IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Programming

RSS Feed    Add to Google    Add to My Yahoo!
Secure Programming White Papers (View All Report Types)
Top 10 Caveats Mobile IT Admins Need to Know about Windows 10
sponsored by MobileIron
WHITE PAPER: Previously separate OS versions are converging onto a unified platform. Download the easy-to-digest infographic for a list of the top 10 things you need to know about Windows 10 to keep pace with industry updates...and your peers.
Posted: 05 Aug 2015 | Published: 05 Aug 2015


Top 10 Ways to Maximize Business Investment with UC&C
sponsored by Polycom, Inc.
WHITE PAPER: This white paper examines one UC platform that you can integrate into your existing enterprise infrastructure. Access this vendor report to consider which enterprise video and voice solutions will drive employee collaboration, and the top 10 ways to maximize your business ROI.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Polycom, Inc.

The Unified Communications Guide: 6 Ways to Boosting Productivity
sponsored by ThinkingPhones
WHITE PAPER: This white paper highlights 6 key advantages stemming from employing the cloud in your enterprise unified communications (UC). Read on here to see why the cloud isn't just a fad, and can deliver you the following advantages.
Posted: 02 Sep 2015 | Published: 02 Sep 2015


Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Powering Disaster Recovery in the Cloud
sponsored by Commvault
WHITE PAPER: In this white paper, you will learn more about the challenges organizations face with it comes to DR, and how the cloud can come to the rescue of your organization. Read on to find out how to securely store customer data in the public cloud while fending off security concerns.
Posted: 24 Aug 2015 | Published: 24 Aug 2015


UBM Tech Whitepaper: The State of UC: Future Adopters Poised to Rap Benefits via Cloud
sponsored by XO Communications
WHITE PAPER: Companies like yours are successfully addressing communications and collaboration challenges with Unified Communications. According to a new UBM Research Study, 87% of adopters say UC met or exceeded their expectations. Learn what holds others back, and how to overcome those obstacles.
Posted: 23 Sep 2015 | Published: 23 Sep 2015

XO Communications

Survey: Security Spending and Preparedness in the Financial Sector
sponsored by LogRhythm, Inc.
WHITE PAPER: In this report, you'll find the results of a survey that reveals how financial organizations are adapting to new security concerns and how they need to do better.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

LogRhythm, Inc.

A Guide to Security and Privacy in a Hosted Exchange Environment
sponsored by Intermedia.Net
WHITE PAPER: This white paper will assist you in choosing the right hosted Exchange environment for you, with top-notch provider security. Access this white paper to improve your Exchange experience and get exclusive access to a checklist comparison of hosted Exchange providers' security offerings.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Empower your Developers
sponsored by Coverity by Synopsys
WHITE PAPER: The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development.
Posted: 16 May 2011 | Published: 16 May 2011

Coverity by Synopsys

Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER: Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement