IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflows White Papers (View All Report Types)
 
The Internet of Things: Posing Security Threats and Delivering Beyond Expectations
sponsored by Aruba Networks
WHITE PAPER: Not only are many early adopters struggling to secure IoT devices and apps, but many organizations disagree on what IoT means and how to extract value from it. Discover how different industries define, use, and benefit from IoT by creating "smart workplaces," increasing innovation, enhancing customer experiences, and more.
Posted: 23 Jun 2017 | Published: 31 Mar 2017

Aruba Networks

Manage Risk by Protecting Apps, Data and Usage
sponsored by Citrix
WHITE PAPER: When it comes to securing vulnerabilities, especially in apps, there are 5 best practices you can follow. This white paper provides and overview of how to ensure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

An App - Centric Approach to Mobile Security in Healthcare
sponsored by Blue Cedar
WHITE PAPER: In this brief white paper, learn about a new mobile security suite that makes protecting your devices as simple as downloading one application.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Blue Cedar

Software Asset Management: Critical for Mitigating Non-Compliance Risks
sponsored by Flexera Software
WHITE PAPER: This IDC white paper defines software asset management and emphasizes the factors driving its importance. Uncover best practices for mitigating the risks of inefficient software portfolio management and addressing 3 key priorities, namely app security, cost management, and quality of service.
Posted: 16 Jun 2017 | Published: 28 Feb 2017

Flexera Software

8 Best Practices to Ensure Compliance When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Mitigating the risk shadow IT poses to your company is essential to ensuring compliance when adopting cloud apps and services. Discover 8 best practices that can help you avoid remediation costs, compliance fines, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Symantec & Blue Coat Systems

Five Signs It’s Time for Mobile Workspace Delivery
sponsored by Citrix
WHITE PAPER: Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.
Posted: 25 Aug 2016 | Published: 29 Jul 2016

Citrix

Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

Effectively Balancing DevSecOps
sponsored by Flux7
WHITE PAPER: As app development becomes more agile, security can get left in the dust – and conversely, if security and testing takes too long, it can decelerate the app lifecycle and impede organizational agility. Learn how to enables DevSecOps with security automation for AWS and cloud-based development environments.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Flux7

The Developer's Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Bringing developers and operations staff together under the singular DevOps roof means trying to mesh contradictory approaches, leaving open security concerns. DevSecOps to the rescue! Access this white paper to learn about DevSecOps challenges, best practices, and more!
Posted: 03 May 2017 | Published: 03 May 2017

Veracode, Inc.

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement