IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed    Add to Google    Add to My Yahoo!
OS Security White Papers (View All Report Types)
 
Case Study: Defending Mobile Apps from Attacks
sponsored by Arxan
WHITE PAPER: Discover how a leading medical device manufacturer hardened their application protection strategy to allow physicians to securely read and monitor patient data, as well as securely control medical devices using mobile applications. Learn how you can gain similar security benefits for your own applications.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

Arxan

10 REASONS TO TEST, NOT GUESS
sponsored by Trustwave
WHITE PAPER: This infographic gives you 10 reasons you should test, not guess the strength of your security. Create a testing plan based on these 10 reasons and strengthen your security posture through more informed decision making.
Posted: 21 Jul 2016 | Published: 31 Dec 2015

Trustwave

Turn iOS, Android or BlackBerry Devices into Security Tokens
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn about two-factor user authentication by leveraging passwords and users' devices. Access now and learn how to reduce associated operational costs and increase productivity with a modern authentication system.
Posted: 18 Apr 2016 | Published: 02 Mar 2016

BlackBerry

When App is the Business, the Business is the App Vol. 3
sponsored by IBM MaaS360
WHITE PAPER: IT needs to support each step in planning and developing apps to help ensure security throughout the app lifecycle. Learn the key security dangers of mobile apps in the enterprise and find out how to eliminate them in your app-driven business.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

Strategies for Successfully Managing Privileged Accounts
sponsored by One Identity
WHITE PAPER: The problem with many PAM programs is that they address only one or two of the underlying issues, leaving your organization insecure. Is your privileged identify management program on the right path? Sanity check inside.
Posted: 05 May 2016 | Published: 31 Dec 2015

One Identity

Application Security: Evaluate Leading Testing Vendors
sponsored by IBM
WHITE PAPER: This Gartner resource compares 19 leading application security testing solution vendors, revealing the strengths and weaknesses of each one. View now and discover how the vendors performed in areas like product quality, sales execution and pricing, and customer experience.
Posted: 11 Mar 2016 | Published: 06 Aug 2015

IBM

Developing Secure Embedded Software: Quality Doesn't Equal Security
sponsored by Programming Research
WHITE PAPER: This white paper debunks 4 common misconceptions about software security and describes a variety of tools to improve embedded software security by detecting issues earlier on in development. Learn about the benefits of strategies like risk and threat management, application lifecycle management, static code analysis, and more.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

Comparing App Security Strategies: WAFs vs. RASP
sponsored by IMMUNIO, Inc.
WHITE PAPER: Examine the current threat landscape for web applications and the approaches you should take to secure those applications. Uncover a comparison of one of the most common approaches – Web Application Firewalls (WAFs) - with the most recent addition to the application protection arsenal, Run-Time Application Self-Protection (RASP).
Posted: 16 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

Mobilize Your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Higher Education Network Security: Satisfying Today's Bandwidth-Hungry Students
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a strategy that helped a leading higher education institution protect their network without slowing it down or affecting availability. Learn about benefits like in-depth visibility and reporting of network activities, identity-centric authentication for device security, and much more.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement