IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed    Add to Google    Add to My Yahoo!
OS Security Reports
 
Barracuda NG Firewall Model F1000
sponsored by Barracuda Networks
WHITE PAPER: This white paper shows you how to centrally control your security system to prevent it from weakening over time as the infrastructure evolves. Learn how to strengthen your perimeter firewall protection while enabling flexibility to allow for change in the future.
Posted: 06 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM
WHITE PAPER: This white paper teaches you how to safely embark on your own BYOD program. The main goal is to show you how BYOD is a feasible option for your organization by seamlessly securing corporate data and applications on each devices while providing separation from personal activity and data.
Posted: 22 Apr 2016 | Published: 01 Mar 2016

IBM

How IoT Is Making Security Imperative for All Embedded Software
sponsored by Programming Research
WHITE PAPER: This resource discusses the unique challenges of securing embedded applications and explains how to overcome these obstacles with static code analysis tools. Discover how you can identify and eliminate defects earlier on in the development cycle.
Posted: 10 Mar 2016 | Published: 10 Mar 2016

Programming Research

Developing Secure Embedded Software: Quality Doesn't Equal Security
sponsored by Programming Research
WHITE PAPER: This white paper debunks 4 common misconceptions about software security and describes a variety of tools to improve embedded software security by detecting issues earlier on in development. Learn about the benefits of strategies like risk and threat management, application lifecycle management, static code analysis, and more.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

Customer story - Broward Health
sponsored by Citrix
VIDEO: Watch this video to learn how one of the largest healthcare systems in the United States was able to adopt a suite of products that enabled improved efficiency, mobility and security, the three most important aspects to the industry.
Posted: 13 May 2016 | Premiered: 08 Oct 2013

Citrix

The Evolution of Wireless Business Continuity
sponsored by Accelerated Concepts
WHITE PAPER: Discover in this white paper how to avoid expensive outages and downtime that drastically impact your reputation by formulating a business continuity plan with first-class connectivity. Learn how to take advantage of the expanding IoT to back up your business-critical data, devices, and more.
Posted: 05 May 2016 | Published: 31 Jan 2016

Accelerated Concepts

Taking Container Security to the Next Level Final
sponsored by Black Duck Software
WHITE PAPER: This white paper explores the security concerns around container use and details how you can enact measures to mitigate the dangers. Access now and learn how you can protect code integrity when containers are in use and safely utilize open source code in general.
Posted: 03 May 2016 | Published: 01 Apr 2016

Black Duck Software

Data Theft Prevention The Key to Security, Growth & Innovation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you a holistic approach to protecting your critical data. Learn about cybersecurity from a Data Theft Prevention perspective, which is broader in scope and more effective in defending sensitive information.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Security Analysis: Mobile Dating Apps Vulnerabilities and Risks to Enterprises
sponsored by IBM
WHITE PAPER: Why should you be paying attention to personal apps used on corporate devices? Get an understanding of which applications are vulnerable to attacks and take action to blacklist at-risk applications from running on a device with corporate data.
Posted: 04 May 2016 | Published: 01 Feb 2015

IBM

Illuminate Shadow IT and Securely Manage BYOX
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper discusses BYOX and explores strategies and solutions for embracing the business productivity aspects of a BYOX workforce culture. Access now to learn how you can promote a faster, flexible and mobile workforce while protecting your organization from security pitfalls.
Posted: 14 Apr 2016 | Published: 01 Apr 2013

WatchGuard Technologies, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement