IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System Security Reports
 
Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by White Hat Security
WHITE PAPER: This white paper breaks down the tocal cost of web app security in the three major risk categories associated with sucessful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 16 Apr 2015 | Published: 14 Oct 2013

White Hat Security

10 Essential Elements for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 28 Jul 2015 | Published: 15 Oct 2014

Citrix

Enabling Mobile Users and Staying Compliant
sponsored by BlackBerry
WHITE PAPER: Healthcare providers find it difficult enable collaboration and efficient workflows while complying with regulations, because of the sensitive information on staff's mobile devices. Find out how a containerization, application-wrapping, and secure connectivity option can bring healthcare organizations a higher level of control and security.
Posted: 15 Apr 2015 | Published: 31 Dec 2014

BlackBerry

Don’t Let Security Technology Put the Brakes on DevOps
sponsored by CloudPassage
WHITE PAPER: This white paper explains how a cloud-based security and compliance platform can help you maintain strong security without sacrificing DevOps productivity.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER: In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

Bringing Innovative Mobile Applications to the Financial Services Industry
sponsored by Carrington Associates
WHITE PAPER: This white paper details how one electronic payment company was able to successfully develop a mobile platform to streamline business. Read on to learn how you can stay ahead of the competition by bring secure, reliable mobile applications to customers – faster.
Posted: 02 Jul 2015 | Published: 30 Sep 2014

Carrington Associates

The Merry-Go-Round of Security Testing
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

SearchSecurity.com

Defending Against Cloud Security Threats
sponsored by Data#3
WHITE PAPER: This white paper is a comprehensive guide to securing your cloud and virtual infrastructure using Microsoft Azure.
Posted: 16 Jul 2015 | Published: 28 Feb 2015

Data#3

4 Components of a Solid Mobile App Security Strategy
sponsored by IBM
WHITE PAPER: This white paper explains how to design a business-driven app strategy that advances business goals without putting enterprise data and your network at risk.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

IBM

The Security Value of a Dozen Next Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.
Posted: 18 Feb 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement