IT Management  >   Systems Design and Development  >   Application Development  >  

Security-related Design

RSS Feed   
Security-related Design Reports
 
Getting Started with DevSecOps
sponsored by ZeroNorth
WEBCAST: Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. In this webcast, Andrei Bezdedeanu, ZeroNorth VP of Engineering, discusses how to get started with DevSecOps and the resulting benefits.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

ZeroNorth

The 2019 Security Strategy
sponsored by Cloudflare
VIDEO: How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.
Posted: 22 Jan 2019 | Premiered: 17 Jan 2019

Cloudflare

2018 Security Implications of Digital Transformation Report
sponsored by Fortinet, Inc.
RESEARCH CONTENT: While the potential of digital transformation is exciting from a business perspective, changes stemming from it can create anxiety for the cybersecurity team. In Fortinet's 2018 Security Implications of Digital Transformation Survey, examine the state of cybersecurity in organizations around the world from the lens of digital transformation.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Fortinet, Inc.

RingCentral Case Study
sponsored by Data Theorem
CASE STUDY: RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

AWS Dynamic Duo Infographic
sponsored by Symantec
RESOURCE: DevOps and InfoSec need to integrate their processes and work collaboratively to secure organizations as their reliance on public cloud infrastructure grows. Download this infographic to discover a 5-step action plan for embracing DevSecOps in your organization.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

Blog: DevOps for the mainframe
sponsored by IBM
WHITE PAPER: Learn the basics of DevOps and important information you need to know in order to create a successful strategy.
Posted: 18 Oct 2013 | Published: 18 Apr 2013

IBM

The Ten Must Haves for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
Posted: 01 Aug 2012 | Published: 01 Aug 2012

Zenprise

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

The Modern Mobility E-Zine: An Exclusive Look at Enterprise Mobility
sponsored by SearchMobileComputing
EZINE: Access this e-zine to learn how the role of DevOps is changing as enterprise mobility matures. Read on here to see how fusing mobile app development and management can change the way IT delivers mobile information to users.
Posted: 14 Apr 2015 | Published: 13 Apr 2015

SearchMobileComputing

How to Secure Your Microsoft SharePoint Products
sponsored by Thawte Inc.
EGUIDE: This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013

Thawte Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement