IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed    Add to Google    Add to My Yahoo!
Operating System Security Reports
Application Session Filtering
sponsored by Gigamon
PRODUCT LITERATURE: This feature brief discusses a way to filter your applications in order to optimize application inspection and identification.
Posted: 20 Aug 2015 | Published: 20 Aug 2015


Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

An Unlikely Partnership? Application Security and Development
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the tension between development and security teams and proposes an approach to building security into the software development lifecycle.
Posted: 04 Sep 2015 | Published: 19 Aug 2015

Hewlett-Packard Company

Unlock Your Customer Identities: Virtualize SQL to Deliver Better Security and Services
sponsored by Radiant Logic, Inc.
WEBCAST: This webinar explains how a common identity service for all constituents can improve security and deliver better services to your customers.
Posted: 25 Jun 2015 | Premiered: Mar 9, 2015

Radiant Logic, Inc.

BYOD and Other Security Policies to Consider
sponsored by Absolute
EGUIDE: In this expert e-guide, you'll learn insider tips on how to better control mobile data inside and outside of the enterprise.
Posted: 17 Sep 2015 | Published: 02 Sep 2015


Best Practices for Avoiding Application Security Vulnerabilities
sponsored by Hewlett-Packard Company
EGUIDE: Can security impact application performance? This expert eGuide examines common application security vulnerabilities that might be slowing you down, as well as the common vulnerabilities enterprises face
Posted: 22 May 2015 | Published: 13 May 2015

Hewlett-Packard Company

What to Look For in a Web Application Scanner
sponsored by
EBOOK: With so many Web applications on enterprise networks today, a scanner is essential to security. Here's what you need to know if you're in the market for a Web app scanner.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

Integrating Security Across the Software Development Lifecycle (SDLC)
sponsored by WhiteHat Security
CASE STUDY: In this white paper, you will learn how to not only identify and remediate web app vulnerabilities, but to integrate security into the software development lifecycle (SDLC). Access now to learn more.
Posted: 01 Oct 2015 | Published: 03 Jan 2014

WhiteHat Security

Mobile Enterprise Apps: Expert Tips to Eliminate Top Security Risks
sponsored by IBM
WHITE PAPER: In this white paper, learn the key security dangers of mobile apps in the enterprise and discover expert tips on how to eliminate them in your app-driven business.
Posted: 12 Aug 2015 | Published: 12 Aug 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement