IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed    Add to Google    Add to My Yahoo!
OS Security Reports
 
Measure and Move Your Mobile Apps to Greatness
sponsored by IBM
WHITE PAPER: In this exclusive white paper, you will evaluate what turns consumers and other users both off and onto a mobile app, as well as learn how to elevate your serviceable and profitable mobile apps into great apps. Read on to discover four key findings that will elevate your apps.
Posted: 04 Jan 2016 | Published: 31 Oct 2015

IBM

Deliver Secure, New Business Services and Improve the Customer Experience
sponsored by CA Technologies
WHITE PAPER: This resource discusses ways organizations can deliver secure, new business services with identity management in mind. By accessing, you'll find a checklist designed to help you simultaneously grow and protect your business.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

CA Technologies

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Gartner Magic Quadrant for EMM
sponsored by VMware
WHITE PAPER: This white paper reviews the 2015 EMM market, and is a guide for organizations looking to introduce EMM into their businesses, as well as for those intending to upgrade mobility services. Access this paper now to analyze the strengths and weaknesses of 11 EMM vendors.
Posted: 18 Sep 2015 | Published: 08 Jun 2015

VMware

Discovery, SSO, and Policy Enforcement Lets IT Security Say Yes to Cloud Apps
sponsored by IBM
VIDEO: Security-enforcing technology makes protecting the enterprise and providing innovation an achievable balance. Watch this video and discover how to minimize data mining and more effectively detect risks.
Posted: 05 Nov 2015 | Premiered: 22 Sep 2015

IBM

Improve Your User Experience with Mobile Application Development
sponsored by IBM
WEBCAST: In this webcast, you will learn how transform customer information garnered from your mobile apps into actionable data. Access this video to accelerate the delivery of your mobile strategy provide users with a more engaging experience.
Posted: 30 Oct 2015 | Premiered: Jun 18, 2015

IBM

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

DevOps in Large Companies - Is It Possible?
sponsored by Apcera
WEBCAST: In this webcast, learn the how to transform culture to make DevOps possible and explore the role technology plays in the process. Explore recommendations for overcoming legacy systems, how to approach microservices and platforms as a service, the role policy plays, and more.
Posted: 08 Jan 2016 | Premiered: Dec 2, 2015


The Top 6 Tools Users Need For Mobile Files and How to Provide them Securely
sponsored by BlackBerry
WHITE PAPER: This white paper discusses the six tools mobile users need from their file management apps and gives advice on maintaining security while providing each one.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

BlackBerry

The State of Application Delivery in APAC 2015
sponsored by F5 Networks
WHITE PAPER: In the following infographic, you will discover all you need to know about the state of application delivery in APAC in 2015. Discover why organizations are finding that success depends on the effectiveness of their security infrastructure.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement