patch

Results 76 - 100 of 223Sort Results By: Published Date | Title | Company Name
Published By: Intellitactics     Published Date: Feb 28, 2008
Save time and money by sustaining compliance between audits. Aberdeen Group's Derek Brink describes the benefits that best in class companies achieve by taking steps to sustain compliance.
Tags : 
compliance, log management, security information management, sim, security event management, sem, siem, network behavior analysis, automated vulnerability management, avm, patch management, configuration management, network access control, nac, pci, pci dss, hipaa, ffiec, cobit, iso 17799
    
Intellitactics
Published By: Interactive Intelligence     Published Date: Apr 23, 2014
In a contact center environment, real-time analytics provide the live information needed to respond to difficult situations before a customer, a sale, or an opportunity is lost. Scott Bakken and David Patchen from MainTrax and Brandon Rowe from Interactive Intelligence discuss how real-time analytics help your business operate at optimal levels and experience increased growth and reduced costs.
Tags : 
interactive intelligence, real time speech analytics, contact centers, data centers, real time analytics, productivity, revenue, retention rates, speech analytics, real time applications
    
Interactive Intelligence
Published By: Jamf     Published Date: Mar 28, 2019
For nearly a decade millions of users have leveraged the windows 7 operating system on their PCs. Today, more than 100-plus million users rely on Windows 7. For these users, a new technology age is coming on January 14, 2020 when Microsoft officially ends extended support for Windows 7. Windows 7 end of life means that Microsoft is no longer required to put out security patches or support the operating system. This is significant news for thousands of security-conscious organizations and 100-plus million Windows 7 users who want to keep their machines and data protected.
Tags : 
    
Jamf
Published By: Jamf     Published Date: Apr 26, 2019
Microsoft is ending extended support for Windows 7 on January 14, 2020 and itís time for companies to make critical technology choices. After nearly a decade, Microsoft will no longer be required to put out security patches or provide support for the Windows 7 operating system (OS).
Tags : 
    
Jamf
Published By: Kaseya     Published Date: Mar 12, 2015
Banks want to use technology to work smarter, better and faster to maintain regulatory compliance, reduce risk and increase productivity. Automated IT systems management is helping them reach those goals in a seamless, efficient manner.
Tags : 
automated management systems, software management, it automation, financial institutions, regulatory compliance, security management, software patches, audit violations
    
Kaseya
Published By: Kaseya     Published Date: May 13, 2015
To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
Kaseya
Published By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with ITís difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isnít done as well as it needs to be.
Tags : 
    
Kaseya
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : 
kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud, virtualization, it administrators, it security, monitoring intrusions, phishing, cybercriminals, system malware, infrastructure, data management, mobile malware, social networks, unpatched application
    
Kaspersky Lab
Published By: Level 3     Published Date: Mar 04, 2016
Itís time to think differently about your network security. Forget the fragmented and reactive approach youíve used in the past with patchwork point solutions under separate IT silos. According to Frost & Sullivanís report, you need a holistic approach to network security.
Tags : 
level 3 communications, frost and sullivan, network security, best practices, isp, malware protection, apt protection
    
Level 3
Published By: List Sotheby's International Realty, Singapore     Published Date: Dec 10, 2018
The cooling measures announced by the government on 5 July threw the residential market into a frenzy. Within a span of five hours, over 1,000 units were sold from three new projects as buyers rushed to beat the midnight deadline to avoid paying the new higher Additional Buyerís Stamp Duty (ABSD) rates. The 1,000 units came from three projects that were launched that night: over 500 units from Riverfront Residences in Hougang, around 300 units from Park Colonial at Potong Pasir and some 200 units from Stirling Residences in Queenstown. For the rest of the quarter, response to new launches was patchy as potential home buyers weigh affordability with opportunity cost. The residential price index edged up by a mere 0.5% q-o-q, a far cry from rises of 3.4% in Q2 and 3.9% in Q1. This moderate price increase shows that the key objective of the cooling measures, which is to achieve a more gradual but sustainable price growth, has been met. Download the full report to Learn more.
Tags : 
    
List Sotheby's International Realty, Singapore
Published By: LogicNow     Published Date: Mar 10, 2016
Layered Security in less than 10 minutes. All from a single, easy to use dashboard. Try MAX free for 30-days!
Tags : 
msp, layerd security, web protection, antivirus, patch management, software, web security, bandwidth
    
LogicNow
Published By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : 
lumension, unix, linux, web 2.0, windows, cve
    
Lumension
Published By: Lumension     Published Date: Nov 19, 2010
Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. Here are four steps to cure your patch management headache.
Tags : 
lumension security, patch management, vulnerability management, risk mitigation, best practices, operating system, patch deployment
    
Lumension
Published By: Lumension     Published Date: Nov 19, 2010
Selecting the Right Solution Can Save Your Company Time and Money.
Tags : 
lumension security, patch management tool
    
Lumension
Published By: Lumension     Published Date: Mar 28, 2011
This paper highlights the four steps organizations should take to automate and streamline the patch management process.
Tags : 
lumension, patch management, patch deployment, vulnerability, risk mitigation, best practices
    
Lumension
Published By: Lumension     Published Date: Mar 29, 2011
Download this Lumension white paper from Web Buyer's Guide to learn more about a new intelligent approach to application whitelisting.
Tags : 
lumension, whitelisting, business intelligence, deployment, malware, automated patch management, security
    
Lumension
Published By: Lumension     Published Date: Mar 30, 2011
Learn how comprehensive patch management and remediation solutions address the entire vulnerability management lifecycle.
Tags : 
lumension, patch management tool, vulnerability management lifecycle, security
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com≠plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
Find out why fixing 3rd-party app vulnerabilities is at the core of IT security-and how to make sure patch management is optimizing your security.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.