IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System SecurityReports
 
Mitigating the OWASP Top 10 2013 with Imperva SecureSphere
sponsored by Imperva
WHITE PAPER: This informative guide outlines an effective tool designed to help mitigate the OWASP top 10 and how it can greatly enhance your enterprise security.
Posted: 08 Jul 2014 | Published: 31 Dec 2013

Imperva

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited

The Impact of Data Breaches: Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

Mobile Fraud Trends and Impact
sponsored by iovation, Inc.
WHITE PAPER: Device intelligence uncovers hidden layers of risk in mobile transactions from both web browsers and mobile applications. Get his report to learn more about mobile fraud—risks, insights and priorities.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Simply deploy, manage and secure mobile apps from the cloud
sponsored by IBM
WHITE PAPER: View this brief paper that introduces a mobile application management suite that delivers an easy-to-use enterprise app catalog with full security and operational lifecycle management of apps. Learn how this system is ideal for security sensitive data, especially in this BYOD era.
Posted: 08 Sep 2014 | Published: 28 Feb 2013

IBM

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

Citrix

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Hewlett-Packard Company

Application Delivery Optimization: Business And Technology Issues
sponsored by CA Technologies.
EGUIDE: This expert e-guide discusses the challenges of the virtual enterprise, why response time is key for application optimization and more.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CA Technologies.

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: This white paper highlights the importance of IAM strategies complying with regulations to ensure strong security.
Posted: 11 Sep 2014 | Published: 01 Apr 2014

IBM

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement