ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • How to Build Application Security into The Entire SDLC

    Sponsored by: TechData - HPE

    Get a rundown of not only how app security should ideally work, but also how to tailor your security measures to match your enterprise's needs.

  • Defending Applications with Integrated SaaS Technology

    Sponsored by: Hewlett Packard Enterprise

    The following white paper describes how to use a cloud-based tool that provides visibility into the security of your applications. Discover ways to protect your production applications.

  • Veracode Secure Development Survey

    Sponsored by: Veracode, Inc.

    Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.

  • State of Software Security: A Developer's Viewpoint

    Sponsored by: Veracode, Inc.

    Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more.

  • How to Build a Robust Application Security Governance Framework

    Sponsored by: Veracode, Inc.

    Discover not only how to simply, but also streamline application security. Learn how to ensure that everyone is in-sync, and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.

  • How SAP Ensured Secure Application Production

    Sponsored by: TechData - HPE

    In this case study, learn the security strategy SAP used to find vulnerabilities in application code written in Java, C#, JSPs, and other languages. Find out how this helped them reduce cost to repair by fixing vulnerabilities early on, produce more secure code, and more.

  • Ansible Tower Demo: The Case for IT Orchestration

    Sponsored by: Red Hat

    Do you have a framework for automating IT systems? Learn how to integrate Ansible Tower orchestration and IT configuration with your own Linux server or cloud instance. Download now to see if agentless IT automation is right for your organization's app infrastructure.

  • The Benefits of Bug Bounty Programs and Security Code Testing

    Sponsored by: Veracode, Inc.

    In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats. Discover the pros and cons of "bug bounty" programs, the importance of code testing, and more.

  • App Security Can’t Happen Without Developers

    Sponsored by: Veracode, Inc.

    In this report from Forrester learn how to use a combination of people and tools to deliver secure apps. Gain key takeaways such as mitigation costs skyrocket when security issues survive the development process, watching the OWASP Top 10 doesn't help when your app was attacked with No. 11, and more.

  • Application Security Testing Vendor Evaluations

    Sponsored by: Veracode, Inc.

    This Gartner report evaluates vendors' maturity in offering application security testing features. Learn the strengths and weaknesses of each vendor to better assess which product is right for you.

  • Automating Cloud Infrastructure with Ansible IT Engine

    Sponsored by: Red Hat

    Examine how Splunk accelerated IT provisioning, configuration, and task management within its cloud infrastructure with an automation engine that rapidly deploys and scale server clusters and apps, configures the cloud on-demand, and autoscales infrastructure as needed.

  • Top Lessons from 2016: How to Accelerate Digital Transformations

    Sponsored by: Hewlett-Packard Enterprise

    Discover how to implement faster digital transformations with strategies for accelerating time to value, insights, trust, and engagement. Uncover some of the top lessons learned from 2016 for faster app delivery, DevOps, Agile development, IT management, hybrid cloud computing, big data, and more.

  • Make Every Day a Cyber Monday

    Sponsored by: SOTI Inc.

    84% of shoppers surveyed want to see more location-based technology. Access this e-book to learn how in-store mobile technology is shaping the future of retail. Discover the role the Internet of Things will play in future retail and what this means for e-commerce.

  • Why RAD is Right for Mobile and Web Front-End Development

    Sponsored by: OutSystems

    Discover how to deliver agile, responsive front-end applications with rapid app development (RAD). Read on to meet today's dramatically digital customer journey by upgrading your legacy stacks and mobile app strategy, learning how to overcome the challenges in adopting an open-source stack, and more.

  • Trustwave Global Security Report

    Sponsored by: SingTel

    Discover in-depth analysis and organized statistics from breach investigations, incident reports and vulnerability research from around the world. Use this report as a business plan to learn what cybercriminals are plotting now and what you could face in the future.

  • Best Practices for Enterprise Security

    Sponsored by: Citrix

    The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.

  • Manage Risk by Protecting the Apps and Data that Drive Business Productivity

    Sponsored by: Citrix

    Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.

  • Protecting the 3 Areas of Secure Mobility

    Sponsored by: BlackBerry

    Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.

  • Virtualize Skype for Business for Secure Unified Communications

    Sponsored by: Citrix

    Did you know that when virtualized, sensitive chat logs and file exchanges are securely stored in the datacenter? Learn how to establish a secure foundation for collaboration by virtualizing Skype for Business—providing the control and infrastructure visibility you crave for VDI.

  • Seven Signs You Need to Embrace Desktop and Application Virtualization Now

    Sponsored by: VMware

    Do you feel you are spending too much time on device, image, and application maintenance with little time left to focus on strategic IT projects? Download this trend brief to examine the 7 signs that will determine whether or not the time is right for your organization to embrace desktop and app virtualization.

  • 3 Ways to Migrate SAP to Microsoft Azure

    Sponsored by: Freudenberg IT

    Business agility, innovation, cost reductions, scalability, and shadow IT: These 5 critical areas can be largely impacted and improved upon by leveraging cloud services and SaaS. Explore 3 ways to bring these benefits to SAP management by hosting mission-critical SAP apps in the cloud with Microsoft Azure.

  • Maximize Performance and Mitigate Risks with PHP 7

    Sponsored by: Rogue Wave Software

    This white paper examines PHP, a tried and true platform for business-critical apps that has driven web and mobile growth for a number of years. Access now to learn more about the release of PHP 7, which introduces new language constructs and significantly enhanced performance, and uncover insightful tips on how to optimize your use of PHP.

  • A Network Security View Of Docker Containers

    Sponsored by: NeuVector

    Many top concerns for containers can be addressed with a better understanding of basic container security and networking. Learn tips for getting visibility into container networking to create a more secure environment overall.

  • What's in Your Mobile App Dev Toolbox?

    Sponsored by: OutSystems

    Mobile application success comes down to having the right strategy in place and the right tools at your disposal. This essential guide explores the 8 factors that dictate enterprise mobile app success and takes you inside 3 enterprise mobile app stories, why these apps saw success, and how to replicate it for yourself.

  • How Virtualization is Transforming Technology Delivery in Healthcare

    Sponsored by: Citrix and Pure Storage

    Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.