RSS feed Get our RSS feed

News by Topic

patch detection

Results 1 - 5 of 5Sort Results By: Published Date | Title | Company Name
By: Shavlik Technologies     Published Date: Apr 19, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
     Shavlik Technologies
By: McAfee     Published Date: Mar 08, 2013
McAfee® Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.
Tags : database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection
     McAfee
By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks
     Lumension
By: Shavlik Technologies     Published Date: Apr 14, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
     Shavlik Technologies
By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : ibm, malware detection, cybercrime prevention, it security solutions, security
     IBM
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics