OS Reports

Analysis of the Linux Audit System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 08 Feb 2021 | Published: 01 Sep 2016

TechTarget ComputerWeekly.com

5 Overlooked Windows 10 Security Risks
sponsored by VMware
EGUIDE: Windows 10 is being promoted as a cure for several security woes, and while it does hold up against zero-day attacks, there are still several weaknesses. This exclusive guide discusses five Windows 10 security issues that are easy to overlook.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware

Windows 10 Momentum Continues to Build
sponsored by Flexera Software
EGUIDE: In this expert e-guide, we examine how Windows 10 is growing as a highly productive development environment. Find out how the OS is generating new opportunities for developers and how it's impacting Microsoft's future in cloud, mobile, and more.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

Flexera Software

Red Hat Enterprise Virtualization Competitive Features, Performance and Price
sponsored by Red Hat - HPE
WEBCAST: Access this webcast to learn about the new features of Red Hat Enterprise Virtualization 3.0. This webcast provides a hypervisor comparison and outlines the benefits of choosing an open-source, enterprise-ready option.
Posted: 19 Jul 2012 | Premiered: Feb 16, 2012

Red Hat - HPE

How to Create a Successful Windows 10 Deployment: Tips from your Peers
sponsored by Kollective Technology, Inc.
EGUIDE: Windows 10 deployments don't always go as smoothly as planned. The OS comes with challenges related to storage, security, updates and more. However, there are plenty of ways to overcome these challenges. In this e-guide you'll learn tips from your peers on how to create a near-perfect Windows 10 deployment.
Posted: 24 May 2018 | Published: 21 May 2018

Kollective Technology, Inc.

New Reality of Stealth Crimeware Video
sponsored by Intel
WEBCAST: An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel

Updating Your Corporate BYOD Program for Success
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

TechTarget Security

Deploying Windows 8 on Intel Architecture-based Tablets
sponsored by Intel
WHITE PAPER: As more employees look to access enterprise applications and systems via mobile devices, savvy organizations are deploying Windows 8 on tablets. In this white paper, you'll find an overview and a set of best practices for deploying Windows 8 on Intel architecture-based tablets.
Posted: 16 May 2014 | Published: 31 Jan 2014

Intel

Windows 8 Security: Know All You Need to Know
sponsored by IBM
EBOOK: This expert e-book describes how to best take advantage of the security features in Windows 8 and 8.1.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

IBM

A Computer Weekly Buyer's Guide to Windows 10 Migration
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this 12-page buyer's guide, the experts at Computer Weekly explore what you need to about a Windows 10 migration.
Posted: 16 Nov 2015 | Published: 16 Nov 2015

TechTarget ComputerWeekly.com