ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Driving a Culture of Security Through Product Development and Delivery

    Sponsored by: Veracode, Inc.

    Tune into this webcast to learn about what it takes to successfully facilitate a secure application development and delivery strategy. Additionally, learn about some of the biggest barriers that prevent organizations from developing their own secure environments and much more.

  • Simplifying Security in the Agile SDLC

    Sponsored by: Veracode, Inc.

    How do sophisticated software development shops inject secure development into their Agile software development lifecycle? Tune into this webcasts featuring experts Maria Loughlin and Rob Curtis from application security firm Veracode, to find out.

  • Building Security into the Agile SDLC

    Sponsored by: Veracode, Inc.

    Tune into this webcasts to hear from Paul Roberts of the Security Ledger engage and Veracode's security and development experts Ryan O'Boyle and Pete Chestna as they share their best practices on integrating security into agile development- to rapidly deliver applications without exposing them to critical vulnerabilities.

  • Reality Checking your Security Testing Program

    Sponsored by: Veracode, Inc.

    How do you know if your security testing protocols are actually fully effective? This webcast demonstrates what you need to know to ensure that your security testing methods are running as they should.

  • Insider Strategies for Application Layer Security

    Sponsored by: Veracode, Inc.

    Join in this webcast to learn how a testing strategy can secure all of your apps and how one cloud-based service can help.

  • How to improve productivity through mobile UX design

    Sponsored by: Unisys

    This expert e-guide highlights the importance of mobile user experience and how an unsatisfying experience with an app can bring consequences to an organization. Discover more about user experience analysis and design as well as the use of a mobile application performance monitoring system.

  • Best Practices for Virtualizing and Protecting Exchange Server

    Sponsored by: Veeam Software

    In this white paper, you'll learn about the considerations that must be taken into account when virtualizing Exchange Server. You'll learn why it's important to avoid using dynamic hardware allocations or overcommitments, and avoid manipulating state data. Read on to learn more.

  • Evolve To Become the 2018 CISO or Face Extinction

    Sponsored by: Veracode, Inc.

    Unfortunately for the CISO, their career path is dissolving and is projected to dissipate by 2018. Luckily, this has also opened up 2 new roads to travel down: evolve into a more business-focused S&R leader or stay focused on IT. What should you do? Access this white paper to learn what Forrester Research has to say about the shift.

  • How mobile remote desktop apps work

    Sponsored by: Unisys

    This exclusive e-guide highlights the technology behind mobile remote desktop apps and how to best select mobile remote desktop products.

  • Does mobility really improve employee productivity

    Sponsored by: Unisys

    Inside this expert e-guide, learn about the ways mobility has evolved in the enterprise and the tools that have improved employee productivity up this point. Find out the progress that's still to be made with mobile device management and if it really can improve employee productivity in the future.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.