IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflows Reports
 
Deliver Complete Security for Enterprise Web Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to fully protect web applications without adversely affecting web performance for your users. Address all of today's critical web vulnerabilities while at the same time accelerating web applications for optimal productivity.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

2016 Mobile Security & Business Transformation Study
sponsored by IBM
RESEARCH CONTENT: In this research report, learn how mobile adoption grew and changed in 2016, and how this information can help you secure your apps and devices in the years to come.
Posted: 16 May 2017 | Published: 16 May 2017

IBM

Why You Need Advanced Application Services in Your Private Cloud
sponsored by F5 Networks
WHITE PAPER: The private cloud is being increasingly utilized to run virtual machines and mission-critical applications. The issue is that you need to support these apps with services, like security, that are not usually built-in. Access this white paper to learn the best ways to support your apps in the private cloud and maximize your resources.
Posted: 11 May 2017 | Published: 30 Dec 2016

F5 Networks

4 Market Trends Driving Mobile Banking
sponsored by HID
WHITE PAPER: Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

HID

Automating Governance with DevOps and Supply Chain Management
sponsored by Sonatype
RESEARCH CONTENT: This Forrester Research report explores how to catch governance up to the speed of rapid app development practices with automated supply chain management. Learn how to deliver on the accelerated DevOps' time-to-market without sacrificing software quality and compliance.
Posted: 02 May 2017 | Published: 10 Nov 2016

Sonatype

Why DevOps + Security = A Bright Idea
sponsored by SearchSecurity.com
EBOOK: By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures and defeat the long-standing bias that security is an obstacle, not aid, to good software development.
Posted: 22 Nov 2016 | Published: 18 Nov 2016

SearchSecurity.com

Ultimate Guide to Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to work with appropriate teams to develop a clear application security strategy with concrete requirements for security policies. This, combined with selecting the right application security partners, can ensure your ability to create an advanced application security program that systemically reduces risk and enables innovation.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

The Top 6 WAF Essentials to Achieve Application Security Efficacy
sponsored by Citrix
WHITE PAPER: Due to the nature of web security and how it constantly evolves, it is increasingly difficult to integrate comprehensive security into applications and keep them up-to-date. In this white paper, learn the 6 essential features your web application firewall (WAF) needs to maintain a high degree of security,
Posted: 27 Apr 2017 | Published: 27 Apr 2017

Citrix

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

UBM Dark Reading & VMware AirWatch® Webinar
sponsored by vmware airwatch
WEBCAST: In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.
Posted: 03 Mar 2017 | Premiered: Mar 3, 2017

vmware airwatch
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement