IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed    Add to Google    Add to My Yahoo!
OS Security White Papers (View All Report Types)
 
Location Services: Bridging the Physical and Digital Divide
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn how you can take advantages of BLE-based asset tags and BLE-enabled access points to meet the required accuracy and latency demands for enterprise mobile initiatives.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Aruba Networks

Best Practices of Third-Party Software Security
sponsored by Veracode, Inc.
WHITE PAPER: This white paper offers best practices for improving software security across your entire application landscape. Uncover best practices and approaches for securing third-party applications, open source components, and outsourced code.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Veracode, Inc.

The New Economics of Cloud Security
sponsored by Alert Logic
WHITE PAPER: In this white paper, learn the 4 principles of a fully managed Security-as-a-Service (SECaaS) to help protect cloud applications without breaking the bank or compromising customer satisfaction.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Alert Logic

The Three Faces Of Insider Threat
sponsored by Absolute
WHITE PAPER: Insider threats are an extremely challenging IT issue to resolve. In this white paper, uncover how to protect your organization against insider threats.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Absolute

Best-of-Breed Enterprise Mac Management
sponsored by JAMF
WHITE PAPER: Download this white paper to discover a full Mac client management tool built to support the underlying architecture of macOS from the ground up, that gives IT administrators the flexibility to gather inventory data in a way that's extendable and customizable, integrated, actionable and auditable.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

JAMF

The Stakes Have Changed, Have You? 20 Years of DDoS Attacks Targeting Business
sponsored by Arbor Networks
WHITE PAPER: According to the Worldwide Infrastructure Security Report, 93% of survey respondents experienced application layer-attacks and 56% experienced multi-vector DDoS attacks. Inside, learn how DDoS attacks have evolved and changed over time.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Arbor Networks

Securing Office 365 Is Easier Than You Think
sponsored by Palo Alto Networks
WHITE PAPER: SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Enterprise Mobility Platform with Enterprise-Grade Security
sponsored by PowWow
WHITE PAPER: Explore how to accelerate mobile development, connect new apps to third party data sources and APIs, and modernize any enterprise app or workflow. Discover how to leverage existing APIs and containers to design, build, and deploy personalized, intelligent, and secure apps that run anywhere, on any device, and on any OS.
Posted: 16 Feb 2017 | Published: 31 Dec 2016

PowWow

Secure Content Delivery with Amazon CloudFront
sponsored by Amazon Web Services
WHITE PAPER: As companies respond to cybercrime, compliance requirements, and a commitment to securing customer data, their adoption of SSLs and TLSs increases. Gain insight into how you can improve the security and performance of your APIs and applications (hint: Amazon CloudFront) while lowering your content delivery costs.
Posted: 09 Oct 2017 | Published: 30 Nov 2016

Amazon Web Services

Overview of AWS Security - Application Services
sponsored by Amazon Web Services
WHITE PAPER: Amazon Web Services offers a variety of managed services to use with your applications, including services that provide application streaming, queueing, push notification, email delivery, search, and transcoding. Learn more inside.
Posted: 10 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement