IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed   
Operating System Security Reports
 
The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications
sponsored by Cyber-Ark Software
WHITE PAPER: The digital transformation of enterprise IT has increased the challenge of protecting business critical applications. Securing business-critical applications means access must be reserved for individuals with the proper credentials and permissions. In this white paper, learn 5 key requirements to better protect your business critical applications.
Posted: 12 Jul 2019 | Published: 31 Mar 2019

Cyber-Ark Software

A New Approach to Secure Mobile Banking Apps
sponsored by Arxan
WHITE PAPER: Customer demand has pushed for standardized mobile banking, which means financial institutions are required to properly handle the heightened security requirements that come with it. Read this whitepaper to learn the 3 transformational benefits of a well-designed endpoint security strategy for mobile banking applications.
Posted: 22 Jul 2019 | Published: 31 Dec 2018

Arxan

Securing the Mobile and API Connected Work Space: Evernote Case Study
sponsored by Data Theorem
VIDEO: Evernote is a global software provider of mobile applications for individuals and teams. In this video, learn how Data Theorem helped Evernote identify and close 105 security issues and remove 17 harmful third-party libraries, all before releasing them to the public app stores.
Posted: 18 Sep 2019 | Premiered: 18 Sep 2019

Data Theorem

Organizations are failing to protect sensitive data in the cloud
sponsored by Thales
WHITE PAPER: This infographic highlights some of the key takeaways from the 2019 Thales Cloud Security Study. Continue reading to uncover research findings as they relate to the amount of data stored, the kind of data & the prevalence of encryption or other security measures.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Thales

An Illustrated Guide to Compliance Hell
sponsored by SaltStack
WHITE PAPER: 60% of businesses have shown to suffer from major IT service failures that are a direct result of IT security shortcomings – this jeopardizes compliance of all those businesses. Download this visual map which identifies 7 parts of IT compliance hell – so you can avoid it.
Posted: 22 Oct 2019 | Published: 22 Oct 2019

SaltStack

Application Security Beyond Scanning
sponsored by Veracode, Inc.
WHITE PAPER: To make app security truly effective, there are 3 critical steps you must take beyond scanning to develop more secure code. Download this white paper to learn those 3 steps and how you can get started implementing them today.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

Veracode, Inc.

Building a Business Case for Expanding Your Appsec Program
sponsored by Veracode, Inc.
WHITE PAPER: Code vulnerabilities and cyber threats are affecting absolutely everyone, and there is no longer any reason for security to be an afterthought in the application development process. Jump into this guide to learn how to build your case for a shift left in application security.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

Veracode, Inc.

Why Security Architects Struggle to Manage Risk in Multi-cloud Environments
sponsored by Fortinet, Inc.
WHITE PAPER: With cloud adoption increasing, security architects must rethink their cloud management strategies. Risks can range from misconfiguration of security controls to unclear responsibilities. Continue reading to learn more about these security risks, and why they should be top-of-mind.
Posted: 30 Oct 2019 | Published: 16 Oct 2019

Fortinet, Inc.

Exposing PeopleSoft Self-Service Applications to the Internet
sponsored by Appsian
WHITE PAPER: Despite the benefits of opening applications like PeopleSoft for remote access, security ramifications are a major concern. So how do organizations maintain secure when access to PeopleSoft is available outside a secure corporate network? In this white paper, learn how you can achieve a secure remote access environment for PeopleSoft.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

Salesforce Data Protection Through User Activity Monitoring
sponsored by FairWarning
WHITE PAPER: Salesforce holds a vast amount of regulated, proprietary and confidential information. But as data theft trends increase, a better way to protect this information is needed. In this white paper, gain a better understanding of the need for Salesforce data protection and user activity monitoring.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

FairWarning
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement