IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed    Add to Google    Add to My Yahoo!
OS SecurityReports
 
Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM

Simply deploy, manage and secure mobile apps from the cloud
sponsored by IBM
WHITE PAPER: View this brief paper that introduces a mobile application management suite that delivers an easy-to-use enterprise app catalog with full security and operational lifecycle management of apps. Learn how this system is ideal for security sensitive data, especially in this BYOD era.
Posted: 08 Sep 2014 | Published: 28 Feb 2013

IBM

Five Steps for a Winning Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: The landscape of devices, operating systems, and touch points continuously grows in complexity – resulting in a security nightmare for application developers. View this informative white paper now to find out the 5 steps for a winning application security program.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Veracode, Inc.

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: This white paper explores the growing world of mobile application development and highlights the benefits of providing security for mobile applications during the development and deployment stages.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

IBM

An EMM Checklist for CIOs: Factors to Consider When Choosing an EMM Solution
sponsored by BlackBerry
WHITE PAPER: For help deciding on an Enterprise Mobility Management (EMM) solution consider the issues in the following white paper. It's derived from third-party research and best practices. It covers the critical areas you'll need to think through as you arrive at a decision. It also provides a CIO's Guide to EMM.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

BlackBerry

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: This white paper highlights the importance of IAM strategies complying with regulations to ensure strong security.
Posted: 11 Sep 2014 | Published: 01 Apr 2014

IBM

Consolidating Remote Servers and Storage for Security, Efficiency
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Access this white paper to find out how to decouple storage from its server over any distance and be available as if it were local to applications at the edge in remote offices.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Riverbed Technology, Inc.

NEC Biometrics Solutions: Enhancing the Customer Experience and Securing Endpoints
sponsored by NEC Corporation of America
WEBCAST: This webcast reveals a biometrics solution that will help identify fraud across various industries.
Posted: 02 Oct 2014 | Premiered: Oct 1, 2014

NEC Corporation of America

ROI Case Study: Cloud-Application Security Service
sponsored by Veracode, Inc.
CASE STUDY: A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Veracode, Inc.

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement