IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer OverflowReports
 
DNS Challenges in a Changing Landscape
sponsored by F5 Networks
RESOURCE: View this infographic to discover common challenges of DNS management, and get the stats on the top availability and security concerns of DNS administrators, including outages and DDoS attacks.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

F5 Networks

A10 Networks' Advanced Core Operating System (ACOS)
sponsored by A10 Networks
VIDEO: Tune into the following video to discover how A10 Networks ACOS is increasingly the platform of choice for enterprises, service providers, Web giants and government organizations seeking to optimize the performance and security of their data center applications and networks.
Posted: 11 Sep 2014 | Premiered: 11 Sep 2014

A10 Networks

HP Mobile Security Assessment
sponsored by Hewlett-Packard Company
DATA SHEET: In this resource, discover a mobile security assessment that tests your most sensitive applications.
Posted: 15 Sep 2014 | Published: 01 Jun 2013

Hewlett-Packard Company

2013 Magic Quadrant for Application Security Testing
sponsored by Hewlett-Packard Limited
ANALYST REPORT: This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market.
Posted: 29 May 2014 | Published: 23 Jul 2013

Hewlett-Packard Limited

Next generation firewall product analysis
sponsored by Fortinet, Inc.
WHITE PAPER: This resource contains a product analysis of a next generation firewall (NGFW) that discusses security, performance, TCO and several other categories that are not available anywhere else.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Fortinet, Inc.

Large Financial Services Firm Passes Its PCI Audit— and Implements an Ongoing Governance Program
sponsored by Veracode, Inc.
CASE STUDY: A large financial services firm sought help with a one-time project to pass its payment card information (PCI) audit. View this case study now to see how this financial firm decided on continuous analysis, and the advantages they saw as a result. Also learn about a software system that achieves this without acquiring more servers.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

2013 Threat Report
sponsored by Dell Software
WHITE PAPER: This report extensively details and categorizes recent global trends in network threats.
Posted: 19 Aug 2014 | Published: 23 Jan 2014

Dell Software

Ensuring Availability and Security with an Enterprise-Class Application Delivery Solution
sponsored by Citrix
WHITE PAPER: Find out which application virtualization and delivery solutions are capable of working together to provide you with both high availability and stellar security.
Posted: 20 Jun 2014 | Published: 31 Dec 2010

Citrix

Enterprise Architecture Framework
sponsored by Insight and Symantec
WHITE PAPER: Explore this resource to discover how you can deliver more to your mission-critical business applications through virtualization. Learn how you can gain greater visibility and control, optimized storage, performance, and availability, as well as unified protection across physical and virtual infrastructure.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

Insight and Symantec

Secure Access and Continuity in a Virtualized and BYOD World
sponsored by Hewlett-Packard Company
WHITE PAPER: This business whitepaper focuses on the challenges facing midsize businesses who are looking to provide business continuity and minimized downtime. It also highlights the benefits of HP Just Right IT secure access and business continuity solutions.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement