IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed    Add to Google    Add to My Yahoo!
Software Security Reports
 
Mobile API Gateway: Improve Mobile App Development, Security, and UX
sponsored by CA Technologies
WHITE PAPER: Explore how to simplify the process of adapting internal data, apps, and security infrastructure for mobile and IoT, and learn about the CA Mobile API Gateway.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

CA Technologies

Virtualize Skype for Business for Secure Unified Communications
sponsored by Citrix
RESOURCE: With thousands of distributed devices, a traditional Skype for Business deployment exposes you to risk. When virtualized instead, however, sensitive chat logs and file exchanges are securely stored in the datacenter, dramatically reducing risk. Download this resource to discover additional benefits of virtualizing Skype for Business.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Citrix

How CA API Gateway Can Help Business Embrace the Cloud
sponsored by CA Technologies
RESOURCE: In this resource, learn about the key features of the CA API Gateway for exposing even legacy apps to mobile devices, cloud services, developers, and more.
Posted: 04 Dec 2017 | Published: 04 Dec 2017

CA Technologies

Top 10 AWS Cloud Security Risks and how to Resolve them
sponsored by evident.io
WHITE PAPER: While AWS ensures the security of the cloud, you have a responsibility to manage the security of your data and systems in the cloud. Uncover 10 security risks found in AWS deployments, why they are important, and how they are remediated.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

evident.io

Top 3 Ways HyperScale for OpenStack Protects your Applications and Data
sponsored by Veritas
WHITE PAPER: Ensuring adequate data protection is critical before placing workloads (and the corresponding data that they operate upon) into production. This tip sheet outlines the 3 ways in which Veritas HyperScale for OpenStack keeps your applications and data safe.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veritas

Deploying Your API Infrastructure: Cloud, On-Premises or Both?
sponsored by CA Technologies
WHITE PAPER: Find out how to approach API management from a usage model perspective, and learn about an end-to-end API management platform that offers secure cloud, on-premise, and hybrid deployment options.
Posted: 08 Dec 2017 | Published: 31 Dec 2016

CA Technologies

Secure Mobile App Development with PowWow Smart UX & VMware Workspace ONE
sponsored by PowWow
WHITE PAPER: Learn how to create, secure, deploy, and manage next-gen mobile apps quickly and efficiently with the PowWow Smart UX and VMware Workspace ONE platforms.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

PowWow

ExpensiveWall: A Dangerous 'Packed' Malware on Google Play that will Hit You in Your Wallet!
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Go inside this resource to learn what makes the new malware found on Google Play, nicknamed "ExpensiveWall" so unique and dangerous, as well as what steps you can take to stay protected.
Posted: 17 Oct 2017 | Published: 14 Sep 2017

Check Point Software Technologies Ltd.

Virtualization And The Digital Workspace
sponsored by VMware
WHITE PAPER: Download this white paper to discover five considerations to take into account to integrate virtualization into your digital workspace strategy and tackle the challenge of today's mobile, dynamic workforce.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

VMware

Mobile Management for Android Devices
sponsored by SOTI Inc.
WHITE PAPER: Download this white paper to discover a mobile device management platform with Android management capabilities that ensures devices are secured, managed and supported, regardless of OS version or device manufacturer.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

SOTI Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement