patch

Results 26 - 50 of 199Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Jan 28, 2019
Oracle Engineered Systems are architected to work as a unified whole, so organizations can hit the ground running after deployment. Organizations choose how they want to consume the infrastructure: on-premises, in a public cloud, or in a public cloud located inside the customer’s data center and behind their firewall using Oracle’s “Cloud at Customer” offering. Oracle Exadata and Zero Data Loss Recovery Appliance (Recovery Appliance) offer an attractive alternative to do-it-yourself deployments. Together, they provide an architecture designed for scalability, simplified management, improved cost of ownership, reduced downtime, zero-data loss, and an increased ability to keep software updated with security and patching. Download this whitepaper to discover ten capabilities to consider for protecting your Oracle Database Environments.
Tags : 
    
Oracle
Published By: IBM Tivoli     Published Date: Dec 13, 2010
Application exploits are on the rise. And yet industry experts are reporting that most organizations are still not adequately keeping up with security patches for their operating systems, much less their applications. One of the most effective ways to protect against application exploits is to implement security patches within 48 hours of release across your entire organization. Sound impossible?
Tags : 
ibm, tivoli, application management, patch management, best practices, roi
    
IBM Tivoli
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue vulnerability patches to remediate those flaws, many organizations do not apply all available patches to their production environments.
Tags : 
palo alto, systems, software, security
    
Palo Alto Networks
Published By: IBM     Published Date: Jan 13, 2017
As traditional network perimeters surrounding data centers dissolve, agencies face enormous difficulties fending off attacks using a patchwork of traditional security tools to protect classified or personally identifiable information (PII). Time and again, traditional security practices have proven porous and/or unsustainable. Read this i360Gov Book to understand the importance of: - Transforming federal fortifications into intelligence-driven defense - Intensifying focus on cyber intelligence -Needing a well trained cybersecurity force
Tags : 
ibm, analytics, government, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM
Published By: Group M_IBM Q119     Published Date: Mar 01, 2019
The velocity of technology infrastructure change continues to accelerate, putting serious stress on Security Operations (SecOps). This has forced security folks to face the fact that operations has never really been their forte. That’s a bit harsh, but denial never helps address problems. The evidence is fairly strong that most organizations are pretty bad at security operations. How many high-profile breaches could have been avoided if one of many alerts was acted upon? How many attacks were made possible by not having properly patched servers or infrastructure? How many successful compromises resulted from human error?
Tags : 
    
Group M_IBM Q119
Published By: Blue Lane     Published Date: Apr 03, 2007
Find out how Blue Lane's unique approach can help health care IT pros quickly secure hard to patch servers.
Tags : 
ips, intrusion, patching, vulnerability, regulations, fda, security, hipaa, healthcare, blue lane, patchpoint, compliance, intrusion prevention, hipaa compliance, vulnerability management, patch management
    
Blue Lane
Published By: BMC ESM     Published Date: Aug 20, 2009
BMC Service Automation automates repetitive, manual tasks (such as provisioning, patching and compliance) to reduce the margin for error, allowing IT to get things done more quickly, and across organizational silos.  Software Consultant Ron Coleman provides a demonstration and discusses the key points of Service Automation from BMC Software.
Tags : 
bmc, automation, service automation, silos, software, margin for error, error reduction, patching, provisioning, compliance, manual task, business process automation
    
BMC ESM
Published By: BMC ESM     Published Date: Nov 06, 2009
BMC helped the Dell IT group to consolidate job scheduling and job monitoring within a single dashboard, reduce by 75 percent the number of IT administrators needed for patch management, and accelerate trouble-ticket resolution with automation. Watch the customer video.
Tags : 
bsm esm, dell it, automation, consolidation, configuration management
    
BMC ESM
Published By: BMC ESM     Published Date: Nov 06, 2009
As you know, automation is a critical component in achieving long-term IT savings. We've compiled a few resources to give you an overview of the benefits of service automation and the technology behind our comprehensive solution.
Tags : 
bsm esm, service automation, business service management, roi, configuration management, patch management, server
    
BMC ESM
Published By: GFI Software     Published Date: May 18, 2012
GFI LanGuard provides a complete network security overview with minimal administrative effort. Why use GFI LanGuard? Download this free trial to experience the benefits!
Tags : 
gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching
    
GFI Software
Published By: Epicor     Published Date: Jun 22, 2017
Professionals in the lumber and building materials (LBM) industry know that getting the job done right is all about having the right tools. Lumber and business materials manufacturers and distributors need intuitive software that’s smart enough to simplify the complexities of your business, leverage data to gain valuable sales insight, and deliver exceptional customer service. Epicor BisTrack software is uniquely optimized to help LBM retailers, pro dealers, and distributors grow your business. Learn about the LBM industry-specific functionality that BisTrack offers, like: • Supporting pro dealers and distributors • Optimizing inventory and purchasing • Managing and tracking customer relationships • Improving delivery dispatch efficiency • Introducing mobility and mobile access Take the tour today to see how Epicor BisTrack can help your business.
Tags : 
lumber, building materials, lbm, erp, bistrack, building materials distributors, lumber distributors, lumber manufacturers
    
Epicor
Published By: Epicor     Published Date: Jan 16, 2018
By now, mobile technology has become an essential part of people’s lives. As both consumers and staff trend more toward a younger, digitally savvy demographic, lumber and building materials (LBM) businesses need to take advantage of mobile tools or risk losing to the competition. Mobile technologies can bring incredible benefits to LBM enterprises for delivery and dispatch, field sales, the selling floor, and the warehouse. To better help you seize the mobile advantage, Epicor has identified eight ways your LBM business can leverage mobile technologies to foster growth, including: • Serving your customers with the latest information • Serving your customers with timely, accurate deliveries • Driving revenue with increased efficiency • Streamlining operations Check out this Epicor tipsheet and discover how else your LBM business can benefit from mobile technologies.
Tags : 
lumber, building materials, lbm, erp, bistrack, lumber distributors
    
Epicor
Published By: Epicor     Published Date: Nov 19, 2018
By now, mobile technology has become an essential part of people’s lives. As both consumers and staff trend more toward a younger, digitally savvy demographic, lumber and building materials (LBM) businesses need to take advantage of mobile tools or risk losing to the competition. Mobile technologies can bring incredible benefits to LBM enterprises for delivery and dispatch, field sales, the selling floor, and the warehouse. To better help you seize the mobile advantage, Epicor has identified eight ways your LBM business can leverage mobile technologies to foster growth, including: • Serving your customers with the latest information • Serving your customers with timely, accurate deliveries • Driving revenue with increased efficiency • Streamlining operations Read out this Epicor eBook and discover how else your LBM business can benefit from mobile technologies.
Tags : 
lumber, building materials, lbm, erp, bistrack, lumber distributors
    
Epicor
Published By: Salesforce     Published Date: Nov 26, 2018
Managing a field service operation can be challenging. Service agents, dispatchers, technicians, and managers are often hindered by clunky and inefficient systems. Businesses are unable to meet their customers' needs and expectations. Not only does this lead to lower productivity among employees in the field, it also results in higher costs and poor customer experiences.
Tags : 
    
Salesforce
Published By: Oracle     Published Date: Jan 28, 2015
Yesterday the main expectations for the retail CIO were to keep the servers running, desktops patched, and store-based POS systems taking money. Today, the CIO fulfills a more strategic role, one that impacts the organization’s ability to adapt to changing consumer preferences, preserve margins and serve customers. This quick read features 8 strategies CIOs are employing to meet the demands of modern retail, plus tips from leaders at Zenni Optical, C. Wonder and Shop Direct on how to bring them to life.
Tags : 
    
Oracle
Published By: Waratek     Published Date: Mar 23, 2015
Waratek has developed a disruptive new approach to application security that protects applications and sensitive data from attacks like SQL Injection, zero-day and unpatched vulnerability exploits at runtime, without code changes or hardware devices.
Tags : 
application security, runtime application self protection, web application security, sql injection, zero day attack, zero day vulnerability, legacy java code, virtual patching, open source vulnerabilities, owasp, cloud security, gartner research report, threat forensics, advanced persistent threat
    
Waratek
Published By: LogicNow     Published Date: Mar 10, 2016
Layered Security in less than 10 minutes. All from a single, easy to use dashboard. Try MAX free for 30-days!
Tags : 
msp, layerd security, web protection, antivirus, patch management, software, web security, bandwidth
    
LogicNow
Published By: List Sotheby's International Realty, Singapore     Published Date: Dec 10, 2018
The cooling measures announced by the government on 5 July threw the residential market into a frenzy. Within a span of five hours, over 1,000 units were sold from three new projects as buyers rushed to beat the midnight deadline to avoid paying the new higher Additional Buyer’s Stamp Duty (ABSD) rates. The 1,000 units came from three projects that were launched that night: over 500 units from Riverfront Residences in Hougang, around 300 units from Park Colonial at Potong Pasir and some 200 units from Stirling Residences in Queenstown. For the rest of the quarter, response to new launches was patchy as potential home buyers weigh affordability with opportunity cost. The residential price index edged up by a mere 0.5% q-o-q, a far cry from rises of 3.4% in Q2 and 3.9% in Q1. This moderate price increase shows that the key objective of the cooling measures, which is to achieve a more gradual but sustainable price growth, has been met. Download the full report to Learn more.
Tags : 
    
List Sotheby's International Realty, Singapore
Published By: Aria Systems     Published Date: Nov 02, 2015
With millions of dollars hanging in the balance, selecting the right billing vendor is critical. Download Aria’s “7 Reasons to Evaluate Cloud Billing” to help you identify why cloud billing could be your best option. For example, cloud-billing vendors are often found to be more nimble than their on-premise billing counterparts, particularly for enterprises with multiple product lines and business in multiple geographies and currencies. Discover key advantages: • Accelerated go-to-market for products and services • An enhanced customer experience • The elimination of patches and upgrades • The ability to monetize your assets and services in new ways
Tags : 
aria systems, cloud billing, billing vendors
    
Aria Systems
Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy, risk, management
    
Flexera
Published By: Shavlik Technologies     Published Date: Apr 19, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : 
shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
    
Shavlik Technologies
Published By: Oracle Global Marketing     Published Date: Jul 13, 2012
As the amount and importance of corporate data grows, companies of all sizes are finding that they increasingly need to deploy high-availability database solutions to support their business-critical applications.
Tags : 
data, database, oracle database appliance, choosing hardware. storage, internal networking, memory, cpu, verify patch compatibility, database appliance manager, rdbms, database deployment, database installation, node, storage node
    
Oracle Global Marketing
Published By: McAfee     Published Date: Jan 23, 2013
Vulnerabilities lead to risk exposure and downtime. Protect your critical assets with virtual patching.
Tags : 
virtual patching, network breaches, critical patches, software patches, change management
    
McAfee
Published By: McAfee     Published Date: Jan 23, 2013
As long as there is software, there will be software vulnerabilities and you will find malware and cybercriminals. This paper will examine that risk and provide a step by step process to protect your companies critical assets.
Tags : 
virtual patching, change management, mcafee network security platform, mcafee vulnerability manager, mcafee global threat intelligence, mcafee risk advisor, mcafee epo
    
McAfee
Published By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : 
mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo, mcafee epolicy orchestrator, patch tuesdays, mcafee policy auditor, mcafee risk & compliance
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.