IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed    Add to Google    Add to My Yahoo!
PDD 63 Reports
Security and Compliance: The New Watchwords of Enterprise App Delivery
sponsored by IBM
WHITE PAPER: This white paper examines the driving forces behind the establishment of corporate application stores, and highlights one best-in-class mobile app management (MAM) program. Read on to learn how to ride the crest of this new wave of mobility and enhance your enterprise app security.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


State of File Collaboration Security
sponsored by FinalCode
WHITE PAPER: Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015


When Business is the App, the App is the Business: Securing Enterprise Apps
sponsored by IBM
WHITE PAPER: In this report, you will learn the key security dangers enterprise mobile apps face, and find out how to eliminate these threats them in your app-driven business. Access this comprehensive white paper now to optimize the use of apps in your business.
Posted: 07 Oct 2015 | Published: 07 Oct 2015


Best Practices for Implementing Converged Infrastructure in the Data Center
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert guide details some best practices for implementing converged infrastructure in a way that works for you.
Posted: 02 Oct 2015 | Published: 02 Oct 2015

Dell, Inc. and Intel®

Building your Business Case for Cloud Collaboration
sponsored by Cisco
WHITE PAPER: This resource highlights the experiences of customers who replaced their on-premises communications systems. Learn how the cloud can reduce complexity for collaborative users.
Posted: 05 Oct 2015 | Published: 31 Dec 2013


A Guide to Security and Privacy in a Hosted Exchange Environment
sponsored by Intermedia.Net
WHITE PAPER: This white paper will assist you in choosing the right hosted Exchange environment for you, with top-notch provider security. Access this white paper to improve your Exchange experience and get exclusive access to a checklist comparison of hosted Exchange providers' security offerings.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


What to Look for in Vulnerability Management
sponsored by
EBOOK: This Buyer's Essentials guides InfoSec pros in the assessment and purchase of vulnerability management tools. It explains how they work and highlights key features corporate buyers should look for.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

TOPICS:  Security

Web application firewall provides continuous web app protection
sponsored by Trustwave
PRODUCT OVERVIEW: Access this white paper to learn about a web application firewall appliance that provides real-time, continuous security against attacks and data loss and assures that your web applications operate as intended and are compliant with industry regulations and discover how you can protect against the loss of sensitive information.
Posted: 06 Oct 2015 | Published: 31 Dec 2014


Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER: Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


PCI 3.0: Top 10 Ways PCI 3.0 Will Affect Your Application Security Program
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast provides a detailed description about how the newest PCI requirements will affect your application security program.
Posted: 01 Oct 2015 | Premiered: Dec 31, 2013

WhiteHat Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement