IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System SecurityWhite Papers (View All Report Types)
 
Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: This white paper explores the growing world of mobile application development and highlights the benefits of providing security for mobile applications during the development and deployment stages.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

IBM

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Mobile Fraud Trends and Impact
sponsored by iovation, Inc.
WHITE PAPER: Device intelligence uncovers hidden layers of risk in mobile transactions from both web browsers and mobile applications. Get his report to learn more about mobile fraud—risks, insights and priorities.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.

Deployment Best Practices and Guidelines to Deliver any App to Mobile Users
sponsored by Citrix
WHITE PAPER: Explore this resource to learn best practices and guidelines that can help you deliver any corporate app to your mobile users, and allow you to benefit from this increased productivity that will result. Read on now to learn more.
Posted: 01 Aug 2014 | Published: 31 May 2014

Citrix

Five Security Considerations in the Mobile Age
sponsored by IBM
WHITE PAPER: This white paper enumerates five security considerations for enterprises in the mobile age and provides a thorough introduction to enterprise mobile applications.
Posted: 07 Oct 2014 | Published: 31 Dec 2012

IBM

Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

The 10-Minute Guide to Cloud Encryption Gateways
sponsored by CipherCloud
WHITE PAPER: Learn about the innovative solutions that have been developed to address the security concerns regarding business applications in the cloud.
Posted: 03 Sep 2014 | Published: 31 Dec 2013

CipherCloud

Unlock the value of BYOD: Go mobile without sacrificing security
sponsored by IBM
WHITE PAPER: This paper explores how organizations can derive business value in the BYOD era, while still providing a security-rich IT infrastructure and consistent service levels.
Posted: 08 Apr 2014 | Published: 30 Nov 2012

IBM

Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper highlights the challenges associated with rapid data growth when it comes to storage. It also gives the benefits of a software solution that makes recovery and managing snapshots easier and more efficient.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

CommVault Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement