Computer Associates Unicenter White Papers

(View All Report Types)
Software Security Analysis: Control Flow Security Analysis with McCabe IQ
sponsored by McCabe Software, Inc.
WHITE PAPER: Read this white paper to learn how comprehensive security analysis equips you with the proper insight into the structure of your software code to identify and resolve possible security holes
Posted: 17 Apr 2012 | Published: 17 Apr 2012

McCabe Software, Inc.

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

9 Catastrophic Projects, And the Lessons They Teach
sponsored by AtTask
WHITE PAPER: This white paper considers 9 massive project failures, and analyzes where teams went wrong. Read on to see how mistakes, communication breakdowns, and destroyed budgets can obliterate your projects, and how you can avoid a similar fate.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

AtTask

Five Steps to Building Visibility and Security Into Your Network
sponsored by Ixia
WHITE PAPER: Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Ixia

Ixia ControlTower Architecture
sponsored by Ixia
WHITE PAPER: As networks grow in size and complexity, the need for visibilty becomes even more essential. Consult this resource to learn more about how you can increase scale, flexible deployments and the need for application and security monitoring in the network.
Posted: 30 May 2013 | Published: 30 May 2013

Ixia

Providing effective endpoint management at the lowest total cost
sponsored by IBM
WHITE PAPER: Endpoint management technologies ensure that servers, workstations, laptops, mobile devices, and virtually any other network-connected device are kept up-to-date and correctly configured. Read on to investigate the total cost of ownership, or TCO, of an endpoint management investment.
Posted: 23 Feb 2012 | Published: 01 Apr 2011

IBM

Cloud Based Application Penetration Testing Trial
sponsored by iViZ
WHITE PAPER: Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

iViZ

Challenging Some of the Myths About Static Code Analysis
sponsored by Klocwork
WHITE PAPER: This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
Posted: 27 Dec 2013 | Published: 30 Nov 2013

Klocwork

The Ultimate Guide to Enterprise Network Management
sponsored by NBN
WHITE PAPER: Managing enterprise networks is now a greater challenge than ever. Employees are everywhere, so NetOps need to keep a close eye on performance to make sure these employees can stay productive, wherever they are. Access our expert guide to explore best practices and tools for network management, and see how automation can help.
Posted: 08 Feb 2021 | Published: 12 Nov 2020

NBN

Vendor Landscape: Virtual Backup Software
sponsored by Dell Software
WHITE PAPER: In this white paper, learn how to evaluate virtual backup software to end the arguing between virtual and backup admins. Read on to consider a solution to back up your virtual infrastructure, understand what's new in the virtual backup market, and determine which products are most appropriate for particular use-cases and scenarios.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Dell Software