IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed    Add to Google    Add to My Yahoo!
Software Security White Papers (View All Report Types)
Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts
sponsored by Appthority
WHITE PAPER: This white paper explores the twin problems which most often lead to data breaches in mobile hardware: spear phishing and watering hole attacks. In addition, learn about a solution to stop them in their tracks by automating the scanning and analysis of employee mobile apps for risky behaviors, hidden actions, and mobile malware.
Posted: 04 Oct 2016 | Published: 04 Oct 2016


Manage Change, Enforce Security, and Incorporate Cloud in Your Windows Ecosystem
sponsored by Puppet
WHITE PAPER: Learn where to incorporate better levels of control, and how to automate the delivery and operation of Windows applications on premise and in the cloud. Plus, uncover the 5 questions decision-makers in a business need to be asking.
Posted: 06 Jul 2016 | Published: 06 Jul 2016


SD-WAN: Application Performance Routing
sponsored by Fatpipe, Inc.
WHITE PAPER: SD-WAN is becoming increasingly vital to everyday operations, especially application functionality. Access this white paper to learn how the need to reduce costs surrounding applications is changing traffic patterns and how SD-WAN is providing solutions.
Posted: 19 Apr 2016 | Published: 06 Apr 2016

Fatpipe, Inc.

Containerization Is a Start, But Not a Solution to App Security
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper learn the myth about security containerization on personal and work devices in the era of BYOD. Discover several app-based security breach threats including: network profiling apps, VPN hijacking apps, data mining apps, and more.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Proofpoint, Inc.

Strategy Guide for Securing the SAP Landscape
sponsored by Onapsis
WHITE PAPER: Your organization should be thinking about how best to protect SAP systems. Learn how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.
Posted: 24 Aug 2016 | Published: 01 Jun 2016


Enable secure mobile collaboration for your business
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

How Hacking Happens in 2016: Account Takeover
sponsored by IMMUNIO, Inc.
WHITE PAPER: Account takeovers are the latest tricks up the sleeves of hackers, and this e-book helps you understand the 4 main techniques that hackers use to target the accounts of your users. Access now to learn how you can prevent account takeover, and even quickly detect compromised accounts.
Posted: 25 Aug 2016 | Published: 01 Jul 2016


Ten Areas Where Citrix XenApp Outperforms Vmware Horizon
sponsored by Citrix
WHITE PAPER: VMware Horizon has left out some of the "no-brainer" features that Citrix XenApp users and admins have been using for years. Understanding the differences between these products is critical to selecting the right solution that satisfies user and IT requirements in your organization. Compare solutions now.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Lifecycle Management Best Practices for Mobile Apps
sponsored by IBM
WHITE PAPER: This white paper explores the role of app security in mobile app lifecycle management. From design through deployment, learn about the proactive best practices that can simplify and strengthen the development process.
Posted: 11 Aug 2016 | Published: 31 Mar 2016


Solution Brief: Satisfying Today's Bandwidth Hungry Consumers
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights a high performance next generation firewall solution that protects information and applications without slowing down your network or affecting availability. Read on to see how this firewall solution can provide your enterprise with in-depth visibility and reporting, highly effective intrusion prevention system, and more.
Posted: 12 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement