lumension

Results 51 - 75 of 78Sort Results By: Published Date | Title | Company Name
By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Jan 25, 2012
This white paper presents five very effective ways to improve data security in a cost-effective manner.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Jan 25, 2012
Read this whitepaper to learn the six steps you need to think different about endpoint security.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Jan 11, 2012
Find out why fixing 3rd-party app vulnerabilities is at the core of IT security-and how to make sure patch management is optimizing your security.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Jan 11, 2012
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Jun 10, 2011
Government agencies must protect sensitive data while improving transparency and accessibility-all in the face of rising cyberthreats. Download this free whitepaper to learn how.
Tags : malware, endpoint security, cyberattack, hacker, government security, identity
     Lumension
By: Lumension     Published Date: May 03, 2011
Why fixing third-party application vulnerabilities is at the core of sound government information security-and how to make sure patch management is optimizing your security posture.
Tags : patch management, security, lumension, government security, cyber attack, vulnerability management
     Lumension
By: Lumension     Published Date: Apr 15, 2011
Learn how to effectively secure endpoints with a defense-in-depth approach that includes patch management, anti-virus, application whitelisting and device control.
Tags : malware, endpoint security, anti-virus, data protection, cyberthreat
     Lumension
By: Lumension     Published Date: Mar 30, 2011
Learn how comprehensive patch management and remediation solutions address the entire vulnerability management lifecycle.
Tags : lumension, patch management tool, vulnerability management lifecycle, security
     Lumension
By: Lumension     Published Date: Mar 30, 2011
Download this Lumension white paper from Web Buyer's Guide to learn the best defense against malware is intelligent whitelisting
Tags : lumension, anti-virus software, malware, intelligent whitelisting, blacklisting, point of sale terminal, ecommerce server, atm machine
     Lumension
By: Lumension     Published Date: Mar 30, 2011
Learn how to protect against what comes in your environment via USB in this Lumension white paper from Web Buyer's Guide
Tags : lumension, usb, malware, security, data loss, threat, cybersecurity
     Lumension
By: Lumension     Published Date: Mar 29, 2011
Download this Lumension white paper from Web Buyer's Guide to learn more about a new intelligent approach to application whitelisting.
Tags : lumension, whitelisting, business intelligence, deployment, malware, automated patch management, security
     Lumension
By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft
     Lumension
By: Lumension     Published Date: Mar 28, 2011
This paper highlights the four steps organizations should take to automate and streamline the patch management process.
Tags : lumension, patch management, patch deployment, vulnerability, risk mitigation, best practices
     Lumension
By: Lumension     Published Date: Mar 12, 2011
Studies show that even though most organizations use AV, more and more are succumbing to attacks.
Tags : virus, antivirus, whitelisting, endpoint security
     Lumension
By: Lumension     Published Date: Feb 04, 2011
With cyberattacks inflicting increasingly greater damage following uncontrolled connection, it's time that government organizations got serious about outside threats.
Tags : usb security, network security, patch management, lumension, device management, security
     Lumension
By: Lumension     Published Date: Nov 19, 2010
Finding Ways to Balance IT Risk and Productivity. Learn how to strike a happy balance that allows for the safe use of new technologies - without the risk.
Tags : lumension security, consumerized workforce, it risk, productivity, collaborative, web 2.0 applications, social media platform
     Lumension
By: Lumension     Published Date: Nov 19, 2010
Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. Here are four steps to cure your patch management headache.
Tags : lumension security, patch management, vulnerability management, risk mitigation, best practices, operating system, patch deployment
     Lumension
By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss
     Lumension
By: Lumension     Published Date: Nov 19, 2010
Selecting the Right Solution Can Save Your Company Time and Money.
Tags : lumension security, patch management tool
     Lumension
By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware
     Lumension
By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : cyber security, application security, risk management, third party applications, endpoint security, cyber crime
     Lumension
Start   Previous    1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com