IT Management  >   Systems Design and Development  >   Application Development  >  

Security-related Design

RSS Feed    Add to Google    Add to My Yahoo!
Security-related Design Reports
A New Approach to Staying Connected in the Changing Meeting Environment
sponsored by Polycom, Inc.
WHITE PAPER: This white paper serves as a guide for employing and enhancing video collaboration in your organization, and examines how you can create a fast paced, nimble, highly collaborative work environment.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Polycom, Inc.

Predictive Mobile Security: Get Ahead of the Curve
sponsored by Lookout
WHITE PAPER: Today, big corporate breaches can attack from every angle, so you need to be prepared. View now and learn how big data enables predictive security to mitigate mobile threats before they come in.
Posted: 19 Aug 2015 | Published: 19 Aug 2015


Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

A Guide to Security and Privacy in a Hosted Exchange Environment
sponsored by Intermedia.Net
WHITE PAPER: This white paper will assist you in choosing the right hosted Exchange environment for you, with top-notch provider security. Access this white paper to improve your Exchange experience and get exclusive access to a checklist comparison of hosted Exchange providers' security offerings.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013


The Total Economic Impact of Polycom Voice Solutions for Skype for Business
sponsored by Polycom, Inc.
WHITE PAPER: Access this Forrester report and learn more about a framework to examine your return on investment (ROI) by deploying several of these emerging unified communications (UC) technologies.
Posted: 20 Nov 2015 | Published: 31 Jan 2014

Polycom, Inc.

2012 Cost of Cyber Crime Study: UK
sponsored by
RESEARCH CONTENT: The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

Integrate the Cloud into Your Business Lifecycle and Mobile App Management
sponsored by Oracle Corporation
WHITE PAPER: This white paper outlines several mobility strategies that will help your organization embrace and mobilize cloud applications. Read on to extend and secure your mobile apps, and learn how deploy to apps in the cloud while diagnosing performance and usage.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Oracle Corporation

Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER: This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Entrust, Inc.

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement