IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System Security Reports
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
sponsored by OneLogin
WEBCAST: In this webinar Garrett Bekker, Senior Analyst for 451 Research explores the current state of identity management and discusses some of the emerging access control technologies that can help address these challenges.
Posted: 07 Jul 2016 | Premiered: Jun 1, 2016

OneLogin

Data Security for the Digital Businesses
sponsored by HPE and IntelĀ®
VIDEO: How do you know if your data is secure? Uncover 3 questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.
Posted: 01 Jul 2016 | Premiered: 03 Feb 2016

HPE and IntelĀ®

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

App Development Strategies fit for Governments
sponsored by Red Hat
WHITE PAPER: Application development, deployment, and ongoing management doesn't have to be difficult. Discover secure ways to implement DevOps practices using open-source tools.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Red Hat

Best Practices for Writing Secure iOS and Android Apps
sponsored by Proofpoint, Inc.
WHITE PAPER: As mobile applications grow to reach wider audiences, they become larger targets for cyberattackers. Access this list of 21 mobile security guidelines for developers and security pros when developing Android and iOS mobile apps. Learn how to provide security at every step of the mobile application development and management processes.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Proofpoint, Inc.

Approaching Office 365 with a New Mobile Security Model
sponsored by MobileIron
WHITE PAPER: Learn how your enterprise can approach securing Office 365 for mobile devices. Discover not only what needs to be done to distribute apps securely, but also protect app data-at-rest, data-in-motion, and more.
Posted: 09 Sep 2016 | Published: 09 Sep 2016

MobileIron

Get To Market Faster
sponsored by CloudMine
CASE STUDY: Discover how a healthcare organization with limited technology resources was able to deploy a feature-rich, HIPAA-compliant mobile app less than 2 months after developing initial app concepts.
Posted: 30 Jun 2016 | Published: 30 Jun 2016


Tolly Test Report: Evaluating a Web Protection Vendor
sponsored by IBM
WHITE PAPER: In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.
Posted: 29 Aug 2016 | Published: 01 Jun 2016

IBM

GigaSECURE Security Delivery Platform
sponsored by Gigamon
VIDEO: Discover how to shift your security strategy from perimeter defenses towards a detect and protect frameworkm gaining greater visibility in the process. Learn how to extend the reach of your security applications everywhere on your network by giving them the right traffic at the right time.
Posted: 23 Sep 2016 | Premiered: 04 Aug 2015

Gigamon

Manage Change, Enforce Security, and Incorporate Cloud in Your Windows Ecosystem
sponsored by Puppet
WHITE PAPER: Learn where to incorporate better levels of control, and how to automate the delivery and operation of Windows applications on premise and in the cloud. Plus, uncover the 5 questions decision-makers in a business need to be asking.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Puppet
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement