Apple

  • White Papers // Aug 2015

    Apple Native Security - JAMF Software

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

    Sponsored By JAMF Software

  • White Papers // Aug 2015

    The New Reality of Mac in Business

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // Aug 2015

    The Modern Mobile Workforce

    The work of the modern, mobile workforce is no longer confined by place or by time. Mobile computers, wireless networking, and always-available online services allows for work to get done just about anywhere and at any time. For the modern IT Manager, this way of working offers new challenges and...

    Sponsored By JAMF Software

  • White Papers // Aug 2015

    The Casper Suite - ROI Overview

    In today’s IT environment, it is more important than ever to manage resources with an eye towards efficient deployment and operability. With JAMF Software’s Casper Suite, IT departments can manage their Apple computers and mobile devices across the enterprise simply and effectively. Advance preparation of client machines to ensure consistency...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Apple Native Security

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - The New Reality of Mac in Business (German)

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Apple Native Security (German)

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization (French)

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization (German)

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - The New Reality of Mac in Business (French)

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - The New Reality of Mac in Business

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Apple Native Security (French)

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    The Guide to Mac OS X Deployments in Business

    So your organization is about to deploy Mac computers to your employees, and you're not sure where to start? That's where the Apple Management Experts can help. Since 2002, JAMF Software—and our Casper Suite solution—have helped organizations across the globe ensure their Apple programs are a success. This guide highlights...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    Managing Apple Devices in a Windows Organization

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    The New Reality of Mac in Business

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // May 2015

    Leveraging The Cloud For Your Big Data Workloads

    This report explores how with the right partner, enterprises can ensure that their Big Data workloads perform consistently, securely, and cost effectively while delivering to a line-of-business colleagues’ need for on-demand, real-time analytics to make smart business decisions.

    Sponsored By IBM

  • White Papers // May 2015

    Leveraging The Cloud For Your DevOps Workloads

    This report explores that by choosing the right PaaS, an IT organization can align development and operations resources, ensuring that applications are deployed quickly, cost-effectively, and error-free.

    Sponsored By IBM

  • White Papers // May 2015

    Leveraging The Cloud For Your Development and Operations Workloads

    This report explores that by choosing the right PaaS, an IT organization can align development and operations resources, ensuring that applications are deployed quickly, cost-effectively, and error-free.

    Sponsored By IBM

  • White Papers // Apr 2015

    iOS 8 Checklist

    iOS: The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.

    Sponsored By IBM

  • White Papers // Oct 2014

    What CIOs need to know in order to capitalize on Hybrid Cloud

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility, the flexibility to use a variety of services, the scalability to keep pace with business volume, the efficiency...

    Sponsored By EMC

  • eBooks // Jun 2015

    Executive's guide to Apple in the enterprise (free ebook)

    Apple's success in the consumer market has pushed the company's technology further into the enterprise than ever before. This new ebook from ZDNet and TechRepublic looks at the implications of the growing business reliance on Apple products.

    Provided By TechRepublic

  • White Papers // May 2015

    iCloud Technology

    Cloud storage is a growing tech trend. Making use of cloud computing technology, cloud storage services give the users password-protected access to online storage space. They can upload files to this storage space as a backup copy of content from their hard drive, as additional space to supplement their hard...

    Provided By Creative Commons

  • Webcasts // Apr 2015

    Exploring Yosemite: Abusing Mac OS X 10.10

    Mac OS X 10.10 Yosemite is going to be released soon. It brings lots of new features as well as security improvements. In this webcast, the presenters are going to review these improvements from both defensive and offensive perspectives: what problems it solved, what issues it brought up and what...

    Provided By SecurityTube.net

  • White Papers // Apr 2015

    Exploring Secure Unix System with Other OS

    Unix is a multiuser, multitasking operating system. It is one of the landmark operating system. It is widely popular operating system around the world. Unix is an open source operating system which makes its usage all the more fun. Unix is very secure operating system and is not much user...

    Provided By International Journal of Computer Science and Mobile Computing (IJCSMC)

  • White Papers // Apr 2015

    Data Protection in Mac OS X

    As the people lives increasingly go digital, data protection has become one of the critical concerns. With data breaches on rise, companies must remain vigilant in safeguarding their assets. Breaches in data security can appreciably cost company customers, reputations and significant fines or damages. OS X is designed from the...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Mar 2015

    Hybrid Operating System in Smart Phone

    Operating System (OS) is the backbone in any Smartphone. With every passing year, newer and latest versions of OSs are being brought in the market. The application and design developers of mobile OS are trying to bring the best of it in every newer version. This paper provides a survey...

    Provided By International Journal of Computer and Information Technology (IJCIT)

  • Webcasts // Feb 2015

    Userland Persistence on Mac OS X It Just Works

    In this webcast, the presenter will show, if given userland administrative access (read: root), how easy it is to persist between reboots without plists, non-native binaries, scripting, and kexts or kernel patching using the backdoor factory.

    Provided By SecurityTube.net

  • White Papers // Feb 2015

    7 Must Haves For Mobile App Security

    Having to trade usability against security puts enterprises in an unenviable position. In this white paper are the minimum requirements that an enterprise must have in a mobile app security solution in order to transform the mobile user experience without compromising on security. Read More...

    Provided By Good Technology

  • White Papers // Feb 2015

    Moving beyond MDM to Mobile Apps

    Now that many organizations are on board with the basics of business mobility, users are hungry for more. Companies everywhere are turning to mobile business apps to empower employees on the go and kickstart productivity. But as these organizations move beyond Mobile Device Management (MDM), IT must ensure that the...

    Provided By Good Technology

  • White Papers // Feb 2015

    5 Traps to avoid in your 2015 mobile App program

    Working with progressive early adopters of mobile apps, Good Technology has gained visibility into successful mobile app programs and deployments. We’ve also seen what traps impede success and/or attainment of planned goals. Below are five (5) pitfalls to avoid in your mobile app program and corresponding recommendations for success. Read...

    Provided By Good Technology

  • White Papers // Feb 2015

    Gartner 2014 Magic Quadrant for Application Secuirty Testing

    IBM has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for Application Security.

    Provided By IBM

  • Downloads // Dec 2014

    Apple's first employee: The remarkable odyssey of Bill Fernandez (PDF download)

    Best known as the guy who introduced Steve Jobs and Steve Wozniak, Bill Fernandez speaks out on Apple's founding magic, how love built the first Mac, and the computer of the future. Download the full feature article in magazine format as a free PDF that you can read on your...

    Provided By TechRepublic

  • White Papers // Dec 2014

    Thumbnail Image Creation in Hadoop Using Python

    Apache Hadoop is a software framework that supports data-intensive distributed application under a free license. It enables applications to work with thousands of nodes and petabytes of data. Hadoop was inspired by Google's MapReduce and Google File System (GFS) papers. Hadoop was originally developed to support distribution for the Nutch...

    Provided By Creative Commons

  • Podcasts // Nov 2014

    Methods of Malware Persistence on OS X Mavericks

    As Mac OS X continues to increase in popularity, OS X malware, once a rare phenomenon, is now more common than ever. Due to this, it is essential for forensic and malware analysts to possess an in-depth understanding of OS X and how it may be attacked by malicious code.

    Provided By SecurityTube.net

  • White Papers // Nov 2014

    Leveraging The Cloud For Your ERP Workloads

    This report explores how with the right partner, enterprises can ensure that their Big Data workloads perform consistently, securely, and cost effectively while delivering to a line-of-business colleagues’ need for on-demand, real-time analytics to make smart business decisions.

    Provided By IBM

  • Webcasts // Oct 2014

    Understanding TOCTTOU in the Windows Kernel Font Scaler Engine

    The font scaler engine is widely used in Microsoft Windows and Mac OS operating systems for rendering TrueType/OpenType fonts. It was first introduced in 1989. Later, to improve the performance of the Windows NT operating system, Microsoft decided to move the engine from user mode to kernel mode.

    Provided By SecurityTube.net

  • White Papers // Oct 2014

    New : Check out what Professionals need to know in order to capitalize on Hybrid Cloud?

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility — the flexibility to use a variety of services, the scalability to keep pace with business volume, the...

    Provided By EMC

  • White Papers // Oct 2014

    What IT Professionals need to know in order to capitalize on Hybrid Cloud?

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility — the flexibility to use a variety of services, the scalability to keep pace with business volume, the...

    Provided By EMC

  • White Papers // Oct 2014

    What CIO need to Know to capitalize on Hybrid Cloud

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility the flexibility to use a variety of services, the scalability to keep pace with business volume, the efficiency...

    Provided By EMC