IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer OverflowsWhite Papers (View All Report Types)
 
Consolidating Remote Servers and Storage for Security, Efficiency
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Access this white paper to find out how to decouple storage from its server over any distance and be available as if it were local to applications at the edge in remote offices.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Riverbed Technology, Inc.

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: This white paper reveals why mobile application security is crucial element of your business.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

CA Technologies.

Adopting Strong Authentication and SSO in the Cloud
sponsored by SecureAuth
WHITE PAPER: In this white paper, discover the history behind Office 365 and where it currently stands today. Read on to find out why Microsoft is dealing with security risks and an authentication solution they used to protect the identity of mobile users.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Harnessing the tyranny of autonomy: the Dropbox problem and the manager’s dilemma
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to discover whether your employees should be able to share information that improves productivity, or if it should be tightly controlled for privacy and security purposes
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IntraLinks, Inc

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

APIs, Mobile Apps, and the Enterprise: Teaming Up for Better Consumer Health
sponsored by Intel® Services
WHITE PAPER: While people are ready to buy and use technology for health benefits, some organizations are slow to take advantage of mobile technologies due to concerns about sharing sensitive data. This exclusive paper overviews how businesses and health organizations are using APIs to provide better patient and consumer experiences.
Posted: 19 Sep 2014 | Published: 31 May 2014

Intel® Services

2013 Threat Report
sponsored by Dell Software
WHITE PAPER: This report extensively details and categorizes recent global trends in network threats.
Posted: 19 Aug 2014 | Published: 23 Jan 2014

Dell Software

Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper highlights the challenges associated with rapid data growth when it comes to storage. It also gives the benefits of a software solution that makes recovery and managing snapshots easier and more efficient.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

CommVault Systems, Inc.

Design, Deploy, and Manage a DDoS Protection Architecture
sponsored by F5 Networks
WHITE PAPER: An increasing number of Distributed Denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS.
Posted: 31 Mar 2014 | Published: 30 Nov 2013

F5 Networks

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement