ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • 10 REASONS TO TEST, NOT GUESS

    Sponsored by: Trustwave

    This infographic gives you 10 reasons you should test, not guess the strength of your security. Create a testing plan based on these 10 reasons and strengthen your security posture through more informed decision making.

  • Why it's Time to Add Security to DevOps Teams

    Sponsored by: BMC

    Slow adopters of DevSecOps may think perimeter defense alone is enough, but high-profile breaches at Sony and other organizations say otherwise. Discover what experts are saying about how DevSecOps can help organizations approach security before -- not after -- the software development process.

  • Red Hat Product Security Risk Report 2015

    Sponsored by: Red Hat

    Tools that detect and address critical vulnerabilities before they go public are crucial to empowering developers. Explore reasons you should implement open source tools with security in mind.

  • A DevSecOps Playbook

    Sponsored by: CloudPassage

    There is a fundamental struggle between the speed that cloud services provide and security. In this white paper discover the concept of DevSecOps, a departure from traditional thoughts about speed vs. security.

  • Deploying Java EE Apps in Cloud and Container Environments

    Sponsored by: Red Hat

    Java organizations are turning to DevOps methodologies, microservices architectures, and containers to meet application delivery requirements. Access this product overview that explains why you need to employ the right application development platform to support these infrastructures.

  • Red Hat Enterprise Linux: Secure Identity Management

    Sponsored by: Red Hat

    Address the challenges of managing identities in Linux or a mixed Linux/Windows environment by centralizing management in one interface. Download this paper to take advantage of Linux's direct integration into your environment to provide host-based access control, and more.

  • App Development Strategies fit for Governments

    Sponsored by: Red Hat

    Application development, deployment, and ongoing management doesn't have to be difficult. Discover secure ways to implement DevOps practices using open-source tools.

  • Get Your Apps Back in Business

    Sponsored by: Dell Software

    Discover a cloud-era data protection solution that combines rapid snap technology and recovery repository to back up, replicate, verify, and restore your data anywhere. Read on and explore how you can eliminate downtime and protect your critical workloads with this single, unified solution.

  • Using Containers with Red Hat Enterprise Linux

    Sponsored by: Red Hat

    Access this paper to learn how to pair containers with Red Hat Enterprise Linux to simplify and secure application delivery by providing lightweight application isolation, complete runtime encapsulation, image-based deployment, and more.

  • Case Study: Defending Mobile Apps from Attacks

    Sponsored by: Arxan

    Discover how a leading medical device manufacturer hardened their application protection strategy to allow physicians to securely read and monitor patient data, as well as securely control medical devices using mobile applications. Learn how you can gain similar security benefits for your own applications.

  • Securing the Connected Car Ecosystem

    Sponsored by: Arxan

    Discover how this leading automaker was able to protect their Connected Car environment to mitigate never before seen security risks and stop hackers from injecting malicious code into customers' vehicles.

  • See How Apps are Being Hacked

    Sponsored by: Arxan

    This webcast illustrates some of the ways hackers are breaking into your mobile applications. See real life examples of how mobile app hacking is becoming easier and faster than ever before.

  • How Automation Provisions and Maintains Physical, Virtual, and Cloud Servers

    Sponsored by: BMC

    Find out how you can accelerate vulnerability resolution, lower costs of remediation, and avoid major security incidents with automated management, control, and enforcement of server configuration changes in the data center and cloud.

  • Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World

    Sponsored by: OneLogin

    In this webinar Garrett Bekker, Senior Analyst for 451 Research explores the current state of identity management and discusses some of the emerging access control technologies that can help address these challenges.

  • Manage Change, Enforce Security, and Incorporate Cloud in Your Windows Ecosystem

    Sponsored by: Puppet

    Learn where to incorporate better levels of control, and how to automate the delivery and operation of Windows applications on premise and in the cloud. Plus, uncover the 5 questions decision-makers in a business need to be asking.

  • State of Application Security Report

    Sponsored by: Arxan

    You know why mobile apps must be secure, now learn why in this white paper. It provides recommendations for how organizations and consumers can minimize the risk of their mobile apps being hacked and how app developers can improve protection.

  • Data Security for the Digital Businesses

    Sponsored by: HPE and Intel®

    How do you know if your data is secure? Uncover three questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.

  • How Jefferson Enhances Patient Experience and Research with mHealth App

    Sponsored by: CloudMine

    Discover how Jefferson Health was able to build their mHealth application in half the expected time and start to collect HIPAA-compliant data immediately in order to engage patients and better understand and improve the quality of care.

  • Why an EHR is Only as Good as Your Process

    Sponsored by: CloudMine

    With an 82% adoption rate as of 2015, electronic health records (EHRs) are used by nearly every office-based healthcare provider. Discover how EHR developed, the challenges associated with their interoperability, the benefits of integration, and how they can be used today to drive adherence and keep patients healthy.

  • 7 Key Factors of a Highly Effective Application Protection Solution

    Sponsored by: Arxan

    An effective application protection strategy is paramount to safeguarding the integrity and confidentiality of an application. This white paper discusses the 7 key factors that enable effective application protection, mitigating binary code risks and combating the latest security threats.

  • Balancing Needs of Providers and Patients

    Sponsored by: CloudMine

    Don't be one of the organizations that take a haphazard approach to leveraging the invaluable asset of your patients. Discover both sides of the communication divide and what steps to take to improve communication quickly.

  • Defeating the Threat Within

    Sponsored by: Forcepoint

    Your critical data can be stolen by someone who interacts with your network daily. You need the right plan before it happens. Learn about the new wave of insider threats and start planning now.

  • Connected Health Cloud Brochure

    Sponsored by: CloudMine

    Discover the different facets of a healthcare app development tool that can help your healthcare organization quickly and reliably create apps that are HIPAA compliant.

  • Newly Announced Tools For Healthcare App Building

    Sponsored by: CloudMine

    Discover the importance of an interoperability engine, cognitive analytics, and developer tools when building intelligent and compliant healthcare applications. Learn how to connect with leading big data analytics platforms, utilize cognitive analytics to improve compliance reporting, incorporate wearables into the continuum of care, and more.

  • Get To Market Faster

    Sponsored by: CloudMine

    Discover how a healthcare organization with limited technology resources was able to deploy a feature-rich, HIPAA-compliant mobile app less than 2 months after developing initial app concepts.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.