IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System Security Reports
 
5 Days to Setting Up an Application Security Program
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 01 Oct 2015 | Published: 12 Jan 2015

WhiteHat Security

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

FICO and Red Hat Seed the Cloud with Enterprise Innovations
sponsored by Red Hat
WHITE PAPER: Platform-as-a-service tools have become the market's leading solution for business rules management. This white paper examines a new and emerging PaaS cloud computing solution (one of which features promises any time, on-demand access to a full-service cloud-based application platform). Read on here to learn about receiving the following benefits.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

The Continuum of Self-Service
sponsored by LogiAnalytics
WHITE PAPER: Access this white paper to find five essentials you should consider before empowering users with self-service analytics.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

LogiAnalytics

Securely Connecting Users to Cloud Apps with Integrated Cloud Access and Control
sponsored by IBM
WHITE PAPER: This research brief discusses how to employ identity as a service (IDaaS) for single sign-on (SSO) as a means to control both on-premises and mobile user cloud app usage. Access now and learn how to apply a "detect, connect, and protect" methodology to the visibility and control requirements of a cloud access security broker (CASB) offering.
Posted: 22 Dec 2015 | Published: 30 Oct 2015

IBM

Cloud Application Discovery, SSO, and Threat Prevention for Cloud Apps
sponsored by IBM
VIDEO: Watch this video, to hear about strategies for tackling cloud security challenges from cloud security expert Ravi Srinivasan.
Posted: 11 Nov 2015 | Premiered: 22 Sep 2015

IBM

How to Identify the Most Significant EMM Vendors to Date
sponsored by IBM
RESOURCE: In this report designed for I&O professionals, you will discover the 11 most significant EMM providers in the industry, and evaluate their offerings based on product capabilities, vendor strategy, and market reach. Access this exclusive report to differentiate vendors based on their data, app, and unified device management policies.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

The Top 6 Tools Users Need For Mobile Files and How to Provide them Securely
sponsored by BlackBerry
WHITE PAPER: This white paper discusses the six tools mobile users need from their file management apps and gives advice on maintaining security while providing each one.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

BlackBerry

Five Simple Strategies for Securing APIs
sponsored by CA Technologies.
EBOOK: This guide provides an overview of the unique risk profile of APIs and offers 5 simple solutions to counter common threats to their security.
Posted: 11 Jun 2015 | Published: 11 Jun 2015

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement