ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • The Ultimate Guide to Cybersecurity to Drive Innovation

    Sponsored by: Cisco Systems, Inc.

    Many developers may find themselves hesitant to build digital products and services for the cloud, web, and mobile because strict federal regulations and the rise of cyberattacks make this a risky endeavor. Discover how to accelerate innovation while still protecting your data and uncover several business cases for cybersecurity.

  • Cloud, Mobility, Big Data: Future Proof Your Organization with Consolidation

    Sponsored by: Matrix42

    This white paper explores how to optimize all of your existing workflows and manage them effectively. In the face of growing big data, cloud, and mobile adoption, learn how to leverage a business process automation platform for hybrid environments that facilitates integrations, boosts compliance, and enhances reporting.

  • Tracker Corp Modernizes I-9 Compliance App to Streamline Mobile Onboarding

    Sponsored by: PowWow

    This case study explores how Tracker Corp leveraged a mobile development platform to modernize and extend their custom web product out to mobile users with no disruptions to their business. Discover how they overcame the lack of in-house mobile expertise to create a seamless and secure experience for mobile users.

  • Empowering the Mobile Workforce with MDM and EMM

    Sponsored by: Snow Software

    This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.

  • Mobile App Development Modernization for the Post-PC Era

    Sponsored by: PowWow

    Explore how to deliver powerful, modern native mobile apps faster and enable rapid modernizations for legacy Windows and web apps. Discover how PowWow Mobile's SmartUX platform empowers users to build and run apps smartly and securely on-premise and in the cloud, on any device, using any OS.

  • Building and Modernizing Mobile Apps for Windows 10

    Sponsored by: PowWow

    Explore how to resolve app bottlenecks in adopting or migrating to Windows 10. Discover a development platform that enables you to rapidly transform legacy Windows apps or workflows into mobile apps, build native mobile apps for Microsoft's Universal Windows Platform, and run apps in the cloud or on-premise, across a variety of devices and OS.

  • 2017 Study on Mobile and IoT App Security

    Sponsored by: IBM

    According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.

  • 10 Key Findings From the Ponemon Institute’s Mobile & IoT Application Security Testing Study

    Sponsored by: IBM

    This article reveals 10 key findings from Ponemon's "2017 State of Mobile & Internet of Things (IoT) Application Security Study."

  • IT Project ANZ: App Development

    Sponsored by: ComputerWeekly.com

    In this guide, we show you some of the technologies helping in-house IT teams to release and deploy new applications as swiftly as possible, without disrupting business operations. From Software as a Service to DevOps and containers, Australia/New Zealand-based organisations are beginning to embrace these flexible and agile approaches.

  • Enterprise Mobility Management Helped Arrow International Improve Mobile Security And Workforce Productivity

    Sponsored by: IBM

    The New Zealand construction company Arrow International needed a way to manage and secure their mobile apps. This case study highlights how adopting a mobility management system granted them that security, as well as intellectual property protection, decreased app deployment time, and more.

  • Enterprise Mobility Platform with Enterprise-Grade Security

    Sponsored by: PowWow

    Explore how to accelerate mobile development, connect new apps to third party data sources and APIs, and modernize any enterprise app or workflow. Discover how to leverage existing APIs and containers to design, build, and deploy personalized, intelligent, and secure apps that run anywhere, on any device, and on any OS.

  • 5 Steps for Risk-Based Application Security Management

    Sponsored by: IBM

    It's crucial that you secure applications layers against attacks like SQL injection and cross-site scripting. Discover 5 practical steps to help identify and remediate risks.

  • Magic Quadrant for Application Security Testing

    Sponsored by: IBM

    In this analyst report, learn about how 19 application security testing (AST) vendors fared in a comparison of their strengths and cautions. Discover which one is right for your organization.

  • Manage Application Security Risks to Help Protect your Organization’s Critical Data

    Sponsored by: IBM

    Effective application security is really a matter of managing risk. Learn how to develop application security when you build an asset inventory, assess the business impact, and 3 more ways to mitigate risks to your most crucial assets.

  • IT Project ASEAN: App Development

    Sponsored by: ComputerWeekly.com

    In this guide, we show you some of the technologies helping businesses to release and deploy new applications as swiftly as possible, without disrupting business operations. From containers to microservices and DevOps, many organizations are now embracing these flexible and agile approaches.

  • Securing the Most Important Apps and Data—Yours

    Sponsored by: Citrix

    Discover a digital workspace that promotes exceptional user experience by delivering apps, data, and complete desktops available on any device, over any network. Read on to empower seamless, secure, and productive work that flexes for your workloads (whether on-premises, cloud, or hybrid).

  • Run Skype for Business as a Secure Virtual App with a Great User Experience

    Sponsored by: Citrix

    Discover how to deliver secure, high-performance UC&C for your organization by virtualizing Skype for Business with the method illustrated. Read on to learn how this app virtualization will improve security and manageability of Skype, as well as how to evade the potential pitfalls traditional virtualization methods incur.

  • Defending Applications with Integrated SaaS Technology

    Sponsored by: Hewlett Packard Enterprise

    Discover how to use a cloud-based tool that provides visibility into the security of your applications. Discover ways to protect your production applications.

  • Veracode Secure Development Survey

    Sponsored by: Veracode, Inc.

    Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.

  • State of Software Security: A Developer's Viewpoint

    Sponsored by: Veracode, Inc.

    Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more.

  • How to Build a Robust Application Security Governance Framework

    Sponsored by: Veracode, Inc.

    Discover not only how to simplify, but also streamline application security. Learn how to ensure that everyone is in-sync and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.

  • Ansible Tower Demo: The Case for IT Orchestration

    Sponsored by: Red Hat

    Do you have a framework for automating IT systems? Learn how to integrate Ansible Tower orchestration and IT configuration with your own Linux server or cloud instance. Download now to see if agentless IT automation is right for your organization's app infrastructure.

  • The Benefits of Bug Bounty Programs and Security Code Testing

    Sponsored by: Veracode, Inc.

    In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats.

  • App Security Can’t Happen Without Developers

    Sponsored by: Veracode, Inc.

    In this report from Forrester, learn how to guide developers and security pros to deliver secure apps. Gain key takeaways that will help your developer team and security team work together to mitigate app security threats before they appear.

  • Automating Cloud Infrastructure with Ansible IT Engine

    Sponsored by: Red Hat

    Examine how Splunk accelerated IT provisioning, configuration, and task management within its cloud infrastructure with an automation engine that rapidly deploys and scale server clusters and apps, configures the cloud on-demand, and autoscales infrastructure as needed.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.