RSS feed Get our RSS feed

News by Topic

lumension

Results 51 - 75 of 78Sort Results By: Published Date | Title | Company Name
By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
     Lumension
By: Lumension     Published Date: Aug 25, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : java, software, security, platform, vulnerability
     Lumension
By: PulseConnect     Published Date: Sep 04, 2012
Inside this collection of insightful case studies, you'll discover how companies like JetBlue, HealthConnect One, InfusionSoft, Lumension and GamersFirst significantly increased revenue and engagement by rethinking their email marketing programs.
Tags : email lists, email subscribers, email marketing, email targeting, case studies, jetblue, healthconnect one, infusionsoft
     PulseConnect
By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
     Lumension
By: Lumension     Published Date: Aug 25, 2014
Advanced Persistent Threat (APT) attacks exploit a single vulnerability and then use that foothold to penetrate more systems and gain access to more corporate information. A recent QuinStreet web seminar, sponsored by Lumension, discussed APT attacks and tactics for preventing them. This paper summarizes the talks given during that web seminar.
Tags : key tactics, apt, attacks, prevention, systems, security
     Lumension
By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Jan 11, 2012
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Jan 08, 2010
The use of portable devices can also potentially infect public systems with malware, inadvertently expose classified information and citizens' personally identifiable information, and otherwise breach the public's trust. Learn how to prevent this breach.
Tags : usb, flash drive, mobile security, pii, personal information, malware, government information security
     Lumension
By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Sep 18, 2012
The True Cost of AV | How to Ensure More Effective and Efficient Endpoint Security
Tags : intelligent white listing, cost, anti-virus
     Lumension
By: Lumension     Published Date: Mar 12, 2011
Studies show that even though most organizations use AV, more and more are succumbing to attacks.
Tags : virus, antivirus, whitelisting, endpoint security
     Lumension
By: Lumension     Published Date: Mar 30, 2011
Download this Lumension white paper from Web Buyer's Guide to learn the best defense against malware is intelligent whitelisting
Tags : lumension, anti-virus software, malware, intelligent whitelisting, blacklisting, point of sale terminal, ecommerce server, atm machine
     Lumension
By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss
     Lumension
By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : secure, ios, android, mobile security, data protection, security
     Lumension
By: Lumension     Published Date: Oct 20, 2014
Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.
Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
     Lumension
By: Lumension     Published Date: Sep 18, 2012
Total Cost of Ownership Comparison: Lumension® VMS vs. Microsoft® WSUS
Tags : vulnerability management, lumension, microsoft, wsus
     Lumension
By: Lumension     Published Date: Feb 04, 2011
With cyberattacks inflicting increasingly greater damage following uncontrolled connection, it's time that government organizations got serious about outside threats.
Tags : usb security, network security, patch management, lumension, device management, security
     Lumension
By: Lumension     Published Date: Mar 30, 2011
Learn how to protect against what comes in your environment via USB in this Lumension white paper from Web Buyer's Guide
Tags : lumension, usb, malware, security, data loss, threat, cybersecurity
     Lumension
By: Lumension     Published Date: Sep 18, 2012
A Technical Paper on Lumension Intelligent Whitelisting
Tags : intelligent white listing, lumension, malware, endpoint
     Lumension
By: Lumension     Published Date: Sep 18, 2012
Using Intelligent Whitelisting to Effectively and Efficiently Combat Today's Endpoint Malware.
Tags : intelligent white listing, webcast, malware, windows security
     Lumension
By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Oct 20, 2014
Sit in on an expert panel discussion about the concerns of cyber security for businesses.
Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
     Lumension
By: Lumension     Published Date: Mar 30, 2011
Learn how comprehensive patch management and remediation solutions address the entire vulnerability management lifecycle.
Tags : lumension, patch management tool, vulnerability management lifecycle, security
     Lumension
By: Lumension     Published Date: Sep 18, 2012
Windows 7 AppLocker | Understanding its Capabilities and Limitations
Tags : intelligent white listing, limitations, lumension, windows 7 applocker
     Lumension
Start   Previous    1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics