Application Security White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  

Application Security

MORE SPECIFIC TOPICS:  Virtualization Security |  Windows Security
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 656 Matches
Web Application Firewalls vs. Next-Generation Firewalls
sponsored by Fortinet, Inc.
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:This white paper compares the ability of two different types of firewalls—Web Application Firewalls (WAFs) and Next-Generation Firewalls (NGFWs)—to protect web applications from security threats.
Get This Now
Fortinet, Inc.

Webcast: Application Architectures for Cloud Computing Environments
sponsored by SearchDataCenter.com
Video: | Posted: 28 Jul 2014
Premiered:19 Oct 2011
Summary:In this webcast, Bernard Golden, CEO of cloud consulting firm HyperStratus, describes the key principles of application architectures in a cloud computing environment. He also discusses the limitations of running applications in the cloud, including application integration issues, software licensing and security.
Get This Now
SearchDataCenter.com

Best Practices in BYOD: Addressing BYOD Challenges in the Enterprise
sponsored by BlackBerry
White Paper: | Posted: 25 Jul 2014
Published:25 Jul 2014
Summary:This white paper investigates the key challenges seen with BYOD today and how this particular solution works to combat any troubles.
Get This Now
BlackBerry

ROI and Benefits of a Cloud-Based Application Security Service
sponsored by Veracode, Inc.
White Paper: | Posted: 24 Jul 2014
Published:24 Jul 2014
Summary:In this report from Forrester Research, Inc., discover the potential ROI you could achieve by deploying a cloud-based application security service. Explore the costs and risk of this technology, and weigh them with the benefits you could experience.
Get This Now
Veracode, Inc.

Mobile Apps are the Future - Is Your Enterprise Ready?
sponsored by BlackBerry
White Paper: | Posted: 24 Jul 2014
Published:24 Jul 2014
Summary:View this white paper to explore how mobile apps are improving productivity and collaboration across the enterprise, discover options for mobile development tools, and compare native, web-based, and hybrid options. Plus, learn the three most important factors to consider in order to get the most value from mobile apps.
Get This Now
BlackBerry

8 Patterns of Secure Agile Teams
sponsored by Veracode, Inc.
White Paper: | Posted: 24 Jul 2014
Published:24 Jul 2014
Summary:Secure application development can be challenging for Agile teams, as short Agile sprints don't lend themselves well to the time-consuming process of finding and fixing application vulnerabilities. In this white paper, discover eight best practices for integrating security and Agile development.
Get This Now
Veracode, Inc.

Out with the Old, in with the New: Modernizing Applications
sponsored by Dell, Inc.
eGuide: | Posted: 24 Jul 2014
Published:24 Jul 2014
Summary:Not all applications that run successfully on-premise can be easily migrated to the cloud. This expert e-guide serves as a guide to application modernization, and offers a checklist to help you mitigate risk during legacy modernization.
Get This Now
Dell, Inc.

An EMM Checklist for CIOs: Factors to Consider When Choosing an EMM Solution
sponsored by BlackBerry
White Paper: | Posted: 24 Jul 2014
Published:24 Jul 2014
Summary:For help deciding on an Enterprise Mobility Management (EMM) solution consider the issues in the following white paper. It's derived from third-party research and best practices. It covers the critical areas you'll need to think through as you arrive at a decision. It also provides a CIO's Guide to EMM.
Get This Now
BlackBerry

IBM X-Force Threat Intelligence Quarterly, 6/14: The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
White Paper: | Posted: 24 Jul 2014
Published:30 Jun 2014
Summary:This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Get This Now
IBM

Application Delivery Optimization: Business And Technology Issues
sponsored by CA Technologies.
eGuide: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:This expert e-guide discusses the challenges of the virtual enterprise, why response time is key for application optimization and more.
Get This Now
CA Technologies.

DNS Challenges in a Changing Landscape
sponsored by F5 Networks
Resource: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:View this infographic to discover common challenges of DNS management, and get the stats on the top availability and security concerns of DNS administrators, including outages and DDoS attacks.
Get This Now
F5 Networks

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
White Paper: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:This white paper explores the growing world of mobile application development and highlights the benefits of providing security for mobile applications during the development and deployment stages.
Get This Now
IBM

Facebook Secures Remote Access and Optimizes Virtual Application Environment
sponsored by F5 Networks
White Paper: | Posted: 17 Jul 2014
Published:23 May 2014
Summary:Facebook wanted to upgrade the performance and availability of their virtual application environment, as well as improve the security of their remote access portal. In this case study, learn how Facebook achieved these goals by implementing an application delivery technology that ensures applications are fast, secure and available.
Get This Now
F5 Networks

Harnessing the tyranny of autonomy: the Dropbox problem and the manager’s dilemma
sponsored by IntraLinks, Inc
White Paper: | Posted: 17 Jul 2014
Published:17 Jul 2014
Summary:Access this resource to discover whether your employees should be able to share information that improves productivity, or if it should be tightly controlled for privacy and security purposes
Get This Now
IntraLinks, Inc

Securing Your PKI Building Trust You Can Depend On
sponsored by Thales
White Paper: | Posted: 16 Jul 2014
Published:01 Feb 2013
Summary:Discover several security risks of typical enterprise and government PKIs and why higher assurance solutions are vital for security purposes.
Get This Now
Thales

1 - 15 of 656 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com