IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflows White Papers (View All Report Types)
 
6 Questions to Keep You Grounded in the Cloud
sponsored by Dell, Inc.
WHITE PAPER: This helpful white paper provides a list of 6 questions that you should always ask in the course of comparing cloud service providers.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Dell, Inc.

Application Usage and Threat Report
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive white paper offers a look at key findings with common sharing applications and why they are mostly used by hackers as a delivery system for cybercrime and theft. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Palo Alto Networks

Managing Identity as the New Perimeter
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides a comprehensive overview of how mobility and virtualization trends are impacting identity and access management (IAM), what solutions are available to address potential challenges, and how to future-proof your identity management strategy for any business scenario.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

Ping Identity Corporation

It's Time to Get Serious About Protecting Sensitive Data in Transit
sponsored by Certes Networks
WHITE PAPER: This white paper explains why it's long past time to get serious about protecting your sensitive data as it travels across networks, and also lists 3 steps that you can take to avoid being a hacking statistic in 2015.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

Certes Networks

Gauntlet Case Study
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to find out what happened when 367 people participated in a liver server exploitation exercise that ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.
Posted: 04 Sep 2014 | Published: 04 Dec 2013

CloudPassage

The Security Value of a Dozen Next Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.
Posted: 18 Feb 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

Eight DevOps Practices that are Key to Success
sponsored by IBM
WHITE PAPER: Read this informative white paper from Forrester to uncover the top 8 DevOps practices that are key to success.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

IBM

Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Defend web properties from modern threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Check out this white paper to discover the challenges of defending modern web properties from modern threats, as well as an application delivery controller (ADC) that works hand in hand with advanced malware protection and high-profile security products.
Posted: 16 Dec 2014 | Published: 31 Dec 2013

Citrix

Heighten Security and Improve Availability With an Application Delivery Solution
sponsored by Citrix
WHITE PAPER: Find out which application virtualization and delivery solutions are capable of working together to provide you with both high availability and stellar security.
Posted: 20 Jun 2014 | Published: 31 Dec 2010

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement