ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Akamai’s [state of the internet] Q2 security 2016 Report

    Sponsored by: Akamai

    This report shows you the cybersecurity and attack trends to the end of Q2 2016, specifically in regards to DDoS and web application attacks. Access now to discover why we've experienced such a dramatic increase in DDoS and web application attacks.

  • GigaSECURE Security Delivery Platform

    Sponsored by: Gigamon

    Discover how to shift your security strategy from perimeter defenses towards a detect and protect frameworkm gaining greater visibility in the process. Learn how to extend the reach of your security applications everywhere on your network by giving them the right traffic at the right time.

  • 5 Considerations for Securing Hybrid Clouds

    Sponsored by: Intel Security

    This white paper explores both old and new security best practices and how to apply them to cloud-based infrastructures. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.

  • Analysts Reveal how to Secure SaaS

    Sponsored by: Palo Alto Networks

    This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps.

  • Securing Office 365 Is Easier Than You Think

    Sponsored by: Palo Alto Networks

    SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.

  • Securing the Unpatchable

    Sponsored by: Palo Alto Networks

    Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.

  • Best Practices for Writing Secure iOS and Android Apps

    Sponsored by: Proofpoint, Inc.

    As mobile applications grow to reach wider audiences, they become larger targets for cyberattackers. Access this list of 21 mobile security guidelines for developers and security pros when developing Android and iOS mobile apps. Learn how to provide security at every step of the mobile application development and management processes.

  • Why App Stores Cannot Protect Enterprises from Malware and Dangerous Apps

    Sponsored by: Proofpoint, Inc.

    Attackers have adapted to the mobile environment. Discover 18 examples of how curated app stores are failing to protect enterprises from malware and dangerous apps, and cannot provide compliance or privacy protection.

  • Containerization Alone Cannot Defend Against Dangerous And Malicious Apps

    Sponsored by: Proofpoint, Inc.

    In this white paper learn the myth about containerization on a BYOD device. Discover several security scenarios on app-based breaches including: network profiling apps, VPN hijacking apps, data mining apps, and more.

  • From DevOps to DevSecOps: Integrating Security

    Sponsored by: BMC

    They key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.

  • How Etsy's DevOps Teams Fend off Fraudsters

    Sponsored by: BMC

    In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.

  • Allow Your Enterprise Greater Mobile App Security

    Sponsored by: MobileIron

    This white paper explains how your enterprise can boost the security of its information across a variety of devices, without putting unnecessary restraints on growth or accessibility. Learn how you can Allow your IT admins disable keyboard options to block unrestricted access, simply track data usage, and more.

  • Securing Connected Cars Through Comprehensive Software Testing

    Sponsored by: Synopsys

    There is a need for greater software testing and assurance in the automotive industry today. Dig deeper into the vulnerabilities associated with automotive software and learn how to test it before your vehicle roles into the dealership.

  • The Rise of Cloud-Based Application Security Vulnerabilities

    Sponsored by: Onapsis

    This e-guide explores the vulnerabilities presented by mobile apps, and the steps security professionals can take to ensure those vulnerabilities are not exploited. Find out how you can improve your security practices by focusing on protecting mobile devices, discovering vulnerabilities without the aid of an HTTP(S) interface, and more.

  • Building a Strong Application Security Program

    Sponsored by: Onapsis

    What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.

  • Approaching Office 365 with a New Mobile Security Model

    Sponsored by: MobileIron

    Learn how your enterprise can approach securing Office 365 for mobile devices. Discover not only what needs to be done to distribute apps securely, but also protect app data-at-rest, data-in-motion, and more.

  • Deliver Secure Applications to Boost Business Productivity on Mobile Devices

    Sponsored by: Citrix

    Tune into this video to discover how to enforce mobile business productivity with virtual application deployment that keeps apps and data secure in the data center. Watch now to assure your mobile workforce of a user-friendly experience with secure remote access, enterprise file sync and share, and more.

  • Delivering Virtual Apps to Any Mobile Workspace

    Sponsored by: Citrix

    Learn how to deliver secure virtual applications and data to any corporate or personal device in your organization. Tune into this brief video to transform your employees' mobile workspaces to promote better productivity, and foster a new level of collaboration among your mobile and remote workers.

  • Trends in SAP Cybersecurity

    Sponsored by: IBM

    The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • Tolly Test Report: Evaluating a Web Protection Vendor

    Sponsored by: IBM

    In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.

  • Simplify Your Google Apps Collaboration and Management with IDaaS

    Sponsored by: OneLogin

    This informative webinar is designed to get you through the most complex of Google App deployments.

  • Fast Track Your Office 365 Deployment and Beyond

    Sponsored by: OneLogin

    Access this informative webinar, featuring EMM industry leader SOTI, to discover hidden Office 365 roadblocks and headaches, how to automate on-and off-boarding of users in real time to achieve both business agility and security, and how SOTI quickly deployed Office 365 and achieved ROI in just one week.

  • Five Signs It’s Time for Mobile Workspace Delivery

    Sponsored by: Citrix

    Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.

  • Threat Report: Exploitation & Cyberattacks on SAP Business Applications

    Sponsored by: Onapsis

    Your SAP applications are under attack. Access this in-depth threat report to learn about a specific vulnerability being actively exploited, the types of SAP systems affected, and how you can mitigate this vulnerability to minimize business risk.

  • Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices

    Sponsored by: Lenovo Software

    This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.