IT Management  >   Systems Design and Development  >   Application Development  >  

Security-related Design

RSS Feed    Add to Google    Add to My Yahoo!
Security-related Design White Papers (View All Report Types)
Healthcare's Now in the Cloud with MDM
sponsored by IBM
WHITE PAPER: This white paper outlines the risks associated with incorporating MDM in hospital environments, and examines an MDM solution specific unto healthcare organizations.
Posted: 11 Aug 2015 | Published: 11 Aug 2015


Case Study: Building a Mobile First Future
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how one company shifted to a mobile first approach with an enterprise mobility management (EMM) strategy that allows it to create, manage and secure a wide range of mobile apps.
Posted: 11 Mar 2015 | Published: 11 Mar 2015


Mobilize Your Virtual Enterprise Applications with 4 Steps
sponsored by StarMobile
WHITE PAPER: It's time to capitalize on next-generation remote computing protocols. Access this resource to compare newer app mobilization protocols with traditional ones, and get details on design techniques that better suit mobile environments.
Posted: 07 Aug 2015 | Published: 07 Aug 2015


MDM Best Practices: Proactive Application Security
sponsored by IBM
WHITE PAPER: Ensuring mobile security now goes beyond MDM and MAM to mobile application lifecycle management (MALM). This white paper reviews MALM best practices for organizations with bring your own device (BYOD) policies.
Posted: 06 Jul 2015 | Published: 26 Dec 2014


Ready Your Organization for an Enterprise Voice Transition to the Cloud
sponsored by Polycom, Inc.
WHITE PAPER: This exclusive white paper provides an outline for the benefits and considerations of balancing the transition of voice collaboration to the cloud. Continue reading to understand the key benefits UC and collaboration can bring to the modern workplace.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Polycom, Inc.

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Predictive Mobile Security: Get Ahead of the Curve
sponsored by Lookout
WHITE PAPER: Today, big corporate breaches can attack from every angle, so you need to be prepared. View now and learn how big data enables predictive security to mitigate mobile threats before they come in.
Posted: 19 Aug 2015 | Published: 19 Aug 2015


The 2015 Mobile Workforce Report for the Middle East and Africa
sponsored by Dimension Data
WHITE PAPER: In this global report, you will address the IT and security challenges that introducing a mobile workforce presents. Focusing on the Middle East and Africa, learn how organizations in these geographies are driving end-user computing growth, as well as get an insider's look at enterprise mobile app trends for 2016.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Dimension Data

Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

Sharks in the AppPool: Managing Your Web Presence While Protecting the Hosting Resources You Pay For
sponsored by Verio
WHITE PAPER: This white paper details hosting best practices, discussing the advantages associated with the use of isolated, rather than shared, AppPools in a Windows-based hosting environment.
Posted: 27 Aug 2007 | Published: 01 Sep 2006

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement