IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System Security Reports
 
Automating Cloud Infrastructure with Ansible IT Engine
sponsored by Red Hat
CASE STUDY: Examine how Splunk accelerated IT provisioning, configuration, and task management within its cloud infrastructure with an automation engine that rapidly deploys and scale server clusters and apps, configures the cloud on-demand, and autoscales infrastructure as needed.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

Red Hat

Cost-Efficient, Full Lifecycle App Security Tools
sponsored by Hewlett Packard Enterprise
VIDEO: Watch this brief video to learn about a best-in-class tool that drives down into an app's code and pinpoints its potential vulnerabilities quickly and efficiently in order to enable truly secure app development.
Posted: 10 Mar 2017 | Premiered: 02 Dec 2016

Hewlett Packard Enterprise

Deliver Secure Applications to Boost Business Productivity on Mobile Devices
sponsored by Citrix
VIDEO: Tune into this video to discover how to enforce mobile business productivity with virtual application deployment that keeps apps and data secure in the data center. Watch now to assure your mobile workforce of a user-friendly experience with secure remote access, enterprise file sync and share, and more.
Posted: 30 Aug 2016 | Premiered: 16 Aug 2016

Citrix

Top 5 Benefits of Modernizing and Mobilizing Enterprise Apps
sponsored by PowWow
RESOURCE CENTER: This custom article explores how to modernize key enterprise apps to focus on a more seamless experience for completing tasks and managing workflows. Find out how to boost employee productivity and efficiency, and uncover the top 5 benefits that are motivating the move towards modernization.
Posted: 12 Apr 2017 | Published: 12 Apr 2017


Enterprise Mobility Platform with Enterprise-Grade Security
sponsored by PowWow
WHITE PAPER: Explore how to accelerate mobile development, connect new apps to third party data sources and APIs, and modernize any enterprise app or workflow. Discover how to leverage existing APIs and containers to design, build, and deploy personalized, intelligent, and secure apps that run anywhere, on any device, and on any OS.
Posted: 16 Feb 2017 | Published: 31 Dec 2016


The Rise of Cloud-Based Application Security Vulnerabilities
sponsored by Onapsis
EGUIDE: This e-guide explores the vulnerabilities presented by mobile apps, and the steps security professionals can take to ensure those vulnerabilities are not exploited. Find out how you can improve your security practices by focusing on protecting mobile devices, discovering vulnerabilities without the aid of an HTTP(S) interface, and more.
Posted: 12 Sep 2016 | Published: 06 Sep 2016

Onapsis

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

Why DevOps + Security = A Bright Idea
sponsored by SearchSecurity.com
EBOOK: By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures.
Posted: 22 Nov 2016 | Published: 18 Nov 2016

SearchSecurity.com

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel

How Etsy's DevOps Teams Fend off Fraudsters
sponsored by BMC
EGUIDE: In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.
Posted: 14 Sep 2016 | Published: 07 Sep 2016

BMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement