TITLE

SECURITYPROFILING ADDS SOLARIS/LINUX SUPPORT TO SYSUPDATE

PUB. DATE
May 2003
SOURCE
UNIX Update;May2003, Vol. 14 Issue 5, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
States that SecurityProfiling Inc. has released the SysUpdate 4.0, an intelligent patch management and vulnerability remediation application built on the company's anti-vulnerability technology.
ACCESSION #
9668351

 

Related Articles

  • SECURITYPROFILING'S MPR TECHNOLOGY PROTECTS NETWORKS.  // Networks Update;Oct2003, pN.PAG 

    Presents information on the Multiple Path Remediation (MPR) network vulnerability remediation system unveiled by SecurityProfiling Inc. Options available to network managers using the MPR system; Discussion on the automated nature of the system; Components of the MPR platform.

  • SECURITYPROFILING UPGRADES SYSUPDATE PATCH MANAGEMENT.  // Computer Security Update;May2003, p3 

    SecurityProfiling Inc., the Lafayette, Indiana-based company, has released SysUpdate 4.0, an of its intelligent patch management and vulnerability remediation solution, and the first application built on the company's exclusive anti-vulnerability technology platform. It includes an enhanced...

  • SysUpdate Policy Compliance and Enforcement.  // SC Magazine: For IT Security Professionals (UK Edition);Apr2004, p55 

    This article reviews the SysUpdate Policy Compliance and Enforcement software from Security Profiling. This is a standalone, policy-driven patch management and vulnerability remediation package. The system requires a dedicated Windows server to support up to 10,000 clients. The process has...

  • Patch combo needs work. Garcia, Andrew // eWeek;1/12/2004, Vol. 21 Issue 2, p58 

    Security Profiling Inc.'s SysUpdate 4.1.4.4 and Policy Compliance & Enforcement 1.0 module promise IT administrators one-stop patch and security policy remediation across the enterprise. However, despite decent multiplatform support and some nice features, tests showed the SysUpdate PC & E...

  • Security Profling product offers interesting approach, but lacks polish. Andress, Mandy // Network World;1/26/2004, Vol. 21 Issue 4, p54 

    Presents an update on SecurityProfiling's SysUpdate 4.1.4. Highlights of its new Policy Compliance and Enforcement Module 1.0; Importance of the immediate correction of discrepancies; Concept of Multiple Path Remediation (MRR); Mode of operation of SysUpdate; Role of the patch-reporting...

  • Helpful tips to keep business computers safe from hackers. Freudenberg, Paul // Business Journal Serving Fresno & the Central San Joaquin Valley;01/19/98, Issue 322253, p23 

    Opinion. Offers insights on preventing hackers from intruding into the confidential data stored in computers of business enterprises. Use of firewalls; Use of cryptic phrases that combine uppercase and lowercase letters as passwords; Inclusion of add-on encryption schemes to computers.

  • Businesses ignore computer security.  // Internal Auditor;Jun96, Vol. 53 Issue 3, p11 

    Reports that organizations in North America and Europe are neglecting computer security. Ignorance of British finance directors about computer security issues; Computer-related theft in Great Britain; Other findings in a KPMG survey of senior-level finance executives.

  • Computer security: It's best to lock it, pocket the key. Ellingson, Dave // Las Vegas Business Press;2/27/95, Vol. 12 Issue 8, p18 

    Discusses how managers can ensure computer security. Netscape's installation of security measures to protect transmission of credit card numbers; Proposed legislation on computer security.

  • You're a what? Data security analyst. Mariani, Matthew // Occupational Outlook Quarterly;Summer94, Vol. 38 Issue 2, p39 

    Describes the job of a data security analyst using Jamie Jeffers of Fannie Mae as an example. How the data security analyst acts as a data detective; Protecting computer data systems from having information stolen or altered without permission; Jamie's background with computers.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics