IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System SecurityReports
 
Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

Citrix

An EMM Checklist for CIOs: Factors to Consider When Choosing an EMM Solution
sponsored by BlackBerry
WHITE PAPER: For help deciding on an Enterprise Mobility Management (EMM) solution consider the issues in the following white paper. It's derived from third-party research and best practices. It covers the critical areas you'll need to think through as you arrive at a decision. It also provides a CIO's Guide to EMM.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

BlackBerry

Secure Cloud Applications Without Disrupting Your Enterprise Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features an on-premise federated identity service that helps you extent your existing identity and access management (IAM) infrastructures to the cloud.
Posted: 05 Jun 2014 | Published: 31 Dec 2012

Radiant Logic, Inc.

An EMM Checklist for CIOs: Factors to Consider When Choosing an EMM Solution
sponsored by BlackBerry
WHITE PAPER: For help deciding on an Enterprise Mobility Management (EMM) solution consider the issues in the following white paper. It's derived from third-party research and best practices. It covers the critical areas you'll need to think through as you arrive at a decision. It also provides a CIO's Guide to EMM.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

BlackBerry

Application Delivery Optimization: Business And Technology Issues
sponsored by CA Technologies.
EGUIDE: This expert e-guide discusses the challenges of the virtual enterprise, why response time is key for application optimization and more.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CA Technologies.

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

The Impact of Data Breaches: Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

Next generation firewall product analysis
sponsored by Fortinet, Inc.
WHITE PAPER: This resource contains a product analysis of a next generation firewall (NGFW) that discusses security, performance, TCO and several other categories that are not available anywhere else.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Fortinet, Inc.

Mitigating the OWASP Top 10 2013 with Imperva SecureSphere
sponsored by Imperva
WHITE PAPER: This informative guide outlines an effective tool designed to help mitigate the OWASP top 10 and how it can greatly enhance your enterprise security.
Posted: 08 Jul 2014 | Published: 31 Dec 2013

Imperva

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement