Application Security White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  

Application Security

MORE SPECIFIC TOPICS:  Virtualization Security |  Windows Security
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 612 Matches
Zero Downtime Bi-Directional Physical to Virtual Migration for Oracle EBS R12 With RAC on Vblock Systems
sponsored by VCE
White Paper: | Posted: 24 Apr 2014
Published:31 Dec 2013
Summary:This paper presents a structured approach to migrating Oracle apps from a physical to a virtual environment. Inside, discover why this approach meets many of the challenges presented by virtualization of Oracle databases and applications, and find out how you can get started.
Get This Now
VCE

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 23 Apr 2014
Published:28 Feb 2014
Summary:This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Get This Now
Cisco Systems, Inc.

Cisco adds Sourcefire AMP to email, Web security
sponsored by Cisco Systems, Inc.
Press Release: | Posted: 22 Apr 2014
Published:25 Feb 2014
Summary:This informative resource discusses a recent merger that brought together advanced malware protection for your email and web gateways.
Get This Now
Cisco Systems, Inc.

Ensuring Security for your E-Mail Applications
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 22 Apr 2014
Published:27 Feb 2014
Summary:This informative article explores a top-tier email security strategy and how it utilizes advanced malware protection to prevent devastating security breaches.
Get This Now
Cisco Systems, Inc.

HIPAA Compliance: Sign on to Robust Access Controls
sponsored by Imprivata
White Paper: | Posted: 22 Apr 2014
Published:22 Apr 2014
Summary:View this comprehensive white paper to learn how you can reduce the complexities of HIPAA compliance with single sign-on (SSO) technology.
Get This Now
Imprivata

Mobile Threat Report 2014
sponsored by Webroot
White Paper: | Posted: 21 Apr 2014
Published:21 Apr 2014
Summary:The Webroot® Mobile Threat Report provides an overview of the risks and trends of the mobile space, based on research and analysis conducted by the Webroot Mobile Threat Research team.
Get This Now
Webroot

Information Security: Insider edition
sponsored by TechTarget
Resource: | Posted: 18 Apr 2014
Published:18 Apr 2014
Summary:Keeping your organization's Web presence safe is a difficult task, especially with recent threats against Web applications. Simply take this 2 min survey and learn how you can help application developers acquire the necessary security tools and training to keep your Web presence protected!
Get This Now
TechTarget

Design Security Policies For #GenMobile
sponsored by Aruba Networks
White Paper: | Posted: 18 Apr 2014
Published:18 Apr 2014
Summary:This white paper highlights the 4 areas that must be addressed when providing secure, reliable access to business applications for mobile users. Click through to explore the essential tools you need for this strategy.
Get This Now
Aruba Networks

Gaming Company Uses Cloud Infrastructure for Top Performance
sponsored by IBM
White Paper: | Posted: 17 Apr 2014
Published:31 Dec 2013
Summary:In this brief case study, learn how KUULUU -- an interactive gaming company -- leveraged an Infrastructure-as-a-Service (IaaS) platform that could adjust to their dynamic infrastructure needs, so they didn't have to worry about downtime or security, enabling them to focus on their core mission.
Get This Now
IBM

Third Party Applications: A Chink in Your Armour - Vendor Webcast
sponsored by Lumension
Webcast: | Posted: 15 Apr 2014
Premiered:Apr 15, 2014
Summary:This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management.
Get This Now
Lumension

Cisco: Scaling Application Vulnerability Management Across the Enterprise
sponsored by IBM
White Paper: | Posted: 15 Apr 2014
Published:28 Feb 2013
Summary:This case study reveals the solution that one organization chose to help improve application security testing efficiencies at a reduced cost.
Get This Now
IBM

Discovering Vulnerable Web Applications
sponsored by Qualys
White Paper: | Posted: 15 Apr 2014
Published:31 Aug 2012
Summary:This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Get This Now
Qualys

Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
White Paper: | Posted: 15 Apr 2014
Published:31 Dec 2013
Summary:This white paper highlights the benefits of a federated identity service that can help you improve efficiencies, reduce risks, and maximize ROI.
Get This Now
Radiant Logic, Inc.

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
White Paper: | Posted: 15 Apr 2014
Published:16 May 2013
Summary:This informative guide explores best practices for choosing a Web application scanning solution.
Get This Now
Qualys

SlideShare, A Hosting Partner Success Story
sponsored by IBM
Case Study: | Posted: 15 Apr 2014
Published:31 Dec 2011
Summary:In this brief case study, find out how SlideShare turned to a new, cost-effective hosting partner that leveraged automated services and infrastructure to achieve optimal performance and consistent support.
Get This Now
IBM

1 - 15 of 612 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com