IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed    Add to Google    Add to My Yahoo!
OS Security White Papers (View All Report Types)
 
ActivID Authentication Appliance for Enterprise
sponsored by HID Global
WHITE PAPER: While it's a necessity to provide employees, contractors, partners, and customers anytime, anywhere access to appropriate resources, it's also imperative that enterprises are able to maintain their security. Take a look at this white paper to reveal an authentication platform that can help you deliver access to the right users at the right time.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID Global

Top 3 Ways HyperScale for OpenStack Protects your Applications and Data
sponsored by Veritas
WHITE PAPER: Ensuring adequate data protection is critical before placing workloads (and the corresponding data that they operate upon) into production. This tip sheet outlines the 3 ways in which Veritas HyperScale for OpenStack keeps your applications and data safe.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veritas

Deploying Java EE apps in cloud and container environments
sponsored by Red Hat
WHITE PAPER: Competitive companies are turning to DevOps, microservices, and containers to get the most from their Java apps. In this white paper, learn about Red Hat's fully-certified Java EE 7 application platform and how it was designed to be flexible enough to manage all these emerging priorities.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Red Hat

The State of Security for In-Production Web Applications
sponsored by tCell
WHITE PAPER: In both the 2016 and 2017 Verizon Data Breach Investigations Reports, web application attacks are listed as the number one breach method, by far. Explore this white paper to gain insight into specific web app attacks, including third-party libraries, account takeovers, and more.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

tCell

Securing Office 365 Is Easier Than You Think
sponsored by Palo Alto Networks
WHITE PAPER: SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

The Agile Security Manifesto
sponsored by Synopsys
WHITE PAPER: Find out how to achieve continuous integration/continuous deployment (CI/CD) safely and securely with the 4 principles of building app security into Agile development.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

Synopsys

A Strategic Approach to Web Application Security
sponsored by Whitehat Securities
WHITE PAPER: App vulnerabilities originate with the source code, and you'll want to secure more of your source code in both development and production. But it's easier said than done for security pros to review source code continuously.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Take Your App Development Strategy to the Cloud
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Learn about the Oracle Cloud and find out how you can modernize app development in hybrid cloud environments without sacrificing IT security or control over critical data or business processes.
Posted: 09 Jan 2018 | Published: 31 Dec 2017

Oracle Corporation UK Ltd

The Application Delivery Controller: Top 10 Checklist
sponsored by A10 Networks
WHITE PAPER: Access this checklist to uncover 10 capabilities that will allow you to take advantage of secured applications across the enterprise.
Posted: 25 Jan 2016 | Published: 30 Nov 2015

A10 Networks

Don't Let your Cloud-First Strategy Get Stuck in Traffic
sponsored by Verizon
WHITE PAPER: In this white paper, learn how to overcome SaaS challenges to help build a cloud-first network that fits your business needs.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

Verizon
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement