IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed    Add to Google    Add to My Yahoo!
OS Security White Papers (View All Report Types)
 
Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Fighting Emerging Cyber-Attacks with a Holistic Security Architecture
sponsored by Radware
WHITE PAPER: This white paper outlines a holistic security architecture strategy designed to fight complex and dynamic attack campaigns. Access now to learn how to explore four attack cases and how to defend against them.
Posted: 31 Mar 2015 | Published: 09 Apr 2014

Radware

Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Manage Your Enterprise Apps Securely
sponsored by IBM
WHITE PAPER: Access this brief white paper to learn how you can ensure mobile app security with a mobile application management (MAM) solution.
Posted: 06 Jul 2015 | Published: 13 May 2015

IBM

Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

IBM

Mobility-as-a-Service: See What's New in Workforce Mobility
sponsored by Sprint
WHITE PAPER: High device prices and complex management requirements can fall short when you're in the process of rethinking your mobility. This white paper examines a new mobility-as-a-service platform. Read on to learn how you can receive new and improved wireless service benefits.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

Sprint

Re-Thinking Your Data Flow Transmission for Security Risk and Compliance
sponsored by Axway
WHITE PAPER: In this white paper, discover why it's best to ditch file transfer protocol-based and personal file sync and share tools that increase risk for a data breach. Access now and discover how a managed file transfer approach offers modern, secure data flow transmission.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Axway

Automating Defenses Against Increasingly Sophisticated Attacks
sponsored by Radware
WHITE PAPER: In this white paper, you'll learn about the recent developments in DDoS attacks and how you can protect your valuable data from sophisticated cyber-criminals.
Posted: 01 Apr 2015 | Published: 21 Nov 2014

Radware

The Impact of Data Breaches: Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement