IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System Security White Papers (View All Report Types)
 
Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company

Narrowing The Security Gap With Automated Configuration Assessment
sponsored by Qualys
WHITE PAPER: This white paper outlines the three best practices to controlling incorrect app configurations and how to minimize risks.
Posted: 20 Apr 2015 | Published: 28 Jan 2015

Qualys

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by White Hat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to learn learn more.
Posted: 15 Apr 2015 | Published: 31 Dec 2013

White Hat Security

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 01 Feb 2015 | Published: 01 Sep 2013

Hewlett-Packard Company

Protect your Employees and Data from Advanced Malware Attacks in Real-Time.
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: This white paper outlines a new approach to malware prevention that protects data and users from employee targeted attacks. Find out how this three step approach to malware prevention can give you the most advanced endpoint protection for your organization.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

Dell, Inc. and IntelĀ®

Case Study: Global Media Company Gains Stronger App Security
sponsored by Veracode, Inc.
WHITE PAPER: This white paper explains how one cloud-based service helped a global media and technology company regain full visibility and control of its mobile app perimeter, allowing the enterprise to more effectively assess the risk of its mobile apps and maintain control of its mobile footprint.
Posted: 03 Apr 2015 | Published: 03 Apr 2015

Veracode, Inc.

Mobile App Reputation and Risk Management for Network Security
sponsored by Veracode, Inc.
WHITE PAPER: In this white paper, you'll discover a new solution to application risk management that provides detailed behavioral intelligence about mobile apps.
Posted: 03 Apr 2015 | Published: 03 Apr 2015

Veracode, Inc.

Know What Third-Party App Developers Are Doing
sponsored by BalaBit
WHITE PAPER: This white paper discusses the convenience of using of monitoring software for external application management activities.
Posted: 24 Apr 2015 | Published: 24 Apr 2015

BalaBit

Empower a Mobile Workforce with Secure App Delivery
sponsored by Citrix
WHITE PAPER: Explore how to integrate security into the app development process and deliver secure native-like apps to multiple devices.
Posted: 26 Mar 2015 | Published: 11 Feb 2015

Citrix

Office 365: Strong Authentication and SSO in the Cloud
sponsored by SecureAuth
WHITE PAPER: In this white paper, discover the history behind Office 365 and where it currently stands today. Read on to find out why Microsoft is dealing with security risks and an authentication solution they used to protect the identity of mobile users.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement