ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Maximizing The Value of Web Application Firewalls

    Sponsored by: Akamai

    In this white paper, learn some best—practices for managing your web application firewall (WAF) such as 3 basic rules for running your WAF when it's in 'alert mode', why data analytics is key to building an intelligent WAF, and more.

  • Mobile Data Research Report

    Sponsored by: Wandera

    Mobile data continues to change and grow each year – and because of this frequency of change, it's important to know how your data may be affected. Learn about new mobile threats, compare security and data usage between Samsung Galaxy and Apple devices, as well as between roaming and domestic data usage, and more.

  • Top 5 Benefits of Modernizing and Mobilizing Enterprise Apps

    Sponsored by: PowWow

    This custom article explores how to modernize key enterprise apps to focus on a more seamless experience for completing tasks and managing workflows. Find out how to boost employee productivity and efficiency, and uncover the top 5 benefits that are motivating the move towards modernization.

  • How Mobile Application Platform Integration Can Boost Security

    Sponsored by: Red Hat

    In this video, learn how you can mitigate security threats across your mobile application platforms by integrating your systems for data on the backend, as well as how middleware applications run in the cloud helps, and more.

  • Native Hybrid Cloud: A Turnkey Pivotal Cloud Foundry Developer Platform

    Sponsored by: Dell EMC

    Access now to learn how to boost app developer productivity, empower developers with self-service, and eliminate the cost, time, and complexity of building and maintaining an in-house cloud infrastructure while navigating the cultural shift to DevOps with a native hybrid cloud platform.

  • Array Networks Virtual Load Balancer Case Study: County of Maui

    Sponsored by: Array Networks

    The County of Maui needed to grant users access to consolidated geographical information, without disruptive downtime or bogged-down application throughput. Download this case study to find out how they updated and centralized their GIS, gaining flexible, versatile and easy-to-use load balancers that will serve their needs now and in the future.

  • Array Networks Secure Remote Access Case Study: City of Santa Barbara

    Sponsored by: Array Networks

    The City of Santa Barbara needed a way to provide anytime, anywhere access to documents, files and email from any device, while maintaining the security of confidential information, regardless of the device used to access it. Download this case study to find out how the City of Santa Barbara solved these challenges.

  • Focus ANZ: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.

  • Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation

    Sponsored by: MobileIron

    This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.

  • What is Enterprise Mobile Security?

    Sponsored by: Lookout

    Download this eBook to find out why EMM and MDM are not enough to ensure a secure mobile enterprise and understand where the fault lies in today's EMM/MDM initiatives.

  • Improving Application Security and Performance With Cloud Firewalls

    Sponsored by: Akamai

    This whitepaper dives into the biology of web and DDoS attacks. Learn how a suite of systems can provide you with a cloud-based web application firewall to protect your infrastructure from any threat.

  • 4 Market Trends Driving Mobile Banking

    Sponsored by: HID

    Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.

  • Top 5 Considerations: What to Look For in Mobile Banking Security

    Sponsored by: HID

    Uncover 5 IAM considerations for choosing a mobile banking security tool. Also discover a concise market overview of mobile banking apps, including a look at opportunities for growth and major obstacles.

  • The Definitive Guide to Data Protection and Disaster Recovery on Enterprise Clouds

    Sponsored by: Nutanix

    Access this e-book to examine important challenges and trends in availability and data protection. You will learn about a simple, cost-effective approach that works with enterprise cloud computing that helps you not only catch up, but future-proof your data protection.

  • How to Implement a Continuous Application Monitoring Security Initiative

    Sponsored by: Hewlett Packard Enterprise

    Learn how to protect your applications with a continuous application monitoring security initiative, ensuring that your organization's apps in production are secure and stay secure once launched.

  • Cost-Efficient, Full Lifecycle App Security Tools

    Sponsored by: Hewlett Packard Enterprise

    Watch this brief video to learn about a best-in-class tool that drives down into an app's code and pinpoints its potential vulnerabilities quickly and efficiently in order to enable truly secure app development.

  • How the Game of Application Security is Changing

    Sponsored by: Hewlett Packard Enterprise

    Learn how a Runtime Application Self-Protection (RASP) can shore up the protection that traditional perimeter defenses are lacking against modern threats.

  • Change Healthcare Drastically Cuts Application Security Testing Costs

    Sponsored by: Hewlett Packard Enterprise

    Learn how Change Healthcare was able to cut their application security testing costs while maintaining high standards.

  • Evaluating the Top Application Security Testing Vendors

    Sponsored by: Veracode, Inc.

    This Gartner report focuses on top AST vendors' SAST, DAST and IAST offerings, maturity and features as tools or as a service. Learn all you need to know about top vendors' AST offerings to ensure you're picking the right tool for your business.

  • Solution Brief - Securing the mobile enterprise

    Sponsored by: IBM

    Discover a comprehensive portfolio of mobile security systems that address four key mobile security challenges: protecting devices, securing content and collaboration, safeguarding applications and data, and managing access and fraud. The portfolio also includes a layer of security intelligence for advanced threat detection.

  • Building an Application Security Program: Why Education is Key

    Sponsored by: tCell

    Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.

  • Application Development Security Requires Forethought

    Sponsored by: tCell

    Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.

  • How mobile remote desktop apps work

    Sponsored by: LogMeIn Rescue Lens

    Mobile remote desktop apps can be an important tool for enterprises in keeping up with today's on-the-go workforce. The benefits of greater accessibility mean they could be a strategic fit in a variety of enterprise environments. Learn how to select the right mobile remote desktop products for your business, and how they work.

  • The New BYOD: 5 Best Practices for a Productive BYOD Program

    Sponsored by: vmware airwatch

    Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.

  • EMM Real Benefits in Today's Mobile World

    Sponsored by: vmware airwatch

    The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.