ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Security Tech: Out with the Old in with the New

    Sponsored by: Citrix

    Hackers love your outdated security tech. This new security infographic explores what's holding businesses back and what they need to do about it.

  • Manage Risk by Protecting the Apps and Data That Drive Business Productivity

    Sponsored by: Citrix

    Today you face the challenge of securing a business environment transformed by technologies such as cloud and new workforce requirements such as mobility, BYO and third-party talent. See why customers around the globe rely on Citrix to help them address the growing cybersecurity threats of today while preparing for future requirements.

  • Best-of-Breed Enterprise Mac Management

    Sponsored by: JAMF

    Download this white paper to discover a full Mac client management tool built to support the underlying architecture of macOS from the ground up, that gives IT administrators the flexibility to gather inventory data in a way that's extendable and customizable, integrated, actionable and auditable.

  • Access Management Handbook

    Sponsored by: Gemalto

    When each cloud app uses its own login information, it creates a hassle for both users and IT. This handbook offers information on access management, and authentication protocols integral to maintaining a simple and secure cloud environment.

  • TIBCO Mashery Security Overview

    Sponsored by: TIBCO Software Inc.

    Examine the Mashery API management platform and how it helps to secure apps and sensitive data throughout the entire software development lifecycle. Learn how to improve security for APIs, development, and operations as well as ensure secure, continuous delivery and development continuity.

  • Simplify Authentication with Personal Identity Verification

    Sponsored by: HID

    It's no secret that passwords are a pain for users and IT. This video discusses how personal identity verification (PIV) can make authentication simpler for your users.

  • End of Support Doesn't Have to Mean End of Security

    Sponsored by: TrendMicro

    Does end of support mean end of security? Explore the security risks facing organizations running end of life (EOL) platforms like Windows Server 2003. Uncover 5 options to address those risks.

  • Remedying the Email Security Gaps in Microsoft Office 365

    Sponsored by: Mimecast

    Discover how to protect your organization from security risks, data loss, and business continuity skills while using Microsoft Office 365.

  • Black Hat Survey 2017

    Sponsored by: Thycotic

    At the Black Hat 2017 cybersecurity event, more than 250 hackers were surveyed on what works and doesn't work when it comes to protecting critical data. Learn insights from the survey in this report.

  • Top Insights and Resources from Google Cloud Next '17

    Sponsored by: Google Cloud

    Get the low-down on the highlights from Google's marquee cloud conference in San Francisco.

  • Comparing Security Features: MobileIron and Microsoft Intune

    Sponsored by: MobileIron

    This video describes the security differences between EMM tool MobileIron and MDM tool Microsoft Intune, comparing capabilities like encryption, secure data gateway, compliance, and more.

  • The Pitfalls and Promises of Authentication in the IoT

    Sponsored by: iovation, Inc.

    Explore the current state of authentication for consumer IoT technologies. Learn authentication IoT guidance from CSA, Gartner, and OWASP, discover key security differences between industrial and consumer IoT, and more.

  • The Flux7 Enterprise DevOps Framework

    Sponsored by: Flux7

    Learning from the experience of other DevOps adopters, discover how to use an enterprise DevOps framework to streamline the delivery of apps and services. Plus, uncover 7 steps for DevOps and digital transformation success.

  • Effectively Balancing DevSecOps

    Sponsored by: Flux7

    As app development becomes more agile, security can get left in the dust – and conversely, if security and testing takes too long, it can decelerate the app lifecycle and impede organizational agility. Learn how to enables DevSecOps with security automation for AWS and cloud-based development environments.

  • Achieve GDPR Readiness with Secure App and Data Delivery

    Sponsored by: Citrix

    A Ponemon Institute study finds that most organizations do not feel prepared for the requirements of the GDPR. Discover how you can meet GDPR compliance through application security, contextual access, and more.

  • Secure Browsing: Common Gaps, Best Practices, and New Technology

    Sponsored by: Citrix

    Are you prepared to protect your browsers from targeted attacks seeking to compromise your organization? Take an inside look at one strategy that can help you centralize and secure browsers.

  • From Agile Development to DevOps to DevSecOps

    Sponsored by: Veracode, Inc.

    It seems like organizations are still being breached left and right by cyber threats. Watch this short video to learn about a security platform that will protect your application layer by providing an end-to-end platform, cloud-based scalability, and strategic support to make application security a top priority.

  • Demo: Secure Browsing in the Cloud

    Sponsored by: Authentic8, Inc.

    Is your browser vulnerable to web-borne threats? Tune into this brief demo to get an inside look at a secure, virtual browser that runs in the cloud.

  • The Requirements of a Secure Browser

    Sponsored by: Authentic8, Inc.

    Traditional web browsers weren't built with today's threats in mind, and the gaps in infrastructure are being exposed. In this brief video, learn the full requirements of a secure browser.

  • 5 Strategies to Improve Your Security Posture

    Sponsored by: Citrix

    Reducing business security risk, protecting sensitive customer data, and ensuring compliance with regulations and standards are priorities for all organizations. Explore 5 ways you can overcome these security challenges.

  • Mobile Application Security: Discovering Leaks and Remediation

    Sponsored by: WhiteHat Security

    25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.

  • Sleeping with the Enemy: Achieving Agility and Security with DevSecOps

    Sponsored by: WhiteHat Security

    To address the faster release demands of Agile, explore DevSecOps and how it effectively improves the collaboration between development, security, and operations teams. Learn how to strive towards continuous security, integrate app security tools, address the growing role of infrastructure as code, and more.

  • Secure Coding Practices: Avoid SQL Injection

    Sponsored by: WhiteHat Security

    SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.

  • A Buyer's Guide to Cloud Access Security Brokers

    Sponsored by: Cisco Cloudlock

    Uncover a detailed examination of CASBs and 7 essential features to look for. Also learn about the current cloud threat landscape, 6 challenges to proxy-based CASB tools, and more.

  • Unified Endpoint Management for Dummies

    Sponsored by: IBM

    Learn about unified endpoint management (UEM) and how it helps you manage and secure the growing number of devices, apps, and data within your organization. Discover 5 core features of effective UEM, how to monitor endpoints and end-users, how to protect content and proprietary data, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.