IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System Security Reports
The Changing State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This report reveals just how often cloud environments are hacked and what methods are used when they are.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Alert Logic

Infographic: Application Security on Cloud
sponsored by IBM
RESOURCE: This infographic identifies an application security analyzer that can perform periodic security testing, identify high-priority vulnerabilities, and improve your overall application security program. Learn how you can secure your enterprise's application development infrastructure more effectively before applications are deployed.
Posted: 14 Oct 2015 | Published: 14 Oct 2015


Improving Web Application Firewall Security
sponsored by Akamai
WHITE PAPER: In this white paper, learn the 5 basic, yet critical, characteristics that a WAF needs to perform.View now and discover how to evaluate WAFs and go beyond the basics to defend against advanced attacks.
Posted: 04 Nov 2015 | Published: 23 Sep 2015


Keep Mobile Apps Safe With These Security Best Practices
sponsored by WhiteCryption
EGUIDE: Access this expert guide for advice on solving your mobile security challenges through better mobile app protection.
Posted: 24 Nov 2015 | Published: 24 Nov 2015


Cloud-Enabled Productivity and the Continuity of Enterprise Content
sponsored by BlackBerry
WHITE PAPER: Learn how to transform your mobile fluidity into productivity for your organization and easily safeguard your corporate data as it flows across multiple mobile endpoints, as well as examine a mobile content sharing system.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


The Power of Collaboration with an Expiration Date and Data-Centric Security
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn the role of data-centric security in expiration collaboration. Access this paper now to see why the movement of consumers to apps like Snapchat clearly presages a similar move for enterprises to EFSS tools with real expiration built in.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Web Application Firewall: Protect the Perimeter
sponsored by Akamai
WHITE PAPER: In this white paper, learn how web application firewalls (WAFs) bolster network perimeter security to stop threats before the infiltrate the enterprise.
Posted: 18 Nov 2015 | Published: 18 Jun 2014


10 Must-Have Requirements for Your Cybersecurity Solution
sponsored by Palo Alto Networks
WHITE PAPER: In this brief white paper, you will learn the top 10 must-have performance features when considering a cybersecurity program. Read on now to learn how to coordinate actions across individual security technologies, and identify threats on all apps, ports, and devices.
Posted: 14 Oct 2015 | Published: 14 Oct 2015

Palo Alto Networks

The State of Mobile Application Insecurity: Reducing the Risk of Unsecure Apps
sponsored by IBM
WHITE PAPER: In this case study, you will learn how to successfully reduce the risk of unsecured mobile apps in your business, and see what steps enterprises are taking to secure these apps.
Posted: 14 Oct 2015 | Published: 14 Oct 2015


Three Mobile Security Threats IT Should Know
sponsored by CloudMine
EGUIDE: Access this expert e-guide to get a detailed look at three mobile security threats and find out how to safeguard corporate-provided or employee-owned mobile devices in your enterprise. You'll also discover how mobile backend as a service (MBaaS) helps IT shops to bridge the gap between legacy systems and mobile devices.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement