Application Security White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  

Application Security

MORE SPECIFIC TOPICS:  Virtualization Security |  Windows Security
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 641 Matches
Application Delivery Optimization: Business And Technology Issues
sponsored by CA Technologies.
eGuide: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:This expert e-guide discusses the challenges of the virtual enterprise, why response time is key for application optimization and more.
Get This Now
CA Technologies.

DNS Challenges in a Changing Landscape
sponsored by F5 Networks
Resource: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:View this infographic to discover common challenges of DNS management, and get the stats on the top availability and security concerns of DNS administrators, including outages and DDoS attacks.
Get This Now
F5 Networks

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
White Paper: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:This white paper explores the growing world of mobile application development and highlights the benefits of providing security for mobile applications during the development and deployment stages.
Get This Now
IBM

Facebook Secures Remote Access and Optimizes Virtual Application Environment
sponsored by F5 Networks
White Paper: | Posted: 17 Jul 2014
Published:23 May 2014
Summary:Facebook wanted to upgrade the performance and availability of their virtual application environment, as well as improve the security of their remote access portal. In this case study, learn how Facebook achieved these goals by implementing an application delivery technology that ensures applications are fast, secure and available.
Get This Now
F5 Networks

Harnessing the tyranny of autonomy: the Dropbox problem and the manager’s dilemma
sponsored by IntraLinks, Inc
White Paper: | Posted: 17 Jul 2014
Published:17 Jul 2014
Summary:Access this resource to discover whether your employees should be able to share information that improves productivity, or if it should be tightly controlled for privacy and security purposes
Get This Now
IntraLinks, Inc

Securing Your PKI Building Trust You Can Depend On
sponsored by Thales
White Paper: | Posted: 16 Jul 2014
Published:01 Feb 2013
Summary:Discover several security risks of typical enterprise and government PKIs and how higher assurance solutions are vital for security purposes.
Get This Now
Thales

Thales Solution for Microsoft Active Directory Certificate Services
sponsored by Thales
White Paper: | Posted: 16 Jul 2014
Published:01 Feb 2013
Summary:Access a seamless solution that issues, manages, and validates digital identities that are used to verify an individual or a system.
Get This Now
Thales

Security Solutions for Every Layer of Your IT Environment
sponsored by CDW Corporation
Resource: | Posted: 16 Jul 2014
Published:16 Jul 2014
Summary:View this infographic now to learn about critical security concerns within every layer of your IT environment and the steps that you can take to prevent these dangerous threats.
Get This Now
CDW Corporation

Fast, Secure, and Always-Available Application Delivery
sponsored by F5 Networks
Case Study: | Posted: 15 Jul 2014
Published:07 Jul 2014
Summary:As a managed cloud hosting provider, Bulletproof Networks needed to provide their customers with highly -available applications and services. View this case study to learn how Bulletproof leveraged an application delivery networking technology to ensure fast, secure, and always-available application delivery to their users.
Get This Now
F5 Networks

2014 Gartner Magic Quadrant for Web Application Firewalls
sponsored by Imperva
Analyst Report: | Posted: 11 Jul 2014
Published:11 Jul 2014
Summary:Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.
Get This Now
Imperva

Mitigating the OWASP Top 10 2013 with Imperva SecureSphere
sponsored by Imperva
White Paper: | Posted: 08 Jul 2014
Published:31 Dec 2013
Summary:This informative guide outlines an effective tool designed to help mitigate the OWASP top 10 and how it can greatly enhance your enterprise security.
Get This Now
Imperva

Appropriate Third Party Software Security Controls
sponsored by Veracode, Inc.
White Paper: | Posted: 08 Jul 2014
Published:08 Jul 2014
Summary:This informative whitepaper explores the appropriate security controls for your third party services and software.
Get This Now
Veracode, Inc.

Understanding the Risks of Mobile Applications
sponsored by Veracode, Inc.
White Paper: | Posted: 07 Jul 2014
Published:28 Feb 2011
Summary:View this white paper for a primer on the mobile application security landscape. Explore the top risks for mobile applications and learn what you can do to mitigate them in your enterprise.
Get This Now
Veracode, Inc.

Ten Tips for Building a Successful Vendor Application Security Program
sponsored by Veracode, Inc.
White Paper: | Posted: 07 Jul 2014
Published:07 Jul 2014
Summary:If you rely on commercial, outsourced, cloud and mobile applications, you need a plan for vendor security compliance. In this resource, get 10 tips for building a successful vendor application security plan.
Get This Now
Veracode, Inc.

Streamline Compliance with Cloud-based Application Security
sponsored by Veracode, Inc.
Data Sheet: | Posted: 07 Jul 2014
Published:07 Jul 2014
Summary:This white paper introduces a cloud-based application security platform that assesses mobile, web, and third-party applications for standard controls and ensures compliance with OX, HIPAA, NIST 800-53, MAS, and other mandates.
Get This Now
Veracode, Inc.

1 - 15 of 641 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com