IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed   
Operating System Security White Papers (View All Report Types)
 
The Fundamentals of a Secure Application Infrastructure
sponsored by VMware
WHITE PAPER: As people, devices, and objects become more connected, protecting these connections and environments has become more critical than ever. Explore this resource to gain insight into securing the application infrastructure and remaining protected in the age of constant communication.
Posted: 28 Mar 2018 | Published: 28 Mar 2018

VMware

Security for your Cloud-based Web Applications
sponsored by Alert Logic
WHITE PAPER: This Aberdeen Research paper explores the complexity and change in security of cloud-based Web applications and how a "stacked" security approach can prevent DDoS attacks.
Posted: 11 Sep 2017 | Published: 30 Apr 2017

Alert Logic

Application Security Buyers Guide: 15 Requirements
sponsored by Rapid7
WHITE PAPER: In this white paper, learn the 15 elements you need to make sure an application scanning vendor has before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Rapid7

Design Secure Software from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: Explore 6 benefits for developers of a fully automated static analysis security testing (SAST) tool that can bring a focus on security into the beginning of the software development lifecycle.
Posted: 22 Jan 2018 | Published: 31 Dec 2017

WhiteHat Security

A Strategic Approach to Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: App vulnerabilities originate with the source code, and you'll want to secure more of your source code in both development and production. But it's easier said than done for security pros to review source code continuously. Uncover a new static application security testing subscription service to address this problem.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

WhiteHat Security

A WhiteHat Sentinel Product Family Overview
sponsored by WhiteHat Security
WHITE PAPER: In this white paper learn how WhiteHat Sentinel, a SaaS product suite combines application scanning with one of the world's largest threat research team to provide you with 3 different types of analysis to ensure your apps are safe, no matter where they live.
Posted: 19 Jan 2018 | Published: 30 Dec 2016

WhiteHat Security

Breaking the Bottlenecks in Your SDLC
sponsored by Blueprint Software
WHITE PAPER: Discover how to apply the principles of Agile throughout the software development lifecycle (SDLC) and to the enterprise as a whole so that you can achieve Agile development at scale.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Blueprint Software

Microservices and Container Security
sponsored by Sysdig
WHITE PAPER: If you're considering a move to microservices and/or containers, you will need to rethink the security infrastructure surrounding your applications and testing processes. Use this container and microservices RFP template to help make your decision by comparing several different vendors across runtime security, incident response, and more.
Posted: 04 Apr 2018 | Published: 05 Apr 2018

Sysdig

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

Cloud Solution Enables Security for Highly Regulated Industries
sponsored by TeraGo Networks
WHITE PAPER: Explore this case study to uncover how Virtual StrongBox was able to implement a technology to revolutionize cloud security and protect its customers.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

TeraGo Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement