IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System Security Reports
 
The State of Application Delivery in APAC 2015
sponsored by F5 Networks
WHITE PAPER: In the following infographic, you will discover all you need to know about the state of application delivery in APAC in 2015. Discover why organizations are finding that success depends on the effectiveness of their security infrastructure.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

F5 Networks

4 Components of a Solid Mobile App Security Strategy
sponsored by IBM
WHITE PAPER: This white paper explains how to design a business-driven app strategy that advances business goals without putting enterprise data and your network at risk.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

IBM

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Drive Security, Efficiency and Performance with ADCs
sponsored by A10 Networks
WHITE PAPER: This white paper explores ways to deploy the application security, scalability and high performance you need to run your business. Uncover how ADCs can be used to reduce expenses, centrally assess and manage SSL libraries, and more.
Posted: 11 Feb 2016 | Published: 31 Dec 2015

A10 Networks

DevOps in Large Companies - Is It Possible?
sponsored by Apcera
WEBCAST: In this webcast, learn the how to transform culture to make DevOps possible and explore the role technology plays in the process. Explore recommendations for overcoming legacy systems, how to approach microservices and platforms as a service, the role policy plays, and more.
Posted: 08 Jan 2016 | Premiered: Dec 2, 2015


Choosing an Online Backup Tool: Why Speed Should Be a Key Consideration
sponsored by LogicNow
WHITE PAPER: This whitepaper explores an online backup solution that speeds up the process of identifying what files have been changed so that backup windows can focus on actual backups, making them faster and more efficient. Read on to see how this solution can allow your enterprise to eliminate the hassle of slow backups.
Posted: 12 Feb 2016 | Published: 31 Dec 2015

LogicNow

Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014

Citrix

Special Report: The Risks of Shadow Data
sponsored by Elastica
WHITE PAPER: Based on the analysis of over 63 million documents, this report on shadow data provides valuable insights into cloud application usage to help organizations unlock the full business potential of cloud apps while staying secure and compliant.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

Elastica

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement