IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed    Add to Google    Add to My Yahoo!
Software Security White Papers (View All Report Types)
Secure the Mobile Enterprise
sponsored by IBM
WHITE PAPER: As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.
Posted: 30 Jul 2015 | Published: 30 Jul 2015


The Total Economic Impact of Migrating From An Open Source Environment
sponsored by IBM
WHITE PAPER: This Forrester Research report examines the total economic impact achieved by migrating from an open source environment to the WebSphere Application Server. Access this study to learn how you can improve capabilities and operational efficiency.
Posted: 11 Sep 2015 | Published: 30 Jun 2012


The Guide to Successful Mac Mobile Deployments in Your Enterprise
sponsored by JAMF Software
WHITE PAPER: This expert guide highlights five important steps needed to successfully deploy Mac computers in your organization, utilizing user-friendly deployment programs.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

JAMF Software

Secure Application Delivery for a Mobile Workforce
sponsored by Citrix
WHITE PAPER: Access this white paper to discover two technologies that provide a complete, end-to-end-mobility solution by managing both application types. Find out how one makes it simple to mobilize Windows applications for use on any mobile device and how the other manages, secures and deploys native mobile apps.
Posted: 03 Aug 2015 | Published: 28 Feb 2014


2015 Gartner Magic Quadrant for Web App Firewall
sponsored by Imperva
WHITE PAPER: Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall. Access the report to find out why.
Posted: 06 Oct 2015 | Published: 15 Jul 2015


2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: This security report provides a penetrating analysis of how IT security professionals perceive cyberthreats and plan their defense against them. Read on to learn how software defined networking (SDN) can help to mitigate this onslaught of threats.
Posted: 06 Nov 2015 | Published: 06 Nov 2015


Strong Authentication without a Password
sponsored by Symantec Corporation
WHITE PAPER: This infographic explains how you can achieve strong authentication that's based on more than a simple password.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

Symantec Corporation

Bolstering Your Enterprise Mobility Security Strategy for Today's App Landscape
sponsored by Oracle Corporation
WHITE PAPER: This quick and easy guide outlines the benefits of employing enterprise mobility management (EMM) in your organization, and also highlights the particular risks facing BYOD users in the mobile app landscape.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Oracle Corporation

Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This white paper explores the factors that prevent effective web app security and gives advice for overcoming them.
Posted: 15 Oct 2015 | Published: 31 Aug 2012

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement