ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Veracode, Inc.

  • Evaluating the Top Application Security Testing Vendors

    This Gartner report focuses on top AST vendors' SAST, DAST and IAST offerings, maturity and features as tools or as a service. Learn all you need to know about top vendors' AST offerings to ensure you're picking the right tool for your business.

  • How to Seamlessly Integrate Security Into DevOps

    Learn how to integrate security at multiple points into DevOps workflows in a collaborative way that is largely transparent to developers, and preserves the teamwork, agility and speed of DevOps and agile development environments.

  • Veracode Secure Development Survey

    Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.

  • State of Software Security: A Developer's Viewpoint

    Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more.

  • How to Build a Robust Application Security Governance Framework

    Discover not only how to simplify, but also streamline application security. Learn how to ensure that everyone is in-sync and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.

  • Application Security Beyond SAST and DAST

    Learn about trends in and the future of application security, as it stands today, and what organizations need to do to secure the most attacked and breached layer of their products: the app layer.

  • 5 Lessons from an Application Security Pro

    Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches.

  • The Benefits of Bug Bounty Programs and Security Code Testing

    In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats.

  • App Security Can’t Happen Without Developers

    In this report from Forrester, learn how to guide developers and security pros to deliver secure apps. Gain key takeaways that will help your developer team and security team work together to mitigate app security threats before they appear.

  • Assessing Application Security: A Buyer’s Guide

    In this SANs guide, learn the four-step method for acquiring the services you need to support a comprehensive application security (AppSec) lifecycle security program. Discover what goes into an effective AppSec team and how to acquire the resources necessary for deployment.

  • Ultimate Guide to Application Security

    Learn how to work with appropriate teams to develop a clear application security strategy with concrete requirements for security policies. This, combined with selecting the right application security partners, can ensure your ability to create an advanced application security program that systemically reduces risk and enables innovation.

  • Trends and Tactics: How IT Professionals are Approaching AppSec Today

    Discover the strategies and tactics being implemented by IT professionals to ensure the security of their applications. Learn the obstacles they're working everyday to overcome and devise a plan of your own to mitigate your app security hardships.

  • 2016 State of Software Security

    This report provides you with tangible AppSec benchmarks with which to measure your own programs against. Discover stats and figures on the risk of applications and overall industry remediation trends.

  • Five Principles for Securing DevOps

    Discover how to successfully integrate security with DevOps and learn 5 principles your security strategy must address. Furthermore, understand how DevOps and CI/CD are different from Agile development and how this difference changes the requirements for application security.

  • Managing Risk and Security at the Speed of Digital Business

    Discover how the increasing adoption of digital business approaches is changing the traditional IT governance and control landscape. Learn how to deal with the degrading authority of central IT organization, cope with the rise of scalability issues, and more.

  • Application Security Testing Vendor Evaluations

    This Gartner report evaluates vendors' maturity in offering application security testing features. Learn the strengths and weaknesses of each vendor to better assess which product is right for you.

  • Automating App Blacklisting

    This white paper explores how to roll out a BYOD strategy that includes both preventative and detective controls to fill in the vulnerability gaps.

  • The Impact of Data Breaches: Why Application Security is a Business Imperative

    64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.

  • Webinar: Why Benchmark Application Security?

    Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.

  • Webinar: When is Application Security Done?

    Traditional patchwork approaches to application security does not scale to match these leaps in company needs, resulting in poor security coverage of the application infrastructure. Listen to this webinar to discover the growing needs of modern companies, and which security practices will scale to match what tomorrow holds.

  • ROI Case Study: Cloud-Application Security Service

    A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.

  • Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days

    A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.

  • Case Study: How a Global Bank Addressed App Security and Lowered Costs

    A global leader of major banks mandated a new top-down approach to reduce application-layer risk throughout its global software infrastructure. View this case study to see how a security solution helped this bank assess their security needs and reduce the opportunity for exploitation.

  • Magic Quadrant for Application Security Testing

    Choosing the right software security testing tool can be an overwhelming process. In this Gartner report, make your decision a little easier with a comparison of the top app security testing vendors on the market, including IBM, HP, Veracode, Aspect, and more.

  • Disclosures 2012 - The Vulnerability of Publicly Traded Companies

    In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.