Application Security White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  

Application Security

MORE SPECIFIC TOPICS:  Virtualization Security |  Windows Security
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 597 Matches
Gaming Company Uses Cloud Infrastructure for Top Performance
sponsored by IBM
White Paper: | Posted: 17 Apr 2014
Published:31 Dec 2013
Summary:In this brief case study, learn how KUULUU -- an interactive gaming company -- leveraged an Infrastructure-as-a-Service (IaaS) platform that could adjust to their dynamic infrastructure needs, so they didn't have to worry about downtime or security, enabling them to focus on their core mission.
Get This Now
IBM

Third Party Applications: A Chink in Your Armour - Vendor Webcast
sponsored by Lumension
Webcast: | Posted: 15 Apr 2014
Premiered:Apr 15, 2014
Summary:This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management.
Get This Now
Lumension

Cisco: Scaling Application Vulnerability Management Across the Enterprise
sponsored by IBM
White Paper: | Posted: 15 Apr 2014
Published:28 Feb 2013
Summary:This case study reveals the solution that one organization chose to help improve application security testing efficiencies at a reduced cost.
Get This Now
IBM

Discovering Vulnerable Web Applications
sponsored by Qualys
White Paper: | Posted: 15 Apr 2014
Published:31 Aug 2012
Summary:This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Get This Now
Qualys

Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
White Paper: | Posted: 15 Apr 2014
Published:31 Dec 2013
Summary:This white paper highlights the benefits of a federated identity that can help you improve efficiencies, reduce risks, and maximize ROI.
Get This Now
Radiant Logic, Inc.

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
White Paper: | Posted: 15 Apr 2014
Published:16 May 2013
Summary:This informative guide explores best practices for choosing a Web application scanning solution.
Get This Now
Qualys

SlideShare, A Hosting Partner Success Story
sponsored by IBM
Case Study: | Posted: 15 Apr 2014
Published:31 Dec 2011
Summary:In this brief case study, find out how SlideShare turned to a new, cost-effective hosting partner that leveraged automated services and infrastructure to achieve optimal performance and consistent support.
Get This Now
IBM

Silver Peak Positioned as a Leader in 2014 Magic Quadrant for WAN Optimization
sponsored by Silver Peak
White Paper: | Posted: 14 Apr 2014
Published:14 Apr 2014
Summary:This informative paper takes an in-depth look at today's WAN optimization market, comparing and contrasting the strengths and weaknesses of the major vendors' offerings.
Get This Now
Silver Peak

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
White Paper: | Posted: 11 Apr 2014
Published:28 Feb 2010
Summary:This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Get This Now
Imprivata

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
White Paper: | Posted: 11 Apr 2014
Published:28 Feb 2010
Summary:This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Get This Now
Imprivata

Automating the SANS 20 Critical Security Controls
sponsored by Qualys
White Paper: | Posted: 10 Apr 2014
Published:31 Mar 2013
Summary:This guide explores security automation and how you can ensure system security with 4 main strategies.
Get This Now
Qualys

The Key to Seamless SSO
sponsored by Radiant Logic, Inc.
White Paper: | Posted: 10 Apr 2014
Published:10 Apr 2014
Summary:This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection.
Get This Now
Radiant Logic, Inc.

The New Workplace: Supporting Bring your own device
sponsored by IBM
White Paper: | Posted: 08 Apr 2014
Published:30 Nov 2012
Summary:This paper explores how organizations can derive business value in the BYOD era, while still providing a security-rich IT infrastructure and consistent service levels.
Get This Now
IBM

The Next Generation in Application Monitoring
sponsored by Hewlett-Packard Limited
White Paper: | Posted: 08 Apr 2014
Published:31 May 2012
Summary:Access this resource to discover the 3 major components to application security that will best keep your assets protected across the network.
Get This Now
Hewlett-Packard Limited

Mobile Application Security Chaos - Vendor Webcast
sponsored by Hewlett-Packard Company
Webcast: | Posted: 08 Apr 2014
Premiered:Apr 8, 2014
Summary:Check out this video and see if you can recognize each of the types of vulnerabilities inflicted on these mobile users.
Get This Now
Hewlett-Packard Company

1 - 15 of 597 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com