IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed   
SQL Injection White Papers (View All Report Types)
 
2018 Security Predictions
sponsored by Splunk
WHITE PAPER: What will the future bring for security? This resource offers predictions for 2018, such as how machine learning and DevSecOps will impact and benefit security strategies.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Splunk

Virtualization And The Digital Workspace
sponsored by VMware
WHITE PAPER: Download this white paper to discover five considerations to take into account to integrate virtualization into your digital workspace strategy and tackle the challenge of today's mobile, dynamic workforce.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

VMware

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 24 Jan 2018 | Published: 28 Sep 2017

SyncDog

Maintaining Business Continuity & Security for Your Organization
sponsored by Citrix
WHITE PAPER: Whether planned or unplanned, business disruptions that aren't managed effectively come at a high cost. This white paper offers strategies for keeping your company productive during unplanned security incidents.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Citrix

Microservices vs. Service-Oriented Architecture
sponsored by NGINX
WHITE PAPER: Both microservices architecture and SOA are considered service-based architectures with shared characteristics, but very different architecture styles. This 50+ page e-book compares the two architectures to enable you to make the best choice to meet your organization's unique needs.
Posted: 11 Jan 2018 | Published: 11 Jan 2018

NGINX

Analysts Reveal how to Secure SaaS
sponsored by Palo Alto Networks
WHITE PAPER: This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Application Security Buyers Guide: 15 Requirements
sponsored by Rapid7
WHITE PAPER: In this white paper, learn the 15 elements you need to make sure an application scanning vendor has before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Rapid7

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services
WHITE PAPER: You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.
Posted: 16 Oct 2017 | Published: 31 May 2017

Amazon Web Services

The Massive Mobile Migration
sponsored by IBM
WHITE PAPER: The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.
Posted: 03 Mar 2017 | Published: 27 Apr 2016

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement