IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System Security Reports
Protect Your Business Critical Apps from Compromise
sponsored by Onapsis
WHITE PAPER: This white paper describes how, with technologies ranging from vulnerability management to advanced threat protection, you can make sure your SAP applications stay secure.
Posted: 18 Aug 2015 | Published: 31 May 2015


Proactive Security Testing: Make Your Products Bullet-Proof
sponsored by Beyondsoft
WHITE PAPER: In this white paper, learn how truly secure products and infrastructure require testing and measurement, and how to you can implement vulnerability protection that is sustainable and cost-effective for bullet-proof security.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Cloud Security: Revealing Shadow Data
sponsored by Elastica
WEBCAST: This webcast presents how Shadow Data creates countless vulnerabilities in your cloud security strategy.
Posted: 08 Sep 2015 | Premiered: Aug 19, 2015


Cloud Security: Expand Your Cloud Offering and Protect Your Services
sponsored by Radware
WHITE PAPER: This white paper examines the unique security challenges CSPs are up against and how to protect your organization's infrastructure from advanced threats.
Posted: 01 Oct 2015 | Published: 05 Jan 2012


Top 10 Security Considerations for the Internet of Things
sponsored by Axway
WHITE PAPER: Access this white paper and discover how IoT is shaping the landscape of application lifecycle management, logic, and data-access chores. In addition, learn 10 top security considerations IoT and how these can impact your software development projects.
Posted: 21 Jul 2015 | Published: 21 Jul 2015


BYOD and Other Security Policies to Consider
sponsored by Absolute
EGUIDE: In this expert e-guide, you'll learn insider tips on how to better control mobile data inside and outside of the enterprise.
Posted: 17 Sep 2015 | Published: 02 Sep 2015


Untangling Work and Personal Data with Enterprise MAM
sponsored by SearchMobileComputing
EBOOK: This exclusive three-part guide explains how and why IT should use MAM to control applications from start to finish. Read on here to see how your business can securely enable successful enterprise mobility, and get an inside look at an MAM comparison: app wrapping versus containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015


Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about the prevalence of jailbroken iOS devices and how to protect against jailbroken device risks.
Posted: 25 Aug 2015 | Published: 24 Jun 2015


The 2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad view of the 2015 threat landscape and gives you the insight you need to protect your business from both known vulnerabilities and unknown exploits.
Posted: 29 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Protecting Applications from the Server to the Endpoint
sponsored by Bit9 + Carbon Black
WHITE PAPER: This brief white paper examines a holistic security approach to prevent data breaches.
Posted: 18 Jun 2015 | Published: 27 Mar 2015

Bit9 + Carbon Black
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement