patch management

Results 1 - 25 of 106Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: May 08, 2019
What if your database could install, manage, secure, and upgrade itself—with little or no manual administration required? Now it’s possible, thanks to machine learning, artificial intelligence and the power of the cloud. Discover how the Oracle Autonomous Database is: • Self-driving: Tell it the service level you want to achieve, and it does the rest. • Self-securing: It installs patches automatically and uses AI to counter threats. • Self-repairing: It patches, scales, and tunes itself while your operations are running, to deliver 99.995% uptime. Discover the power of autonomous data management. Download now.
Tags : 
     Oracle
By: Rubrik EMEA     Published Date: Apr 15, 2019
Backup and recovery needs a radical rethink. When today’s incumbent solutions were designed over a decade ago, IT environments were exploding, heterogeneity was increasing, and backup was the protection of last resort. The goal was to provide a low cost insurance policy for data, and to support this increasingly complex multi-tier, heterogeneous environment. The answer was to patch together backup and recovery solutions under a common vendor management framework and to minimize costs by moving data across the infrastructure or media.
Tags : data, backup, recovery, virtualization, solutions, cloud, architectures
     Rubrik EMEA
By: Flexera     Published Date: Sep 16, 2016
Download this white paper to learn more about these three steps to securing software patches: Play to strengths and know your weaknesses Prioritize for Bottom Line Value Design a Process to Support Desired Outcomes
Tags : software patch, patch management, third-party patching, software vulnerability management, vulnerability intelligence, enterprise risk, flexera, risk reduction
     Flexera
By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : cyber defenses, threat actors, it security, security analytics, application security, firewalls, hacker detection, security management, vulnerability management
     Arbor
By: IBM Tivoli     Published Date: Dec 13, 2010
Application exploits are on the rise. And yet industry experts are reporting that most organizations are still not adequately keeping up with security patches for their operating systems, much less their applications. One of the most effective ways to protect against application exploits is to implement security patches within 48 hours of release across your entire organization. Sound impossible?
Tags : ibm, tivoli, application management, patch management, best practices, roi
     IBM Tivoli
By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with IT’s difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isn’t done as well as it needs to be.
Tags : 
     Kaseya
By: Blue Lane     Published Date: Apr 03, 2007
Find out how Blue Lane's unique approach can help health care IT pros quickly secure hard to patch servers.
Tags : ips, intrusion, patching, vulnerability, regulations, fda, security, hipaa, healthcare, blue lane, patchpoint, compliance, intrusion prevention, hipaa compliance, vulnerability management, patch management
     Blue Lane
By: BMC ESM     Published Date: Nov 06, 2009
BMC helped the Dell IT group to consolidate job scheduling and job monitoring within a single dashboard, reduce by 75 percent the number of IT administrators needed for patch management, and accelerate trouble-ticket resolution with automation. Watch the customer video.
Tags : bsm esm, dell it, automation, consolidation, configuration management, storage virtualization, business process automation, server virtualization
     BMC ESM
By: BMC ESM     Published Date: Nov 06, 2009
As you know, automation is a critical component in achieving long-term IT savings. We've compiled a few resources to give you an overview of the benefits of service automation and the technology behind our comprehensive solution.
Tags : bsm esm, service automation, business service management, roi, configuration management, patch management, server, auditing, business process automation, return on investment, service management
     BMC ESM
By: LogicNow     Published Date: Mar 10, 2016
Layered Security in less than 10 minutes. All from a single, easy to use dashboard. Try MAX free for 30-days!
Tags : msp, layerd security, web protection, antivirus, patch management, software, web security, bandwidth, security, it management, enterprise applications, data management
     LogicNow
By: Shavlik Technologies     Published Date: Apr 19, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security, anti virus, internet security, intrusion detection
     Shavlik Technologies
By: McAfee     Published Date: Jan 23, 2013
Vulnerabilities lead to risk exposure and downtime. Protect your critical assets with virtual patching.
Tags : virtual patching, network breaches, critical patches, software patches, change management, anti spam, anti spyware, network security appliance, patch management
     McAfee
By: McAfee     Published Date: Jan 23, 2013
As long as there is software, there will be software vulnerabilities and you will find malware and cybercriminals. This paper will examine that risk and provide a step by step process to protect your companies critical assets.
Tags : virtual patching, change management, mcafee network security platform, mcafee vulnerability manager, mcafee global threat intelligence, mcafee risk advisor, mcafee epo, security, it management, data management
     McAfee
By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor, mcafee enterprise security manager, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, compliance, identity management, internet security, intrusion detection
     McAfee
By: McAfee     Published Date: Mar 08, 2013
McAfee® Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.
Tags : database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection, access control, anti spyware, anti virus, application security, auditing, business continuity, compliance, disaster recovery, encryption, hacker detection, internet security, intrusion detection, intrusion prevention
     McAfee
By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, disaster recovery, email security
     McAfee
By: Shavlik Technologies     Published Date: Dec 14, 2010
Norway MSP chooses Shavlik to improve efficiencies in patch management and within a week regains stability, lost weekends and peace of mind.
Tags : shavlik security, patch management, network stability, deployment, netchk protect, automation, roi, network security appliance, business process automation, return on investment
     Shavlik Technologies
By: Shavlik Technologies     Published Date: Dec 14, 2010
Whalen Furniture needed an improved patch management solution that was more efficient, less time consuming, reduced risk, and ensured uptime on a 24/7 basis to support the needs of a rapidly growing global company.
Tags : shavlik security, system protection, automated patch management, risk, antivirus, patch deployment, manufacturing, anti virus, patch management, business process automation, risk management, data protection
     Shavlik Technologies
By: Shavlik Technologies     Published Date: Dec 15, 2010
Through its business relationship with HP, PZ Cussons utilises Shavlik NetChk Protect to simplify and automate the patch management process. View the list of benefits.
Tags : shavlik, pz cussons, automation, patch management process, customer delivery services, centralised management, patch management, business process automation, customer service
     Shavlik Technologies
By: Shavlik Technologies     Published Date: Dec 15, 2010
Patch Plus makes managing IT assets fast, easy, and automatic, reducing time to value from months to minutes.
Tags : shavlik, patch plus, automation, it asset, virtualization, netchk console, unified management, patch management, storage virtualization, business process automation, server virtualization
     Shavlik Technologies
By: Shavlik Technologies     Published Date: Dec 15, 2010
Fortunately, Shavlik Technologies takes the sting out of the patch management process, while at the same time accelerating and continuously improving security and compliance readiness.
Tags : shavlik, patch management, security vulnerabilities, compliance, networking, automation, network security, network security appliance, business process automation, vulnerability management
     Shavlik Technologies
By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
     Secunia
By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
     Secunia
Start   Previous   1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.