IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed    Add to Google    Add to My Yahoo!
OS Security Reports
 
Top 3 Ways HyperScale for OpenStack Protects your Applications and Data
sponsored by Veritas
WHITE PAPER: Ensuring adequate data protection is critical before placing workloads (and the corresponding data that they operate upon) into production. This tip sheet outlines the 3 ways in which Veritas HyperScale for OpenStack keeps your applications and data safe.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veritas

Busting the Myth of the Malware "Silver Bullet"
sponsored by McAfee, Inc.
WHITE PAPER: Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.
Posted: 16 Nov 2017 | Published: 28 Feb 2017

McAfee, Inc.

What You SIEM is What You Get
sponsored by AlienVault
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Preparing for the New OWASP Top 10 and Beyond
sponsored by F5 Networks
WHITE PAPER: Web app security is difficult and firewalls are not going to be enough. OSWAP has released a list of the 10 most common security concerns you need to address for your web apps. Access this e-book to learn about each of these 10 key web app security concerns and how you can mitigate them.
Posted: 16 Nov 2017 | Published: 31 Oct 2017

F5 Networks

Mobile Application Development at the Speed of Business with Containers
sponsored by Red Hat
EBOOK: Discover how to use container and cloud technologies to build quality mobile apps quickly. Learn how to power your native and mobile app development initiatives with microservices, enterprise-grade containers, DevOps, APIs, and more.
Posted: 05 Oct 2017 | Published: 05 Oct 2017

Red Hat

A New Way to Look at AWS Security
sponsored by AWS-Cisco
WHITE PAPER: AWS environments that make use of AWS-native services and entity modeling can be protected from known and unknown security threats in a scalable and cost-effective manner. Access this white paper to learn how entity modeling provides a new approach to AWS that ensures security.
Posted: 06 Nov 2017 | Published: 29 Sep 2017

AWS-Cisco

How to Increase Security for your Login on Mobile Applications
sponsored by IBM
EGUIDE: In this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec
WHITE PAPER: Cloud apps introduce a new threat vector, with lots of credentials floating around that provide direct access to business critical data. This white paper provides planning strategies for adopting cloud apps as well as information on managing the human factor.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Symantec

4 Ways to Improve Your DevOps Testing
sponsored by xMatters, Inc.
EBOOK: Explore some of the most common DevOps testing mistakes and learn how to optimize your testing processes. Delve down into topics like why service monitoring and testing matter, and how DevOps is failing 3 key tenets of privacy compliance.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

xMatters, Inc.

Cloud Solution Enables Security for Highly Regulated Industries
sponsored by TeraGo Networks
WHITE PAPER: Explore this case study to uncover how Virtual StrongBox was able to implement a technology to revolutionize cloud security and protect its customers.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

TeraGo Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement