IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed    Add to Google    Add to My Yahoo!
OS Security Reports
Mobile Security Threats: Get Ready for 2016
sponsored by CloudMine
WHITE PAPER: This valuable resource will help your organization to bolster your mobile security defenses as you race to adopt new technologies to stay ever-more innovative and agile. View now to discover 6 top mobile security threats, as well as 8 best practices for securing your enterprise mobile apps.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

Webinar: The Importance of Identity Management within an Office 365 Implementation
sponsored by Ping Identity Corporation
WEBCAST: Examine the pros and cons of each Microsoft Office 365 IAM approaches as well as a 5 question IAM self-evaluation guide to aid you in building your strategy. Discover the IAM requirements to secure access beyond Office 365 as well as third-party approaches that may bring you closer to your security goals.
Posted: 26 Oct 2015 | Premiered: Sep 30, 2015

Ping Identity Corporation

Ten Areas of Difference Between Citrix and VMware Application Virtualization Solutions
sponsored by Citrix
WHITE PAPER: This white paper offers important questions to consider when selecting an application virtualization solution. Access now to see which solution can provide your enterprise with full mobile productivity, great user experience, rich features to make life easier for IT, and security and compliance capabilities to help protect your organization.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Three Mobile Security Threats IT Should Know
sponsored by CloudMine
EGUIDE: Access this expert e-guide to get a detailed look at three mobile security threats and find out how to safeguard corporate-provided or employee-owned mobile devices in your enterprise. You'll also discover how mobile backend as a service (MBaaS) helps IT shops to bridge the gap between legacy systems and mobile devices.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

10 Must-Have Requirements for Your Cybersecurity Solution
sponsored by Palo Alto Networks
WHITE PAPER: In this brief white paper, you will learn the top 10 must-have performance features when considering a cybersecurity program. Read on now to learn how to coordinate actions across individual security technologies, and identify threats on all apps, ports, and devices.
Posted: 14 Oct 2015 | Published: 14 Oct 2015

Palo Alto Networks

Protection from the Inside: Application Security Methodologies Compared
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this paper, the SANS Institute captures the relative capabilities and efficiencies of RASP and WAF technologies using a representative product in each category. Learn how your defense-in-depth strategy could benefit from the additional visibility of runtime protection.
Posted: 18 Nov 2015 | Published: 16 Apr 2015

Hewlett Packard Enterprise

The Cloud App Visibility Blind Spot
sponsored by Imperva
WHITE PAPER: This white paper covers the significant blindspot in visibility and increased risks for organizations in the face of "Shadow IT". In addition, this paper covers why traditional controls that secure your on-premise environment don't provide the required visibility into user activity and risks related to cloud app use.
Posted: 05 Oct 2015 | Published: 30 Sep 2015


The State of Application Delivery in APAC 2015
sponsored by F5 Networks
WHITE PAPER: In the following infographic, you will discover all you need to know about the state of application delivery in APAC in 2015. Discover why organizations are finding that success depends on the effectiveness of their security infrastructure.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

F5 Networks

Security and Compliance: The New Watchwords of Enterprise App Delivery
sponsored by IBM
WHITE PAPER: This white paper examines the driving forces behind the establishment of corporate application stores, and highlights one best-in-class mobile app management (MAM) program. Read on to learn how to ride the crest of this new wave of mobility and enhance your enterprise app security.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: This security report provides a penetrating analysis of how IT security professionals perceive cyberthreats and plan their defense against them. Read on to learn how software defined networking (SDN) can help to mitigate this onslaught of threats.
Posted: 06 Nov 2015 | Published: 06 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement