Software Platforms Reports

Jargon Buster Guide to Container Security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
Posted: 08 Feb 2021 | Published: 19 Feb 2019

TechTarget ComputerWeekly.com

Royal Holloway: Testing antivirus efficacy in Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

TechTarget ComputerWeekly.com

How to Evaluate Server OSes
sponsored by Hewlett Packard Enterprise
EGUIDE: This e-guide is designed to set you on the path to making the best decision for you organization. Inside, you will learn what to consider when evaluating a server OS, compare Linux vs Windows, and get an idea of where the rest of the market stands in comparison to these two.
Posted: 06 Apr 2017 | Published: 31 Mar 2017

Hewlett Packard Enterprise

How to Create a Successful Windows 10 Deployment: Tips from your Peers
sponsored by Kollective Technology, Inc.
EGUIDE: Windows 10 deployments don't always go as smoothly as planned. The OS comes with challenges related to storage, security, updates and more. However, there are plenty of ways to overcome these challenges. In this e-guide you'll learn tips from your peers on how to create a near-perfect Windows 10 deployment.
Posted: 24 May 2018 | Published: 21 May 2018

Kollective Technology, Inc.

Your Role in AWS Security
sponsored by TechTarget Search AWS
EBOOK: This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

TechTarget Search AWS

Tablets and Smartphones in the Enterprise: Risks and Management Concerns
sponsored by TechTarget Security
EBOOK: This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time.
Posted: 21 Aug 2012 | Published: 21 Aug 2012

TechTarget Security

New Reality of Stealth Crimeware Video
sponsored by Intel
WEBCAST: An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel

Verizon Communications Red Hat Innovation Award Winner Optimized Systems
sponsored by Red Hat - HPE
WHITE PAPER: Access this exclusive paper to discover how communication giant Verizon migrated to Linux and reduced costs, improved performance, increased scalability and improved energy conservation.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Red Hat - HPE

Computer Weekly – 22 April 2014: Adapting to life after Heartbleed
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?
Posted: 22 Apr 2014 | Published: 22 Apr 2014

TechTarget ComputerWeekly.com

Eguide: How to Handle Legacy Apps in a Windows 8 Migration
sponsored by Microsoft
EGUIDE: This expert guide explores how to handle legacy applications when migrating to Windows 8. Read on to learn how to avoid the uncertainty and compatibility issues that these applications can cause.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Microsoft