IT Management  >   Systems Design and Development  >   Application Development  >  

Security-related Design

RSS Feed    Add to Google    Add to My Yahoo!
Security-related Design White Papers (View All Report Types)
 
From GPO to MDM: A New Era of Enterprise Computing
sponsored by MobileIron
WHITE PAPER: This white paper looks to enterprise mobility management (EMM) as the primary means of securing and managing enterprise devices during the evolution of operating systems.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

MobileIron

The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

IBM

8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Kony

EEMM Strategy and Vendor Comparison: Who Makes the Grade?
sponsored by IBM
WHITE PAPER: Access this white paper to examine EMM and MDM vendors, and determine which products are most appropriate your enterprise needs.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

IBM

How to Secure Your Ecosystem of Cloud-Based Apps
sponsored by MobileIron
WHITE PAPER: Most large organizations deploy or intend to deploy a broad range of mobile apps to their employees. This white paper reviews one app security model and how it can be leveraged to secure cloud-based productivity suites on mobile devices.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

MobileIron

FICO and Red Hat Seed the Cloud with Enterprise Innovations
sponsored by Red Hat
WHITE PAPER: Platform-as-a-service tools have become the market's leading solution for business rules management. This white paper examines a new and emerging PaaS cloud computing solution (one of which features promises any time, on-demand access to a full-service cloud-based application platform). Read on here to learn about receiving the following benefits.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

5 Days to Setting Up an Application Security Program
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 15 Apr 2015 | Published: 12 Jan 2015

WhiteHat Security

Strategic Mobility: Boosting Operational Productivity For Oil and Gas
sponsored by Red Hat
WHITE PAPER: In this white paper, you will learn about the opportunities for mobile initiatives to drive efficiencies across asset and workforce management. Read on to learn how to strategically mobilize gas and oil.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Red Hat

Driving Adoption of New Web Conferencing Technologies
sponsored by Vyopta
WHITE PAPER: This e-book guide explains how utilizing collaboration analytics minimizes wasted resources within your company, and allows you to align its usage with your specific business goals. Read on to find out more about strategies for scaling your collaboration usage and adoption.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Vyopta

Find Security Vulnerabilities in Your ASP.NET Applications before Hackers Do
sponsored by Compuware Corporation
WHITE PAPER: Download this product brief to learn how Compuware DevPartner SecurityChecker can help developers build security into applications before applications go into production.
Posted: 01 Dec 2006 | Published: 01 Oct 2006

Compuware Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement