Software Patch Management Reports

Cyber Attacks on the Rise: IBM 2007 Report
sponsored by IBM
WHITE PAPER: This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
Posted: 19 Nov 2007 | Published: 01 Aug 2007

IBM

Best Practices in Lifecycle Management: Comparing Suites from Dell KACE, Symantec, LANDesk, and Microsoft
sponsored by Dell KACE
WHITE PAPER: This white paper points out the challenges of selecting a lifecycle management tool and presents a comparison of various technologies on the market. Explore 45 key features across seven areas, including discovery, inventory, asset management, and more.
Posted: 08 Aug 2011 | Published: 01 Jan 2011

Dell KACE

Dell KACE K Series Overview
sponsored by Dell KACE
PRODUCT OVERVIEW: This series overview points out the challenges of IT systems management and showcases technologies designed to overcome them. Learn how to simplify hardware and software inventory, patching, and more across your organization.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

Dell KACE

Five tips to reduce risk from modern web threats
sponsored by Sophos
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos

Booz Allen Hamilton: Securing the Mobile Enterprise & Ensuring Compliance
sponsored by Lumension
CASE STUDY: Booz Allen Hamilton has incorporated Lumension Security's PatchLink Update into their automated patch management system. With PatchLink Update, the IT team no longer has to inspect each laptop, making it much more efficient and cost effective.
Posted: 07 Feb 2008 | Published: 01 Jan 2007

Lumension

Guide: Desktop Authority
sponsored by ScriptLogic Corporation
WHITE PAPER: Desktop Authority comprehensively manages the Windows desktop throughout the desktop lifecycle, reducing the total cost of desktop and application ownership.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Patching of Oracle Databases in SAP Environments using Oracle Enterprise Manager
sponsored by Oracle Corporation
WHITE PAPER: This white paper explains how you can automate the patching task for your database, significantly reducing time and effort normally involved in the manual patching activity.
Posted: 13 Jan 2010 | Published: 25 Jul 2009

Oracle Corporation

Integrated System Management and Support
sponsored by Oracle Corporation
WHITE PAPER: In the typical IT environment, organizations operate in a divided world of systems management and support. IT departments often treat these two fundamental areas as distinct silos causing gaps for IT employees, who spend too much time and manual effort resolving system problems. This creates both higher risks and higher costs for IT.
Posted: 30 Mar 2011 | Published: 22 Mar 2011

Oracle Corporation

Presentation Transcript: Automating Virtual Machine Configuration
sponsored by ePlus Technology
PRESENTATION TRANSCRIPT: Learn the different methods for automating virtual machine configuration in this expert webcast transcript. Edward L. Haletky also reviews the different automation tools available for automating virtual machine installation and patch management.
Posted: 15 May 2009 | Published: 06 May 2009

ePlus Technology

E-Book: Technical Guide on Vulnerability Management
sponsored by TechTarget Security
EBOOK: SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
Posted: 03 Jun 2010 | Published: 03 Jun 2010

TechTarget Security