IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed    Add to Google    Add to My Yahoo!
OS Security Reports
 
Extending the Value of Mobile Java Apps
sponsored by IBM
WEBCAST: In the age of mobile development, you may want to revisit your strategy for Java and JEE systems. Watch this webinar to get tips on how to implement microservices and APIs, improve user experience, and more. You'll also learn how to improve app integration and leverage cloud-based mobile backend as a service.
Posted: 03 Aug 2016 | Premiered: Aug 3, 2016

IBM

Deciphering the Latest in iOS Open Source Healthcare Software
sponsored by CloudMine
WHITE PAPER: Learn how a Apple's newly released healthcare-focused, open source software framework can change the way healthcare app developers build and how they capture clinical research data in real-time.
Posted: 30 Jun 2016 | Published: 23 Mar 2016


Web Application Security: Is your Site Vulnerable to Attackers?
sponsored by Akamai
RESOURCE: This short infographic shows you the importance of intelligent security for your web applications including the necessity of a web application firewall (WAF). Learn how to seamlessly integrate and manage a cloud-based WAF to keep hackers out of your business.
Posted: 12 Aug 2016 | Published: 01 Jul 2016

Akamai

See How Apps are Being Hacked
sponsored by Arxan
WEBCAST: This webcast illustrates some of the ways hackers are breaking into your mobile applications. See real life examples of how mobile app hacking is becoming easier and faster than ever before.
Posted: 11 Jul 2016 | Premiered: Jun 1, 2016

Arxan

Mobilize Your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Succeeding with Static Code Analysis: An Implementation Guide
sponsored by Programming Research
WHITE PAPER: Static code analysis can help you rapidly ensure the safety and security of embedded software, but it isn't a one-size-fits-all solution. Discover the biggest challenges that can prevent static code analysis from effectively detecting issues early on.
Posted: 19 May 2016 | Published: 19 May 2016

Programming Research

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
PODCAST: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 28 Jun 2016 | Premiered: Jun 16, 2016

Citrix

Recognize and Respond to Cyber Attacks
sponsored by Verizon
WHITE PAPER: The inability to recognize and react the lead indicators of a cyber attack can be an organization's greatest weakness. Learn how to prepare your organization to recognize and mitigate threats. Accelerate your detection capabilities so breaches can't linger.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Verizon

Success Story Video: State of California
sponsored by Axway
VIDEO: Find out how the State of California was able to about a managed file transfer (MFT) system to centrally manage and monitor secure file transfers across all their web sites and applications for all their agencies.
Posted: 17 Jun 2016 | Premiered: 01 May 2016

Axway

CISOs Are Under Mounting Pressure
sponsored by MASERGY
ANALYST BRIEF: CISOs need help. The smart ones are turning to a new way of thinking about cybersecurity protection: Security as a Service. It's a managed, unified solution that leverages the power of both machine learning and expert human intelligence. Discover the scalability and speed SaaS can add to your organization.
Posted: 03 Jun 2016 | Published: 13 Jan 2015

MASERGY
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement