IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed    Add to Google    Add to My Yahoo!
Software Security Reports
 
Game of Phones: Which Device Will Rule EMM for All?
sponsored by IBM
WEBCAST: With an increase of bring your own device (BYOD) spaces, employees can perform their day-to-day work in a more flexible and productive way. This recorded webcast stacks up the top EMM operating system contenders: Apple's iOS, Android, and Windows. Click here to see which device and OS overcomes its competitors in the battle of EMM supremacy.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015

IBM

Cloud Collaboration at Its Finest: Trek Bicycle Case Study
sponsored by Microsoft
WEBCAST: This webcast serves as a case study of Trek Bicycle, and examines how Trek uses Microsoft Dynamics and Microsoft Dynamics CRM to support their local sales reps and build relationships with their customers. Click here to see how you can shape your enterprise's future in the cloud.
Posted: 12 Aug 2015 | Premiered: Jul 10, 2014

Microsoft

Unified Network Solutions Case Study: Kettering Health Network
sponsored by F5 Networks
WHITE PAPER: This white paper demonstrates how the KHN was able to achieve access to its electronic medical records system and other apps for its remote users. Read on here to key into the benefits of a unified network solution.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

F5 Networks

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper debunks the top 10 misconceptions about mobile device management and security.
Posted: 16 Jul 2015 | Published: 16 May 2014

IBM

Unlock Your Customer Identities: Virtualize SQL to Deliver Better Security and Services
sponsored by Radiant Logic, Inc.
WEBCAST: This webinar explains how a common identity service for all constituents can improve security and deliver better services to your customers.
Posted: 25 Jun 2015 | Premiered: Mar 9, 2015

Radiant Logic, Inc.

Cloud-Based Application Security Practices: Prevent a Breach
sponsored by Hewlett-Packard Company
EGUIDE: This expert e-guide reveals the 3 key best practices for preventing cloud-app security breaches and patching vulnerabilities. Learn how to use such technologies as encryption, sandboxing, and log monitoring to ensure data protection.
Posted: 22 May 2015 | Published: 01 Apr 2015

Hewlett-Packard Company

Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: This white paper explores how to use device security telemetry to form a digital firmware fingerprint on each device to identify when one is vulnerable or has been compromised through jailbreak.
Posted: 22 Jul 2015 | Published: 24 Jun 2015

Lookout

8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Kony

Upgrades are Inevitable, Breaches Don't Have to Be
sponsored by IBM
RESOURCE: This checklist is an essential guide for securing company devices prior to new operating system releases. Uncover strategies to help you equip your organization with security capabilities that protect valuable information.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

IBM

Securing Your Customers Online
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses how you can easily add a second level of authentication to your web applications without inconveniencing your users.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement