ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Solution Brief: Satisfying Today's Bandwidth Hungry Consumers

    Sponsored by: Fortinet, Inc.

    This white paper highlights a high performance next generation firewall solution that protects information and applications without slowing down your network or affecting availability. Read on to see how this firewall solution can provide your enterprise with in-depth visibility and reporting, highly effective intrusion prevention system, and more.

  • There's More to Backing Up VMs Than Meets the Eye

    Sponsored by: Veeam Software

    This whitepaper highlights a built-in infrastructure for application backups that can enable the full backups of virtual environments. Read on to see how this infrastructure, combined with Veeam's backup and recovery solutions, can provide your virtual environments with a wide array of backup, recovery, and replication functionalities.

  • Choosing an Online Backup Tool: Why Speed Should Be a Key Consideration

    Sponsored by: LogicNow

    This whitepaper explores an online backup solution that speeds up the process of identifying what files have been changed so that backup windows can focus on actual backups, making them faster and more efficient. Read on to see how this solution can allow your enterprise to eliminate the hassle of slow backups.

  • How to Deliver High Performing Mobile Applications with Cloud

    Sponsored by: IBM

    In this webcast, you will discover how to leverage the cloud to continuously deliver high-performance mobile apps, and integrate these apps with your existing IT systems to source new avenues of revenue and transform your business.

  • The Cloud App Visibility Blindspot

    Sponsored by: Imperva

    Learn about the visibility blind spot when adopting SaaS apps and the increased risks organizations face with employee use of "Shadow IT."

  • The State of App Security

    Sponsored by: MobileIron

    In this white paper, learn how to proactively approach mobile app security. Explore the features one mobile security option provides, including automated responses to threats like malware, integration to make existing security stack mobile-aware, and more.

  • Drive Security, Efficiency and Performance with ADCs

    Sponsored by: A10 Networks

    This white paper explores ways to deploy the application security, scalability and high performance you need to run your business. Uncover how ADCs can be used to reduce expenses, centrally assess and manage SSL libraries, and more.

  • How Mobile Malware Compromises Your Secure Containers and Enterprise Content

    Sponsored by: Kingpin Communications

    Mobile operating systems contain a large number of exploitable vulnerabilities related to access privileges. In this white paper, you will learn how mobile malware could compromise your secure containers and enterprise content, and discover how to detect suspicious mobile activity.

  • Checkpoint: Demystifying Mobile Security Attacks

    Sponsored by: Kingpin Communications

    In the following white paper, you will examine some of the most common mobile attacks, and moreover demystify how the attacks work and the damage they can cause.

  • Defense-In-Depth: Database Securing

    Sponsored by: Oracle Corporation

    Today, a DBA can leave work with terabytes of information easily. In this technical primer, you'll find details on ways to control access for your authorized users. Uncover strategies for data theft, SQL injection, and noncompliance prevention.

  • Your Guide to Database Firewall Strategies

    Sponsored by: Oracle Corporation

    Uncover comprehensive and flexible database, operating system, and application monitoring strategies. Learn how database firewall tools can act as a first line of defense for your network, help prevent SQL injection, and much more.

  • 4 Step Get Started Guide to Open Source Security Triage

    Sponsored by: Black Duck Software

    This white paper helps you ask the right questions about your open source security vulnerabilities and find answers to them.

  • Choosing a Firewall That's Right for You

    Sponsored by: Palo Alto Networks

    This webcast discusses how to retain the advantages of enterprise apps while minimizing risk with better network security. Learn how to choose a firewall that's right for your business's apps and users.

  • Upgrade your Business' Operating System

    Sponsored by: Microsoft

    This quick guide outlines several reasons why upgrading operating systems in the enterprise is easier than you think. Learn how the process can actually give you piece of mind, save you money, and keep you safe.

  • Security Operations in the Cloud

    Sponsored by: TrendMicro

    This white paper discusses some best practices to adopt in securing workloads in Amazon Web Services.

  • Mobile App Q&A: Mobile Expert Talks Security and Testing

    Sponsored by: InfoStretch

    This e-guide provides an in-depth question & answer session with mobile application lifecycle management expert Manish Mathuria about the biggest problems around mobile app security. Access critical advice on how to design your mobile app security testing process to catch issues before they lead to a breach you can't afford.

  • The Top 8 Best Practices for Deploying XenApp and XenDesktop

    Sponsored by: eG Innovations, Inc.

    In this white paper, you will discover how to improve the security and remote access of your virtual applications and desktops, and moreover access the top 8 best practices for Citrix XenApp/XenDesktop 7.x deployment. Learn how to separate databases for site configuration and logging by reading on now.

  • Peer-to-Peer Peril: How Peer-to-Peer File Sharing Impacts Vendor Risk and Security Benchmarking

    Sponsored by: BitSight

    BitSight recently observed the networks of 30,700 companies across all industries and found 23% of organizations were using the BitTorrent protocol for peer-¬to-¬peer file sharing. In this report you will learn which industries excel in mitigating the risks of file sharing, how P2P file sharing activity impacts security ratings and more.

  • Innovative Enterprise OS: Security, Management and Productivity

    Sponsored by: Microsoft

    This resource highlights an operating system designed to help you respond to modern security and business management challenges. Discover what intelligent mobile options for your employees and customers can do for your organization.

  • Ten Areas Where XenApp Outperforms VMware Horizon Apps

    Sponsored by: Citrix

    In this white paper, you will discover the best-in-class features of one application virtualization platform, and compare its features to market equivalents. Read on to ensure virtualization solutions deliver rich experience for your users and comply with security regulations.

  • Research Report: Enabling the Full Potential of New Operating Systems

    Sponsored by: Microsoft

    This executive brief uses recent research to outline some of the challenges facing client computing, security, and compliance teams. Discover ways new capabilities - such as biometric authentications, universal application deployment, and a seamless app experience - demand a new generation of hardware to properly enable and support them.

  • 5 Steps to Achieve Risk-based Application Security Management

    Sponsored by: IBM

    This white paper will show you how to make applications security a strategically managed process.

  • The State of Mobile Application Security (4th Edition)

    Sponsored by: IBM

    This white paper will give you the latest statistics of online piracy and show you what you can do to protect your IP.

  • 10 Features Every Web App Firewall Should Provide

    Sponsored by: Imperva

    This paper explains in detail the 10 features that every Web application firewall must provide.

  • The Industralization of Hacking: How to Stop Automated Attacks

    Sponsored by: Imperva

    View this infographic and learn how you can better defend against such advanced Web-based attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.