ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Your In-Depth 2017 Cybersecurity Report

    Sponsored by: Comstor

    Out of all of the myriad solutions on the market, information remains one of the greatest weapons that an enterprise can arm itself with. In this expansive 110-page report discover a wealth of research, insights, and perspectives on the current state of cybersecurity.

  • Cybersecurity in the Age of Agile, DevOps, and AppDev

    Sponsored by: Veracode, Inc.

    With cybersecurity becoming a chief issue among enterprises with high-profile attacks like WannaCry in the news, many enterprises are looking to shore up their defenses and mitigate vulnerabilities. Discover the current state of app security, as well as the evolving relationship between AppSec, Agile, and DevOps.

  • Accelerate App Development with a Lifecycle of Service and Support

    Sponsored by: Getronics

    When it comes to managing apps, every organization has the same goals: to drive down cost and complexity, to stop paying for licenses that are never used, to accelerate the provision of new apps without compromising security, etc. Discover how app services help you engineer new apps, re-platform for mobile, and more.

  • Ivanti Workspace Management - Secure and Optimize the Citrix Workspace

    Sponsored by: Citrix Ready

    Attend this webinar to find out how the Ivanti products can help protect and secure Citrix desktops against ransomware, control application usage, reduce the number of Citrix images, and personalize users environments regardless of how they access their desktop. Accelerate your move to Citrix platforms and the Citrix cloud with Ivanti solutions.

  • The Spectrum of Mobile Risk: Understanding the Full Range of Risks to Enterprise Data From Mobility

    Sponsored by: Lookout

    Download this white paper to discover a mobile risk matrix that will help organizations understand the prevalence of mobile risk surrounding software vulnerabilities, mobile app threats, behavior and configurations and more.

  • Understanding IoT: Performance across Use Cases, Regions, and Vertical Markets

    Sponsored by: Aruba Networks

    This e-book examines which use cases, geographical regions, and vertical industries are benefiting most from a well-executed IoT strategy. Explore case studies about IoT smart cities, connected automobiles, smarter healthcare, and uncover tips from Kevin Ashton, the "father of IoT," on how to get started with your IoT strategy.

  • The Internet of Things: Posing Security Threats and Delivering Beyond Expectations

    Sponsored by: Aruba Networks

    Not only are many early adopters struggling to secure IoT devices and apps, but many organizations disagree on what IoT means and how to extract value from it. Discover how different industries define, use, and benefit from IoT by creating "smart workplaces," increasing innovation, enhancing customer experiences, and more.

  • Cost Savings and ROI Enabled by IBM API Connect

    Sponsored by: IBM

    The following study conducted by Forrester consulting provides a framework to evaluate the potential financial impact of IBM API Connect on developing new opportunities for developers. Learn how 32 IBM users fared with accelerating development and time to market.

  • An App - Centric Approach to Mobile Security in Healthcare

    Sponsored by: Blue Cedar

    In this brief white paper, learn about a new mobile security suite that makes protecting your devices as simple as downloading one application.

  • Sungard AS Data Protection Customer Case Study

    Sponsored by: Dell EMC and Intel®

    Explore how Sungard AS implemented a scalable data protection infrastructure that enables faster backups and disaster recoveries. Find out how they created a "Protect My Data" managed data vaulting service, expanded protection storage for virtually any app, improved deduplication and backups, and more.

  • Software Asset Management: Critical for Mitigating Non-Compliance Risks

    Sponsored by: Flexera Software

    This IDC white paper defines software asset management and emphasizes the factors driving its importance. Uncover best practices for mitigating the risks of inefficient software portfolio management and addressing 3 key priorities, namely app security, cost management, and quality of service.

  • Secure the App, Not the Device. Accelerate the Benefits of Mobility

    Sponsored by: Blue Cedar

    Open up this solution brief to learn about the current state of mobile security, and how the app, not the device became the center for security operations. Then, learn about a new way to inject security code into pre-existing app without disrupting the user experience.

  • 11 Policies to Keep Your Apps Secure

    Sponsored by: Blue Cedar

    This white paper outlines a suite of app platform policies to help you secure your applications and govern who has access to them, including certificate management, network integration control, secure microtunnels to application's back-end service, and more.

  • The App is the Endpoint

    Sponsored by: Blue Cedar

    Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.

  • Delivering A Consumer-Simple, Enterprise-Secure Mobile Experience

    Sponsored by: VMware

    Access this infographic to find out how mobility and BYOD are changing the enterprise as much as the introduction of the Internet did.

  • Building a World-Class Web Application Security Program

    Sponsored by: Rapid7

    Read this case study to learn the criteria that went into Microsoft's decision making process when buying their new web application vulnerability scanning system.

  • Application Security Buyers Guide: 15 Requirements

    Sponsored by: Rapid7

    In this white paper, learn the 15 elements you need to make sure an application scanning vendor has before making a purchasing decision.

  • 7 Questions to Ask Your Dynamic Application Security Scanning Vendor

    Sponsored by: Rapid7

    In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision.

  • The Latest Strategies for New Security Challenges

    Sponsored by: Fortinet, Inc.

    Discover how you can improve your protection and visibility while reducing operating complexity to meet tomorrow's security needs.

  • When Software Goes Rogue

    Sponsored by: BDNA

    How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.

  • Building Modern Apps For The Age Of The Customer

    Sponsored by: Salesforce

    What does it take to build a modern app in the age of the customer? This e-book explores a platform that enables you to easily build, connect, optimize, and deploy every kind of app. Find out how anyone in your business--from developers to admins--can build apps.

  • 8 Steps to Building Great Mobile Apps

    Sponsored by: Salesforce

    Delivering the next generation of apps requires solid strategy, design, and execution at every step. This e-book is your guide to the eight key steps for building a mobile app. Learn about the anatomy of a successful mobile app, how they are evolving, and ensure your apps can be continuously upgraded for future success.

  • Patching for businesses –from Manual to Automated

    Sponsored by: GFI

    In this white paper, learn about the importance of patch testing, what some of today's dangerous Trojan programs are and what they do, as well as a device-blocking system perfect for SMBs.

  • Comprehensive Data Security In The Cloud

    Sponsored by: Palo Alto Networks

    In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.

  • 6 Key Security Considerations for Responsible Cloud Migration

    Sponsored by: Symantec & Blue Coat Systems

    This white paper explores how to execute a safe and successful cloud migration. Uncover 6 key security considerations when moving enterprise data and apps to the cloud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.