IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflow Reports
 
Comparing Security Features: MobileIron and Microsoft Intune
sponsored by MobileIron
WEBCAST: This video describes the security differences between EMM tool MobileIron and MDM tool Microsoft Intune, comparing capabilities like encryption, secure data gateway, compliance, and more.
Posted: 07 Aug 2017 | Premiered: Apr 25, 2017

MobileIron

Mobile Threat Report
sponsored by Lookout
WHITE PAPER: With mobile threats becoming increasingly sophisticated it's more important than ever for organizations to know what threats they face, and how those threats can cause data loss, compliance infringement, and brand reputation damage. Download this white paper to uncover the latest mobile threats to your organization.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Lookout

Key software development trends to drive business success
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.
Posted: 08 Oct 2017 | Published: 09 Oct 2017

ComputerWeekly.com

Cisco and Splunk: Innovation through the Power of Integration
sponsored by Splunk
WEBCAST: In this webcast, gain a better understanding of the partnership between Cisco and Splunk. Then find out how IT network pros are able to leverage better cloud security and quickly troubleshoot issues and outages.
Posted: 18 Oct 2017 | Premiered: Sep 28, 2017

Splunk

The Business Case for Mobile Security
sponsored by Lookout
EBOOK: Mobility is the way of the future, so you need to protect your mobile devices. This e-book chapter presents the case for mobile security and how you can convince the different decision-makers that mobile threats are real and worth the investment to defend against.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Lookout

Assessing the Impact of Full Lifecycle API Management
sponsored by CA Technologies
RESEARCH CONTENT: This Forrester Research report examines the potential economic impact of the CA API management platform. Uncover the report's key findings and find out how to improve API management and security for fast, efficient app development.
Posted: 06 Dec 2017 | Published: 31 May 2017

CA Technologies

Budgets and Outlook: Top Vendor Providers for Cloud Information Security
sponsored by Alert Logic
RESEARCH CONTENT: This 451 Research report focuses on enterprise information security providers and top considerations among 500 leading organizations.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

The Total Economic Impact of Security-as-a-Service: Alert Logic
sponsored by Alert Logic
RESEARCH CONTENT: This Forrester Consulting report examines the ROI for organizations that used Alert Logic services for cloud security.
Posted: 11 Sep 2017 | Published: 31 Jul 2017

Alert Logic

How to Recognize and Prevent Mobile Security Threats
sponsored by Microsoft
EGUIDE: Learn how to recognize and prevent mobile security threats for application development and deployment, all while discovering how to not fall victim to the 2 most common mobility challenges.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Microsoft

Cloud Solution Enables Security for Highly Regulated Industries
sponsored by TeraGo Networks
WHITE PAPER: Explore this case study to uncover how Virtual StrongBox was able to implement a technology to revolutionize cloud security and protect its customers.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

TeraGo Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement