IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed    Add to Google    Add to My Yahoo!
OS SecurityReports
 
Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

Hewlett-Packard Company

Application Delivery Optimization: Business And Technology Issues
sponsored by CA Technologies.
EGUIDE: This expert e-guide discusses the challenges of the virtual enterprise, why response time is key for application optimization and more.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CA Technologies.

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

10 Critical Requirements for Cloud Applications
sponsored by Workday
VIDEO: Uncover the top 10 requirements for cloud applications, and find out what you should be looking for from vendors.
Posted: 08 Sep 2014 | Premiered: 29 Jun 2013

Workday

Mobile Apps are the Future - Is Your Enterprise Ready?
sponsored by BlackBerry
WHITE PAPER: View this white paper to explore how mobile apps are improving productivity and collaboration across the enterprise, discover options for mobile development tools, and compare native, web-based, and hybrid options. Plus, learn the three most important factors to consider in order to get the most value from mobile apps.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

BlackBerry

API and API Infrastructure Security for the CSO
sponsored by Apigee
WHITE PAPER: Security must be built into the APIs themselves. But that's not enough. Threat protection, identity services, infrastructure security, and compliance also must be top of mind. This eBook provides a framework to help CSOs and CISOs consider API security.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Apigee

The Allure Behind Risk-Based Authentication
sponsored by CA Technologies.
EGUIDE: This expert e-guide reveals the draw to risk-based authentication, how to ensure secure API use occurs within the enterprise, and cyber threats moving to critical infrastructure.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

CA Technologies.

Using the System Center Updates Publisher to Security Path 3rd Party Apps with WSUS
sponsored by Lumension
WEBCAST: In this webcast, IT security expert Randy Franklin Smith of Ultimate Windows dives into how Microsoft System Center Updates Publisher (SCUP) works and what the requirements are for deploying third party security updates with SCUP.
Posted: 05 Nov 2014 | Premiered: Nov 5, 2014

Lumension

The Total Value of Simpana Software
sponsored by CommVault
WHITE PAPER: This white paper gives survey results on a backup software solution that drives additional value not only in terms of costs but also efficiency, risk reduction, and data value.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

CommVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement