Security Patch Management Reports

Improve Your Business through Best Practice IT Management
sponsored by Kaseya
WHITE PAPER: This white paper provides insight on ways that MSPs and IT departments can improve their management of services. Learn how using ITIL best practices with an automated management solution can address a number of the unique challenges these businesses face.
Posted: 08 Oct 2007 | Published: 01 Sep 2007

Kaseya

Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER: By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
Posted: 24 Aug 2012 | Published: 09 Feb 2011

IBM

Tivoli Endpoint Manager: Continuous Compliance in a Distributed World
sponsored by Mainline Information Systems
PRESENTATION TRANSCRIPT: This presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues.
Posted: 17 Jun 2011 | Published: 16 Jun 2011

Mainline Information Systems

Dell KACE K Series Overview
sponsored by Dell KACE
PRODUCT OVERVIEW: This series overview points out the challenges of IT systems management and showcases technologies designed to overcome them. Learn how to simplify hardware and software inventory, patching, and more across your organization.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

Dell KACE

Virtualization Security: Protecting Virtualized Environments
sponsored by TechTarget ComputerWeekly.com
BOOK: This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

TechTarget ComputerWeekly.com

Understanding Advanced Virtualization Security Practices
sponsored by Intel
EBOOK: SearchCloudSecurity.com presents a comprehensive guide to virtualization security. Our experts help you assess and prioritize the risks and threats to virtual environments. You’ll learn what steps you must take to handle secure multitenancy, hypervisor threats and hypervisor protection, and data management service security.
Posted: 19 Aug 2011 | Published: 18 Aug 2011

Intel

Presentation Transcript: Automating Virtual Machine Configuration
sponsored by ePlus Technology
PRESENTATION TRANSCRIPT: Learn the different methods for automating virtual machine configuration in this expert webcast transcript. Edward L. Haletky also reviews the different automation tools available for automating virtual machine installation and patch management.
Posted: 15 May 2009 | Published: 06 May 2009

ePlus Technology

Reinventing the Desktop
sponsored by Pano Logic, Inc
WHITE PAPER: Pano is a solution built specifically for desktop virtualization and it consists of a palm-sized device that connects a user's keyboard, mouse, monitor, and USB.
Posted: 28 Feb 2008 | Published: 01 Jan 2007

Pano Logic, Inc

10 VDI Benefits You Can Achieve Without VDI
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: Discover how you can achieve VDI levels of manageability with traditional PCs in this resource.
Posted: 23 Dec 2011 | Published: 23 Dec 2011

Dell, Inc. and Intel®

Integrated System Management and Support
sponsored by Oracle Corporation
WHITE PAPER: In the typical IT environment, organizations operate in a divided world of systems management and support. IT departments often treat these two fundamental areas as distinct silos causing gaps for IT employees, who spend too much time and manual effort resolving system problems. This creates both higher risks and higher costs for IT.
Posted: 30 Mar 2011 | Published: 22 Mar 2011

Oracle Corporation