ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Mobile First Financial Services

    Sponsored by: MobileIron

    The financial services industry has found that mobility is the big stake feature that will propel organizations forward or leave them in the dust. Read on to learn about a mobile service designed with the cost and security concerns of the finance industry in mind.

  • Discussing the Digital Workspace Impact on End-User Computing

    Sponsored by: Dell, Inc., Intel and VMware

    If the desktop is no longer the defining model for end-user computing in the mobile-cloud era, how will enterprises continue to deliver virtualized desktops and workspaces? Examine the impact of mobility on VDI implementation and discover how to deliver today's virtual workspaces across BYO mobile devices.

  • Satisfy that Android sweet tooth: Making it work for your enterprise

    Sponsored by: IBM MaaS360

    Protect your corporate data while giving users seamless access to work information on their devices. Take advantage of unified policies, threat management, app distribution, device management and a standard framework for a consistent experience across a wide variety of Android devices.

  • Protecting End of Support Systems

    Sponsored by: TrendMicro

    You have options available to address and reduce your risk. What you need is comprehensive security controls that can protect older systems like Windows Server 2003 while you plan and execute a transition that makes sense for your business. Review the risks facing your organization and learn how you can smoothly transition into newer software.

  • Keep Cloud Applications Secure During The DevOps Process

    Sponsored by: CloudPassage

    To minimize cloud application risks, make sure your security strategy accounts for each phase of a DevOps project. Find out why effective cloud app security starts with building security into every step of the development process and how you can make security a key part in each step of the DevOps process.

  • George Washington University Leverages Gigamon’s GigaSECURE to Improve Network Visibility and Security Posture

    Sponsored by: Gigamon

    Discover how GW was able to reduce the video steaming traffic on its network from one of the top five applications routing data through its security and application performance solutions to one of the top 25. The university is now able to take advantage of centralized security processing and scale across multiple data centers.

  • Application Session Filtering Cookbook

    Sponsored by: Gigamon

    This guide presents a number of examples on how to use ASF in step-by-step recipes. It provides a methodology for identifying string patterns and regular expressions.

  • SB-Secure-Access-for-Retail

    Sponsored by: Fortinet, Inc.

    When the same network is used by your shoppers and retail associates alike, it's critical that your network security is capable of detecting advanced threats to protect business assets. Discover how to segment devices and access layers across wired and wireless networks to ensure your network is secured from all access points.

  • Help Your Security Team Sleep at Night

    Sponsored by: Riverbed Technology, Inc.

    This resource explores a platform that combines the packet, flow, application, infrastructure, and transaction data required to understand past security events. Uncover ways to make the right choices to strengthen and monitor cyber defenses.

  • Content PaaS for Your Enterprise Applications

    Sponsored by: Box

    In this white paper, receive in introduction to Box Platform, a content platform as a service (PaaS). Explore how you can create better content experiences for your users, and introduce advanced collaboration to your apps with user-facing services that utilize granular permission control over all app content.

  • Accelerate Time-To-Market for IoT Products

    Sponsored by: Xively by LogMeIn

    The Internet of Things may be the next biggest tech shift since the Internet, but there are still many questions and challenges to overcome. Discover how the right partner can help you efficiently connect and manage IoT products, allowing you to focus on bringing your product to market before competitors do.

  • When App is the Business, the Business is the App Vol. 3

    Sponsored by: IBM MaaS360

    IT needs to support each step in planning and developing apps to help ensure security throughout the app lifecycle. Learn the key security dangers of mobile apps in the enterprise and find out how to eliminate them in your app-driven business.

  • When App is the Business, the Business is the App Vol. 2

    Sponsored by: IBM MaaS360

    Empower your organization with a mobile application strategy that advances your business while providing scalability, sustainability and security. Learn how to design your business around applications without putting enterprise data at risk.

  • Secure an Office 365 and Exchange hybrid setup

    Sponsored by: Symantec Corporation

    This e-guide shows you six important factors to consider for the larger picture in Exchange Server security with a hybrid setup. These factors take into consideration the high-level of security issues that can surface when you disrupt the critical business system.

  • Succeeding with Static Code Analysis: An Implementation Guide

    Sponsored by: Programming Research

    Static code analysis can help you rapidly ensure the safety and security of embedded software, but it isn't a one-size-fits-all solution. Discover the biggest challenges that can prevent static code analysis from effectively detecting issues early on.

  • Unified Identity Governance - A Business Overview

    Sponsored by: Oracle Corporation

    Application proliferation has created renewed identity fragmentation, as users are inconsistently managed across apps in the enterprise. Learn how to create a converged identity governance process—managing access privileges across all business applications and platforms by unifying identity governance.

  • Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform

    Sponsored by: Gemalto

    With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.

  • Mobilize Your Corporate Content and Apps

    Sponsored by: IBM MaaS360

    Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.

  • Static Code Analysis: A Buyer's Guide

    Sponsored by: Programming Research

    How can you select the right static code analysis solution to deliver reliable, safe, and secure software? Explore the major benefits and pitfalls of static code analysis tools, and discover best practices to optimize embedded software development.

  • Six steps to control the uncontrollable

    Sponsored by: Microsoft

    Your employees need to be productive where and when they want to be. If you don't provide ways for them to accomplish this, they'll do it themselves. So how sure are you that you're in full control of your company? Explore six key focus areas to managing your enterprise's mobility and empowering your employees while ensuring security.

  • Security essentials for CIO's enabling mobility - their device, your data

    Sponsored by: IBM MaaS360

    Your goal is to make BYOD policies feasible by seamlessly securing corporate data on the device while providing logical separation from personal activities. Learn five key steps you should consider before putting your BYOD program in place.

  • Controlling the uncontrollable

    Sponsored by: Microsoft

    29% of workers use three or more devices, work from many locations, and use many apps, and this number is growing. The problem is enabling employees without compromising security throughout the enterprise. Read on to learn about an enterprise mobile management solution that will make the process easier than you may realize.

  • The State of Mobile Application Insecurity - Ponemon Institute Research Report

    Sponsored by: IBM MaaS360

    This Ponemon Institute study, which encapsulates 640 individuals involved in the application development and security process, will help you understand how organizations are reducing the risk of unsecured mobile apps used in their business practices.

  • Benefits of Building a Digital Business on an Integration Foundation

    Sponsored by: Axway

    As the number of connected "things" increases, enterprise data is becoming more vulnerable and waiting to be exploited. All this data needs to be managed and integrated into business processes to secure the future of your digital ecosystem.

  • Enterprise Mobile Management

    Sponsored by: IBM MaaS360

    Are you sure that your mobility solution is keeping you competitive? The future of business is becoming increasingly focused on mobility and shaping the mobile worker's experience. Access this report to compare the top eleven enterprise mobile management vendors and gain an understanding of what to look for in a solution.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.