDEO: In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS.
Posted: 25 Feb 2014 | Premiered: 25 Feb 2014

Lumension

Maintaining Continuous Compliance – a new best practice approach
sponsored by IBM
WHITE PAPER: When trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

IBM

Remediating IT vulnerabilities: Quick hits for risk prioritization
sponsored by TechTarget Security
EGUIDE: There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.
Posted: 01 Sep 2011 | Published: 25 Aug 2011

TechTarget Security

BDNA for Security: Strengthened Security Through Visibility
sponsored by BDNA
WHITE PAPER: Lack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

BDNA