IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System Security White Papers (View All Report Types)
Mobile is the New Playground for Thieves: How to Protect Against Mobile Malware
sponsored by IBM
WHITE PAPER: In this white paper, you'll uncover how to move towards a proactive mobile security strategy to detect, analyze, and remediate today's mobile threats.
Posted: 12 Aug 2015 | Published: 13 Jul 2015


Building a Web Application Security Program
sponsored by Qualys
WHITE PAPER: This white paper details how to build a pragmatic web application security program that provides effective security. View now to review the top 12 web app security weak points.
Posted: 12 Oct 2015 | Published: 09 Mar 2009


Mobilize Your Enterprise Applications without the Hassle of Upgrading
sponsored by StarMobile
WHITE PAPER: In this white paper, you will discover how to transform your enterprise applications without costly upgrades and for use on any endpoint. Learn how to mobilize your legacy apps at a fast, simple, and economic pace, and without modifying them at the source code level.
Posted: 22 Oct 2015 | Published: 22 Oct 2015


Cloud-Enabled Productivity and the Continuity of Enterprise Content
sponsored by BlackBerry
WHITE PAPER: Learn how to transform your mobile fluidity into productivity for your organization and easily safeguard your corporate data as it flows across multiple mobile endpoints, as well as examine a mobile content sharing system.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 01 Oct 2015 | Published: 06 Jul 2015

WhiteHat Security

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by WhiteHat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to test your web apps' functions independently, automatically detect the presence of common nonce frameworks, and more.
Posted: 01 Oct 2015 | Published: 31 Dec 2013

WhiteHat Security

CISOs' Guide to Enabling a Cloud Security Strategy: Focus on SaaS
sponsored by IBM
WHITE PAPER: This analyst report covers key reasons why you should put SaaS first in your cloud security strategy. Access now and discover 15 ways you can get started.
Posted: 10 Nov 2015 | Published: 30 Oct 2015


Solving the App Gap to Ensure Enterprise Mobility Success
sponsored by StarMobile
WHITE PAPER: This white paper explains how to solve the "app gap" that exists between application virtualization and endpoint security in a largely BYOD world. Learn about three emerging technologies that aim to solve these mobile enterprise limitations.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


FICO and Red Hat Seed the Cloud with Enterprise Innovations
sponsored by Red Hat
WHITE PAPER: Platform-as-a-service tools have become the market's leading solution for business rules management. This white paper examines a new and emerging PaaS cloud computing solution (one of which features promises any time, on-demand access to a full-service cloud-based application platform). Read on here to learn about receiving the following benefits.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

Building the Business Case for Modern Access Management
sponsored by Ping Identity Corporation
WHITE PAPER: Discover the 4 questions you need to consider when building your IAM strategy to protect users, customers, third-parties, and sensitive data.
Posted: 22 Oct 2015 | Published: 07 Oct 2015

Ping Identity Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement