OS Security White Papers

(View All Report Types)
Securing mobile devices in the business environment
sponsored by IBM
WHITE PAPER: As smartphones and other mobile devices gain traction in consumers' personal lives, they're also being introduced into their work environments. In this white paper, learn how to safely introduce personal or corporate-owned mobile devices into the workplace, identify and prevent the risks to corporate data, and ultimately drive more business value.
Posted: 15 Jan 2014 | Published: 31 Oct 2011

IBM

Choose Your Own Device (CYOD) Workshop
sponsored by Insight
WHITE PAPER: Read on to learn about a CYOD workshop that can help you understand and develop a winning CYOD strategy with help from industry experts. Find out how taking advantage of this valuable learning experience will help you get a good grasp on policies and compliance, device lifecycles, device management, and more.
Posted: 10 May 2013 | Published: 31 Mar 2013

Insight

Structured Approach to Migrating Oracle Apps from a Physical to Virtual Environment
sponsored by EMC Converged Platforms.
WHITE PAPER: Access this in-depth white paper to discover a structured approach to migrating Oracle apps from a physical to a virtual environment. Read on to find out why this approach meets many of the challenges presented by the virtualization of Oracle databases and applications, and learn how you can get started.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

EMC Converged Platforms.

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Web Application Performance Management
sponsored by Radware
WHITE PAPER: This white paper introduces a solution that not only allows users to measure end-to-end application, network and browser rendering performance data in real-time, but also one that automatically accelerates web sites; optimizing HTML dynamically and reducing web page build times by up to 50% on PC and mobile browsers.
Posted: 24 Oct 2013 | Published: 30 Sep 2013

Radware

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise

System z, x86, UNIX: Which is more secure?
sponsored by IBM
WHITE PAPER: Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

IBM

How Desktop Virtualization Simplifies Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Microsoft
WHITE PAPER: This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Lenovo and Microsoft

Mobilizing Windows Apps
sponsored by Citrix
WHITE PAPER: This white paper provides best practices for implementing secure remote access to Windows apps and data from any device. Read on now to learn more.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Citrix