IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflow Reports
 
Budgets and Outlook: Top Vendor Providers for Cloud Information Security
sponsored by Alert Logic
RESEARCH CONTENT: This 451 Research report focuses on enterprise information security providers and top considerations among 500 leading organizations.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

Breaking the Bottlenecks in Your SDLC
sponsored by Blueprint Software
WHITE PAPER: Discover how to apply the principles of Agile throughout the software development lifecycle (SDLC) and to the enterprise as a whole so that you can achieve Agile development at scale.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Blueprint Software

Strategies for API Security
sponsored by Akamai Technologies
WHITE PAPER: APIs provide transparency to the internal structure of applications and provide granular access to an application's backend, making online businesses more vulnerable than ever before to cyberattack threats. This white paper outlines the most common types of cyberattacks and offers strategies for protecting APIs.
Posted: 09 Oct 2017 | Published: 31 Dec 2016

Akamai Technologies

Comparing Security Features: MobileIron and Microsoft Intune
sponsored by MobileIron
WEBCAST: This video describes the security differences between EMM tool MobileIron and MDM tool Microsoft Intune, comparing capabilities like encryption, secure data gateway, compliance, and more.
Posted: 07 Aug 2017 | Premiered: Apr 25, 2017

MobileIron

What You SIEM is What You Get
sponsored by AlienVault
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Cisco and Splunk: Innovation through the Power of Integration
sponsored by Splunk
WEBCAST: In this webcast, gain a better understanding of the partnership between Cisco and Splunk. Then find out how IT network pros are able to leverage better cloud security and quickly troubleshoot issues and outages.
Posted: 18 Oct 2017 | Premiered: Sep 28, 2017

Splunk

Embracing the Digital Workplace with Unified Endpoint Management (UEM)
sponsored by MicroFocus
WHITE PAPER: Today's workers demand access to data and apps from a variety of devices. But how can your organization meet these demands without compromising security and compliance needs? Download this white paper to discover how the right unified endpoint management (UEM) technology can help.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

MicroFocus

Understanding the Benefits of API Management
sponsored by Akamai Technologies
RESEARCH CONTENT: Due to APIs having a variety of use cases, API management software is becoming a requirement. In this IDC Q&A, find out how to overcome the challenges of API management, solve security concerns and best practices for managing high-value APIs.
Posted: 02 Nov 2017 | Published: 30 Sep 2017

Akamai Technologies

AWS Best Practices for DDoS Resiliency
sponsored by Amazon Web Services
WHITE PAPER: Do not let your website or application become unavailable to end users - protect against DDoS attacks once and for all. Explore this white paper and learn how to improve resiliency of your applications against DDoS attacks with these best practices.
Posted: 10 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services

Simplify Authentication with Personal Identity Verification
sponsored by HID Global
VIDEO: It's no secret that passwords are a pain for users and IT. This video discusses how personal identity verification (PIV) can make authentication simpler for your users.
Posted: 11 Aug 2017 | Premiered: 11 Aug 2017

HID Global
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement