IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflows Reports
Security and Compliance: The New Watchwords of Enterprise App Delivery
sponsored by IBM
WHITE PAPER: This white paper examines the driving forces behind the establishment of corporate application stores, and highlights one best-in-class mobile app management (MAM) program. Read on to learn how to ride the crest of this new wave of mobility and enhance your enterprise app security.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Solidify Your Network Protection with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper you will learn the ins and outs of deploying an ISFW. Learn how to protect your company from the latest advanced security threats and compartmentalize access to sensitive data and apps.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Building a Web Application Security Program
sponsored by Qualys
WHITE PAPER: This white paper details how to build a pragmatic web application security program that provides effective security. View now to review the top 12 web app security weak points.
Posted: 12 Oct 2015 | Published: 09 Mar 2009


Building the Business Case for Modern Access Management
sponsored by Ping Identity Corporation
WHITE PAPER: Discover the 4 questions you need to consider when building your IAM strategy to protect users, customers, third-parties, and sensitive data.
Posted: 22 Oct 2015 | Published: 07 Oct 2015

Ping Identity Corporation

Sandboxing: CPU-Level Threat Prevention
sponsored by Check Point Software Technologies Ltd.
VIDEO: This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015

Check Point Software Technologies Ltd.

Reimagine, Reinvent, Run: SAP in the Digitial Economy
sponsored by SAP America, Inc.
WHITE PAPER: This brief whitepaper discusses some of the ways SAP is changing how the world operates, with particular focus on efficiency. Access now to see how SAP could revamp your business as well.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

SAP America, Inc.

The Continuum of Self-Service
sponsored by LogiAnalytics
WHITE PAPER: Access this white paper to find five essentials you should consider before empowering users with self-service analytics.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Discovery, SSO, and Policy Enforcement Lets IT Security Say Yes to Cloud Apps
sponsored by IBM
VIDEO: Security-enforcing technology makes protecting the enterprise and providing innovation an achievable balance. Watch this video and discover how to minimize data mining and more effectively detect risks.
Posted: 05 Nov 2015 | Premiered: 22 Sep 2015


Infographic: Application Security on Cloud
sponsored by IBM
RESOURCE: This infographic identifies an application security analyzer that can perform periodic security testing, identify high-priority vulnerabilities, and improve your overall application security program. Learn how you can secure your enterprise's application development infrastructure more effectively before applications are deployed.
Posted: 14 Oct 2015 | Published: 14 Oct 2015


Don't Believe the Hype - All Containers are Not Equal
sponsored by Good Technology
WHITE PAPER: This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.
Posted: 11 Nov 2015 | Published: 11 Jun 2015

Good Technology
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement