IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System SecurityWhite Papers (View All Report Types)
 
Selecting a Next-Generation Firewall: Topic 10 Considerations
sponsored by Cisco
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 01 Apr 2014 | Published: 28 Feb 2014

Cisco

Enabling and Protecting the Open Enterprise
sponsored by CA Technologies.
WHITE PAPER: View this informative resource for an overview of the challenges of securing the open enterprise, and learn the steps you can take to enable your business for growth, while protecting it from risk and attack.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

CA Technologies.

ROI and Benefits of a Cloud-Based Application Security Service
sponsored by Veracode, Inc.
WHITE PAPER: In this report from Forrester Research, Inc., discover the potential ROI you could achieve by deploying a cloud-based application security service. Explore the costs and risk of this technology, and weigh them with the benefits you could experience.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

Veracode, Inc.

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Securing Your PKI Building Trust You Can Depend On
sponsored by Thales
WHITE PAPER: Discover several security risks of typical enterprise and government PKIs and why higher assurance solutions are vital for security purposes.
Posted: 16 Jul 2014 | Published: 01 Feb 2013

Thales

Defending Against Insider Threats in the “Snowden Era”
sponsored by CA Technologies.
WHITE PAPER: Security breaches are a significant threat for organizations in the age of big data: broken privacy laws, reputational damage, and loss of classified information are very real possibilities. What's worse is one of the most commonplace and damaging causes of security breaches can come from the inside of your business.
Posted: 28 Jan 2014 | Published: 31 Dec 2013

CA Technologies.

Secure Access and Continuity in a Virtualized and BYOD World
sponsored by Hewlett-Packard Company
WHITE PAPER: This business whitepaper focuses on the challenges facing midsize businesses who are looking to provide business continuity and minimized downtime. It also highlights the benefits of HP Just Right IT secure access and business continuity solutions.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

5 Pillars of API Management
sponsored by CA Technologies.
WHITE PAPER: Learn about API management solutions that can help your business tackle the security challenges of APIs, and uncover the 5 pillars of API management.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

CA Technologies.

What can you do differently to guard against threats from rapidly evolving mobile malware?
sponsored by IBM
WHITE PAPER: This must-see white paper discusses the emerging and evolving risks associated with mobile computing and applications. Also inside, find insight to help you effectively address mobile vulnerabilities.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Cloud Based Application Penetration Testing Trial
sponsored by iViZ
WHITE PAPER: Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

iViZ
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement