IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System SecurityReports
 
Secure Your Social Enterprise
sponsored by Hootsuite
WEBCAST: As enterprises become more active in social media, it can become difficult to keep track of all social accounts. Finding new fake or hijacked accounts isn't easy, and false representations of your company can seriously harm your brand. How can you protect your social media accounts from hackers and spammers? Find out in this comprehensive webcast.
Posted: 21 Nov 2013 | Premiered: Nov 21, 2013

Hootsuite

How XenApp and XenDesktop Dramatically Simplify Data Protection, Access Control, and other Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Does Application Security Pay? Measuring the Business Impact of Software Security Assurance Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce applications vulnerabilities, speed recovery time and minimize delays. Read on to learn more.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Hewlett-Packard Company

Designing a defense for mobile application
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper you will learn about the various considerations for defending mobile applications—from the mobile application architecture itself to the myriad testing technologies.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

Hewlett-Packard Company

Case Study: SEEK Protects Sites with Web Application Security Firewall
sponsored by Imperva
WEBCAST: This case study features one organization's experience with a Web application security solution that tackled technical, logic, denial-of-service, and fraud attacks to reduce risk and save its reputation.
Posted: 21 Feb 2014 | Premiered: Mar 19, 2013

Imperva

Companies are driving the growth of the cloud
sponsored by CentraStage
WHITE PAPER: This white paper investigates how companies and organizations are increasingly adopting cloud services for more secure and efficient device management. Inside, discover how the movement toward more automated solutions is benefiting the user experience and, ultimately, business.  
Posted: 13 Mar 2014 | Published: 13 Mar 2014

CentraStage

Five Common Web Application Vulnerabilities and How to Avoid Them
sponsored by Imperva
EGUIDE: In this E-Guide, expert Michael Cobb details the five most common Web application vulnerabilities and provides methods to help enterprises fix the original problems.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Imperva

The DDoS Threat Spectrum
sponsored by F5 Networks
WHITE PAPER: This crucial paper takes an in-depth look at the evolution of DDoS attacks, outlining their history, present landscape and potential future so that your organization can understand what may be coming on the horizon and take the necessary precautions to ensure data protection and business continuity.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

F5 Networks

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys

Exposing the Beast - Custom API Mgt for the Enterprise
sponsored by Intel Corporation
WEBCAST: In this exclusive webcast, explore the key enterprise categories for B2B, internal, and open Web API models and discover sample use cases that highlight how an API platform simplifies API delivery and management.
Posted: 01 Nov 2013 | Premiered: Nov 4, 2013

Intel Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement