IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed   
OS Security Reports
 
Cisco Umbrella & Duo Security: Protect users and secure access to applications
sponsored by Cisco Umbrella
DATA SHEET: As remote workstations and BYOD devices continue to rise in popularity, traditional perimeter security tactics need to me revised with focus on the network and applications. In this data sheet, discover how Cisco Umbrella and Duo Security solutions work together to achieve secure access to any device.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Cisco Umbrella

Danger Hiding in Plain Sight: Controlling Weaponizable Applications
sponsored by Panda Security
WHITE PAPER: Fileless Malware takes advantage of vulnerabilities in legitimate applications installed by default and used daily by the workforce, like Microsoft Office, WMI and Adobe, among others. Foregoing use of these apps isn’t an option, so how can you ensure that hackers won’t turn them against you? Download this e-book to learn more.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Panda Security

5 Reasons Why Using Spreadsheets for Open Source Management is a Recipe for Disaster
sponsored by Fossa
WHITE PAPER: Management of open source is a growing concern that many organizations are struggling with handling effectively. Most organizations start off managing all of their open source dependencies in a spreadsheet. In this white paper, discover 5 reasons on why that can be a recipe for disaster.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

Hybrid Cloud Security for DevOps - Solution Brief
sponsored by Trend Micro
DATA SHEET: Learn how the Trend Micro Deep Security platform automates security within your DevOps processes and delivers multiple security controls to ensure you meet compliance requirements from the first build.
Posted: 09 Mar 2020 | Published: 09 Mar 2020

Trend Micro

Why Your Company Needs Third-Party Solutions for Office 365
sponsored by Egress Software Technologies Inc
WHITE PAPER: Organizations are increasingly turning to Microsoft Office 365 as their preferred collaboration platform. While its convenience is hard to beat, security settings may not be meeting your needs. In this report, discover how your company can achieve security in Office 365 that meets compliance requirements.
Posted: 31 Jan 2020 | Published: 31 Jan 2019

Egress Software Technologies Inc

The Simple Path to Protecting and Controlling Your Application Data
sponsored by Ionic Security
RESOURCE: Learn how to use Ionic Machina to protect and control access to your application data.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Ionic Security

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

ComputerWeekly.com

WhiteHat Software Composition Analysis
sponsored by WhiteHat Security
WHITE PAPER: Leveraging 3rd party code is dangerous due to the unknown security risks – this makes software composition analysis an essential practice for all open source users. Open this open source briefing to review whether you should consider implementing a software composition analysis tool to safeguard your open source reliance.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

WhiteHat Security

Integrating Static Application Security Tools (SAST) In DevSecOps
sponsored by Valbrio
WHITE PAPER: Learn how the role of static application security testing tools (SAST) and GrammaTech CodeSonar can be used in DevSecOps and continuous development pipelines to improve quality and security and ultimately, make teams more competitive in getting market leading solutions out the door quicker.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

Valbrio

Application Security: The Easy Way
sponsored by Ionic Security
RESOURCE: Securing internal applications is a top priority among IT security teams. Yet achieving it is time & resource consuming. In fact, 76% of total IT expenditure is spent on securing internal apps. It doesn’t need to be so difficult – this blog post highlights how Ionic’s data-centric Machina Tools may be able to help. Read on to learn more.
Posted: 03 Mar 2020 | Published: 16 Aug 2018

Ionic Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info