ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • The State of Endpoint Protection & Management

    Sponsored by: Absolute

    According to Larry Ponemon of the Ponemon Institute, 67% of enterprises are unable to detect employee use of insecure mobile devices. This white paper aims to answer some of the top questions security and IT operations executives face in regard to endpoint security, mobile security, and overall protection of your enterprise.

  • The Three Faces Of Insider Threat

    Sponsored by: Absolute

    Insider threats are an extremely challenging IT issue to resolve. In this white paper, uncover how to protect your organization against insider threats.

  • The Stakes Have Changed, Have You? 20 Years of DDoS Attacks Targeting Business

    Sponsored by: Arbor Networks

    According to the Worldwide Infrastructure Security Report, 93% of survey respondents experienced application layer-attacks and 56% experienced multi-vector DDoS attacks. Inside, learn how DDoS attacks have evolved and changed over time.

  • Cisco and Splunk: Innovation through the Power of Integration

    Sponsored by: Splunk

    In this webcast, gain a better understanding of the partnership between Cisco and Splunk. Then find out how IT network pros are able to leverage better cloud security and quickly troubleshoot issues and outages.

  • What You SIEM is What You Get

    Sponsored by: AlienVault

    A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.

  • Increasing Application Availability

    Sponsored by: Silver Peak

    In this white paper, learn how to overcome the challenges of poor application availability and performance with the help of an SD-WAN architecture.

  • ExpensiveWall: A Dangerous 'Packed' Malware on Google Play that will Hit You in Your Wallet!

    Sponsored by: Check Point Software Technologies Ltd.

    Go inside this resource to learn what makes the new malware found on Google Play, nicknamed "ExpensiveWall" so unique and dangerous, as well as what steps you can take to stay protected.

  • Amazon Web Services: Overview of Security Processes

    Sponsored by: Amazon Web Services

    You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.

  • Virtualize Skype for Business for Secure Unified Communications

    Sponsored by: Citrix

    With thousands of distributed devices, a traditional Skype for Business deployment exposes you to risk. When virtualized instead, however, sensitive chat logs and file exchanges are securely stored in the datacenter, dramatically reducing risk. Download this resource to discover additional benefits of virtualizing Skype for Business.

  • 11 Steps IT Needs to Take When Adopting Cloud Apps and Services

    Sponsored by: Symantec & Blue Coat Systems

    Cloud apps introduce a new threat vector, with lots of credentials floating around that provide direct access to business critical data. This white paper provides planning strategies for adopting cloud apps as well as information on managing the human factor.

  • AWS Best Practices for DDoS Resiliency

    Sponsored by: Amazon Web Services

    Do not let your website or application become unavailable to end users - protect against DDoS attacks once and for all. Explore this white paper and learn how to improve resiliency of your applications against DDoS attacks with these best practices.

  • Overview of AWS Security - Application Services

    Sponsored by: Amazon Web Services

    Amazon Web Services offers a variety of managed services to use with your applications, including services that provide application streaming, queueing, push notification, email delivery, search, and transcoding. Learn more inside.

  • Overview of AWS Security - Network Security

    Sponsored by: Amazon Web Services

    Explore this white paper to learn more about AWS cloud monitoring tools designed to protect your network architecture from threats like DDoS attacks, IP spoofing, and more.

  • AWS Security Best Practices

    Sponsored by: Amazon Web Services

    Is your data protected from accidental or deliberate theft, leakage, integrity compromise, and deletion? In this white paper, explore best practices that you can leverage to build and define an Information Security Management System (ISMS) and learn how to protect your mission-critical information.

  • Overview of AWS Security - Analytics Services, Mobile and Applications Services

    Sponsored by: Amazon Web Services

    Cloud-based analytics services can help your organization process and analyze any volume of data. Download this resource to learn how your organization can benefit from a variety of cloud based analytics and mobile application services, ranging from identity and access management to mobile analytics, and deployment and management services.

  • Encrypting Data at Rest

    Sponsored by: Amazon Web Services

    This white paper provides an overview of different methods for encrypting your data at rest. Uncover 3 approaches on how encryption keys are managed and where they are used, so you can decide which approach is best for you.

  • Security at Scale: Logging in AWS

    Sponsored by: Amazon Web Services

    The logging and monitoring of API calls in the AWS cloud are key components in security and operational best practices, as well as requirements for industry and regulatory compliance. This white paper explores how to achieve compliance in AWS with common logging requirements.

  • Secure Content Delivery with Amazon CloudFront

    Sponsored by: Amazon Web Services

    As companies respond to cybercrime, compliance requirements, and a commitment to securing customer data, their adoption of SSLs and TLSs increases. Gain insight into how you can improve the security and performance of your APIs and applications (hint: Amazon CloudFront) while lowering your content delivery costs.

  • Strategies for API Security

    Sponsored by: Akamai Technologies

    APIs provide transparency to the internal structure of applications and provide granular access to an application's backend, making online businesses more vulnerable than ever before to cyberattack threats. This white paper outlines the most common types of cyberattacks and offers strategies for protecting APIs.

  • Key software development trends to drive business success

    Sponsored by: ComputerWeekly.com

    In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.

  • The Next Generation of Cloud App Security

    Sponsored by: Symantec & Blue Coat Systems

    By 2020, 85% of large enterprises will use a cloud access security broker (CASB) platform for their cloud services which is up from less than 5% today, according to Gartner. This white paper offers benefits of CASB and how to increase efficacy, avoid incidents and more.

  • Rent-A-Center's Cloud-First Approach on AWS

    Sponsored by: Alert Logic

    This case study explores how Rent-A-Center overcame the challenge of securing their move to the cloud in order to keep up with the acceleration of digital technology and e-commerce.

  • Next Generation Secure Web Gateway: The Cornerstone of Your Security Architecture

    Sponsored by: Symantec & Blue Coat Systems

    Explore this white paper to uncover whether a web proxy would be beneficial in protecting your organization from sophisticated web-based attacks.

  • The Human Factor 2017

    Sponsored by: Proofpoint, Inc.

    90% of clicks on malicious URLs occur within 24 hours after they're delivered. Key into this webcast to get a closer look at when users are most likely to click into malicious URLs, which industry's users click the most, and what types of attacks have the most clicks.

  • Mobile Application Development at the Speed of Business with Containers

    Sponsored by: Red Hat

    Discover how to use container and cloud technologies to build quality mobile apps quickly. Learn how to power your native and mobile app development initiatives with microservices, enterprise-grade containers, DevOps, APIs, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.