OS Security White Papers

(View All Report Types)
Implementing Your BYOD Mobility Strategy: AN IT Checklist and Guide
sponsored by Insight
WHITE PAPER: This mobility checklist will offer readers an easy-to-read breakdown of what the IT department absolutely needs to consider when implementing a BYOD program into their enterprise. Read on to learn about the applications to choose, the installation and configuration options available, how to evaluate device performance, and more.
Posted: 10 May 2013 | Published: 21 Feb 2012

Insight

The Impact of Data Breaches: Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

The Evolution of Server Load Balancing
sponsored by Radware
WHITE PAPER: This white paper introduces a solution that not only allows users to measure end-to-end application, network and browser rendering performance data in real-time, but also one that automatically accelerates web sites.
Posted: 30 Oct 2013 | Published: 30 Oct 2013

Radware

How We Build Risk Into Applications
sponsored by Veracode, Inc.
WHITE PAPER: There are a number of ways you could be building risks into your applications from design to production. Download this infographic to find out how to avoid building risks into your apps in 3 steps.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

How Desktop Virtualization Simplifies Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Computer Weekly special report: Corporate application access through employee-owned mobile devices
sponsored by BlackBerry
WHITE PAPER: Your employees are accessing the corporate network from mobile devices—learn how to be prepared.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

BlackBerry

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Microsoft
WHITE PAPER: This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Lenovo and Microsoft

Secure Access and Continuity in a Virtualized and BYOD World
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This business whitepaper focuses on the challenges facing midsize businesses who are looking to provide business continuity and minimized downtime. It also highlights the benefits of HP Just Right IT secure access and business continuity solutions.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise