RSS feed Get our RSS feed

News by Topic

lumension

Results 26 - 50 of 78Sort Results By: Published Date | Title | Company Name
By: Lumension     Published Date: Jan 22, 2013
Find out from Derek Brink at Aberdeen Group how their latest research confirms – and quantifies – the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control
     Lumension
By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks
     Lumension
By: Lumension     Published Date: Jan 22, 2013
In this fast-paced webinar, I’ll look at everything that’s new as far as security in Windows 8, with a special focus on mobility.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile
     Lumension
By: Lumension     Published Date: Sep 18, 2012
Beyond Compliance: Combating Threats with Endpoint Configuration Management
Tags : suite, endpoint configuration, threats, compliance, lumension
     Lumension
By: Lumension     Published Date: Sep 18, 2012
This document provides a best practice process guide for administrators implementing L.E.M.S.S.: Application Control.
Tags : application control, lumension, l.e.m.s.s
     Lumension
By: Lumension     Published Date: Sep 18, 2012
This document provides a best practice process guide for administrators implementing the L.E.M.S.S. Device Control module.
Tags : device control, l.e.m.s.s, best practices, lumension
     Lumension
By: Lumension     Published Date: Sep 18, 2012
With the sophistication and sheer volume of exploits targeting major applications and operating systems.
Tags : vulnerability management, lumension, best practices, patch management
     Lumension
By: Lumension     Published Date: Sep 18, 2012
Total Cost of Ownership Comparison: Lumension® VMS vs. Microsoft® WSUS
Tags : vulnerability management, lumension, microsoft, wsus
     Lumension
By: Lumension     Published Date: Sep 18, 2012
A Technical Paper on Lumension Intelligent Whitelisting
Tags : intelligent white listing, lumension, malware, endpoint
     Lumension
By: Lumension     Published Date: Sep 18, 2012
The True Cost of AV | How to Ensure More Effective and Efficient Endpoint Security
Tags : intelligent white listing, cost, anti-virus
     Lumension
By: Lumension     Published Date: Sep 18, 2012
Using Intelligent Whitelisting to Effectively and Efficiently Combat Today's Endpoint Malware.
Tags : intelligent white listing, webcast, malware, windows security
     Lumension
By: Lumension     Published Date: Sep 18, 2012
Endpoint Device Control in Windows 7 and Beyond
Tags : device control, enpoint device, windows 7, lumension
     Lumension
By: Lumension     Published Date: Sep 18, 2012
Windows 7 AppLocker | Understanding its Capabilities and Limitations
Tags : intelligent white listing, limitations, lumension, windows 7 applocker
     Lumension
By: Lumension     Published Date: Feb 07, 2014
In this best practice guide, we are going to take a deep dive into a best practice process for patch and vulnerability management, developed by Lumension over thousands of customer engagements.
Tags : lumension, agent maintenance, value and risk, patch management, microsoft’s patch tuesday, it tasks, remediation process, endpoint management and security suite
     Lumension
By: Lumension     Published Date: Feb 07, 2014
Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.
Tags : lumension, server performance, server security, application control, anti-virus solutions, endpoints, application control solution, malware
     Lumension
By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
     Lumension
By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
     Lumension
By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
     Lumension
By: Lumension     Published Date: Oct 20, 2014
Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.
Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
     Lumension
By: Lumension     Published Date: Oct 20, 2014
Sit in on an expert panel discussion about the concerns of cyber security for businesses.
Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
     Lumension
By: Lumension     Published Date: Oct 20, 2014
"Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli
Tags : java, insecurity, vulverabilities, computing, security
     Lumension
By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : secure, ios, android, mobile security, data protection, security
     Lumension
By: Lumension     Published Date: Aug 25, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : java, software, security, platform, vulnerability
     Lumension
By: Lumension     Published Date: Aug 25, 2014
Advanced Persistent Threat (APT) attacks exploit a single vulnerability and then use that foothold to penetrate more systems and gain access to more corporate information. A recent QuinStreet web seminar, sponsored by Lumension, discussed APT attacks and tactics for preventing them. This paper summarizes the talks given during that web seminar.
Tags : key tactics, apt, attacks, prevention, systems, security
     Lumension
By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : server, security, anti-virus, endpoint security
     Lumension
Start   Previous    1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics