patching

Results 26 - 43 of 43Sort Results By: Published Date | Title | Company Name
By: Secunia     Published Date: Oct 12, 2011
This paper discusses the vulnerable components of SCADA systems based on analysis from Secunia while verifying the reported reported vulnerabilities.
Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
     Secunia
By: GFI Software     Published Date: Apr 05, 2011
GFI LANguard provides a complete network security overview with minimal administrative effort. Why use GFI LANguard? Download this free trial to experience the benefits!
Tags : gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching
     GFI Software
By: Shavlik Technologies     Published Date: Apr 14, 2011
How can an organization manage both their physical environment and their virtual environment without doubling up on the work, missing critical patches on offline virtual machines, or even missing patches on the virtual machines they are not even aware of?
Tags : shavlik, patch management, virtual machine, physical, network patching, lifecycle management, attack, risk
     Shavlik Technologies
By: IBM Corporation     Published Date: Jun 30, 2011
The demonstrations included in this menu interface show how IBM Tivoli Provisioning Manager solutions can help you manage the complete life cycle of your data center and distributed resources from initial provisioning to patching and configuration maintenance to resource re-purposing or end of life.
Tags : energy management, tivoli, disaster prevention, infrastructure, bms, building management system, ecosystem, opc, power and cost savings, energy optimization
     IBM Corporation
By: Intel     Published Date: Aug 10, 2012
CoreT vProT processors helps IT deliver off-hour patching and repairs by remotely power cycle client PCs to enable a greener energy management.
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, enterprise applications, data management
     Intel
By: Qualys     Published Date: Nov 05, 2013
Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process. This white paper describes an approach to patch management that allows you to prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied. Also inside, find ten steps to improve patching – read on to learn more.
Tags : qualys, qualysguard, security, patch acceleration, vulnerability, vulnerability management, robustness, patching system, patching vulnerabilities, remediation, cloud platform, patching, patch report, it infastructure
     Qualys
By: Alert Logic     Published Date: Jun 12, 2014
New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!
Tags : cloud security, vulnerability management, vulnerabilities, patching, patch management, security, it management
     Alert Logic
By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking, security, https, web application security, web application scanning, web application testing, web app, web application threats, web application risks, network scanning, network scan, network auditing, scanning
     Qualys
By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : ibm, malware detection, cybercrime prevention, it security solutions, security, enterprise applications
     IBM
By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
     IBM
By: Trend Micro     Published Date: Oct 12, 2012
This special report, commissioned by Trend Micro, reinforces the security and operational cost savings of host-based virtual patching with the Deep Security and OfficeScan products
Tags : infomation security, software costs, trend micro, security
     Trend Micro
By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : lumension, unix, linux, web 2.0, windows, cve
     Lumension
By: Blue Lane     Published Date: Apr 03, 2007
One of the biggest challenges mirrors a problem in the physical server world: security patching. This paper describes in greater detail the benefits and challenges of server virtualization, and offers insight into how Blue Lane customers are utilizing the PatchPoint(r) System to combat the threat of software vulnerabilities.
Tags : virtualization, patching, security, vmware, network security, blue lane, patchpoint, server virtualization, patch management, servers
     Blue Lane
By: Blue Lane     Published Date: Apr 03, 2007
Andreas Antonopoulos, SVP & Founding Partner of Nemertes Research, discusses the challenges of securing the new virtual datacenter.
Tags : virtualization, datacenter, security, vulnerability, vmware, virtualshield, security, patching, blue lane, vulnerability management, server virtualization, patch management
     Blue Lane
Previous    1 2     Next   
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com