IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System Security Reports
 
Be a Web App Security Superhero
sponsored by SearchSecurity.com
EBOOK: To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015

SearchSecurity.com

Detecting Mobile App Security Gaps
sponsored by IBM
PRODUCT DEMO: Access this resource today for your free download of IBM's Security AppScan Mobile Analyzer to detect any gaps in your app mobile app security.
Posted: 24 Feb 2015 | Premiered: 04 Feb 2015

IBM

Survey Shows Need for Security Improvement
sponsored by Hewlett-Packard Company
WHITE PAPER: The following white paper explores what far too many organizations are leaving out of their IT security practices and explains what can be done to improve their overall effectiveness. Read on to learn if your own IT security protocols are leaving you open to a malicious attack.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Security Strong Enough for Today's Threats
sponsored by IBM
VIDEO: In this brief video, discover the essential components of a security system strong enough for today's threat landscape.
Posted: 21 May 2015 | Premiered: 09 Sep 2014

IBM

Getting the most out of your cloud deployment
sponsored by BitDefender
WHITE PAPER: In this white paper, discover tips for efficiently transitioning to the cloud and ensuring cloud application security.
Posted: 28 Apr 2015 | Published: 31 Dec 2014

BitDefender

Podcast: Building an Enterprise Mobility Strategy - 10 things you need to know
sponsored by MobileIron
PODCAST: In this podcast, you'll learn the 10 things you must know to build a successful enterprise mobility strategy.
Posted: 20 May 2015 | Premiered: May 20, 2015

MobileIron

Securing the Digital Enterprise: API Security for the CSO
sponsored by Apigee
WHITE PAPER: The explosive growth of APIs means that threat protection, identity services, infrastructure security, and compliance have to be at the forefront of the CSO's mind. Access this resource now to learn why built-in API security alone isn't enough, for the sake of your organization's sensitive data.
Posted: 26 May 2015 | Published: 26 May 2015

Apigee

Securing the Mobile-First Experience
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015

HID

SMS: A New Approach to Two Factor Authentication
sponsored by Nexmo
WHITE PAPER: This white paper explores how to secure enterprise data and sensitive information on mobile devices by using two factor authentication (2FA). View now to learn the 15 best practices to implementing a 2FA strategy and ensuring security success.
Posted: 22 Apr 2015 | Published: 21 Jan 2015

Nexmo

When Business is the App, The App is the Business. Volume 2
sponsored by Maas360 by IBM
WHITE PAPER: Click through to explore how building an effective strategy is key to ensuring that apps truly benefit the business while keeping corporate data and your network secure. Learn how a successful approach to appification should involve discovery, scalability, sustainability and, of course, security.
Posted: 07 Mar 2015 | Published: 07 Mar 2015

Maas360 by IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement