IT Management  >   Systems Design and Development  >   Application Development  >  

Security-related Design

RSS Feed    Add to Google    Add to My Yahoo!
Security-related Design Reports
 
FICO and Red Hat Seed the Cloud with Enterprise Innovations
sponsored by Red Hat
WHITE PAPER: Platform-as-a-service tools have become the market's leading solution for business rules management. This white paper examines a new and emerging PaaS cloud computing solution (one of which features promises any time, on-demand access to a full-service cloud-based application platform). Read on here to learn about receiving the following benefits.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

Ready Your Organization for an Enterprise Voice Transition to the Cloud
sponsored by Polycom, Inc.
WHITE PAPER: This exclusive white paper provides an outline for the benefits and considerations of balancing the transition of voice collaboration to the cloud. Continue reading to understand the key benefits UC and collaboration can bring to the modern workplace.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Polycom, Inc.

How to Increase Video Adoption in Multi-Vendor Environments
sponsored by Polycom, Inc.
WHITE PAPER: This white paper offers a series of questions to ask your enterprise when considering an enhanced video collaboration experience. Get the answers you are looking for when operating between multi-vendor platforms.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Polycom, Inc.

WAN optimization: Expert guidelines to management and security
sponsored by SearchEnterpriseWAN.com
EBOOK: What is the next step for WAN management? This expert guide explains why WAN optimization is now the norm and provides guidelines for an all-in-one solution to minimize cost, complexity, and risk within your organization.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

SearchEnterpriseWAN.com

Panasonic ToughPad FZ-E1: Spec Sheet
sponsored by Panasonic - Microsoft
WHITE PAPER: Download and discover all the tech specs and performance features for what just might be the smartest investment you make in your mobile workforce all year.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Panasonic - Microsoft

The Strategic Impact of Mobile Transformation on Business Value
sponsored by VMware, Inc.
WHITE PAPER: This white paper serves as a survey of organizations in education, healthcare, high tech, and retail about the state of their mobile computing efforts. Access this analysis to see three major themes highlighted that are critical for success in mobile transformation.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

VMware, Inc.

The Importance of Secure Application Development Lifecycles
sponsored by WhiteHat Security
EGUIDE: This expert e-guide lays out four steps to implementing secure code. View now to learn how to develop the skills to mitigate malware attacks at the application layer. Additionally, examine the the myths about compliance-ready web app security assessment tools.
Posted: 07 May 2015 | Published: 11 Mar 2015

WhiteHat Security

Driving Adoption of New Web Conferencing Technologies
sponsored by Vyopta
WHITE PAPER: This e-book guide explains how utilizing collaboration analytics minimizes wasted resources within your company, and allows you to align its usage with your specific business goals. Read on to find out more about strategies for scaling your collaboration usage and adoption.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Vyopta

Demand Secure and Durable Enterprise Performance with Tablets
sponsored by Panasonic - Microsoft
WHITE PAPER: This white paper serves as a guide for how to find tablets that will adapt to your shifting enterprise application demands. Read on here to evaluate several rugged tablet platforms designed to boost mobility and productivity.
Posted: 25 Aug 2015 | Published: 28 Feb 2014

Panasonic - Microsoft

Application Security Advice: Stop Threats before They Start
sponsored by SearchSoftwareQuality.com
EBOOK: Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle.
Posted: 20 May 2014 | Published: 20 May 2014

SearchSoftwareQuality.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement