ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • How Virtualization is Transforming Technology Delivery in Healthcare

    Sponsored by: Citrix and Pure Storage

    Today's healthcare organizations are struggling to meet the demands of reform while maintaining security and privacy for patients. Tune into this podcast as leaders from the nation's leading health systems discuss why application virtualization is reshaping care delivery and improving security.

  • Maximize Performance and Mitigate Risks with PHP 7

    Sponsored by: Rogue Wave Software

    This white paper examines PHP, a tried and true platform for business-critical apps that has driven web and mobile growth for a number of years. Access now to learn more about the release of PHP 7, which introduces new language constructs and significantly enhanced performance, and uncover insightful tips on how to optimize your use of PHP.

  • A Network Security View Of Docker Containers

    Sponsored by: NeuVector

    Many top concerns for containers can be addressed with a better understanding of basic container security and networking. Learn tips for getting visibility into container networking to create a more secure environment overall.

  • Devise a Cloud Strategy that Doesn't Cast a Shadow on App Performance

    Sponsored by: Riverbed Technology, Inc.

    Download this paper to learn how to devise a cloud strategy that doesn't cast a shadow on, or deter, app performance. Discover several cloud deployment models compared for their visibility and control, including private cloud, SaaS, and 2 more.

  • The Evolution of Cloud Security: Perception vs. Reality

    Sponsored by: BitGlass

    This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.

  • When "Free" is not Free: The True Costs of Open Source

    Sponsored by: Rogue Wave Software

    In this webinar, director of product management and OSS expert, Richard Sherrard examines how to know exactly what packages are used in your company, specific technical, security, and licensing hurdles that many organizations face and What "free" actually means when it comes to OSS.

  • The Intricacies of a CASB Revealed

    Sponsored by: BitGlass

    This webinar goes in-depth into the inner workings of Cloud Access Security Brokers (CASBs), how they work, and how to maximize their effect in your organization.

  • IBM FlashSystem: Powering the Future of IT

    Sponsored by: IBM

    This white paper explains how flash storage can provide the performance and security needed to run these apps and prevent data breaches. Access now and discover how flash can help 5 key drivers of info technology: cloud, data analytics, mobile and social engagement and security.

  • Open Source Software Support: Top Challenges and Best Practices

    Sponsored by: Rogue Wave Software

    This report takes real support data from hundreds of open source software (OSS) packages across different organizations to analyze the statistics, realities, and results of open source in the field. Learn how to provide effective support for OSS by tackling the top challenges identified in the survey's data and uncover 5 OSS support best practices.

  • Why DevOps + Security = A Bright Idea

    Sponsored by: SearchSecurity.com

    By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures.

  • Reduce Open Source Security Risk: Strategies, Tactics and Tools

    Sponsored by: Rogue Wave Software

    Discover the tools and services you need to create an open source software (OSS) management strategy for your organization. Implementing an OSS strategy may take time, but when you consider the risks involved with unprotected OSS, it's easy to see the value it brings.

  • 4 Strategies to Reduce Your Open Source Risk

    Sponsored by: Rogue Wave Software

    Open source software is widely used by developers, but unfortunately, it's rarely created with things like troubleshooting, compliance, and security in mind. Access this white paper to explore how to enhance open source management and uncover 4 strategies that will reduce risk and improve open source audits.

  • Dynamic Security Management for a Productive Mobile Workforce

    Sponsored by: RES Software

    This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.

  • Making DDoS Mitigation Part of Your Incident Response Plan - Critical Steps and Best Practices

    Sponsored by: Akamai

    The time to prepare yourself for a DDoS attack was yesterday. Discover why distributed denial of service (DDoS) attacks are so damaging to organizations and understand what you can do to protect your company today.

  • Deliver Instant Web Experiences While Protecting Your Applications

    Sponsored by: Akamai

    In this white paper learn how to meet the rising expectations of the always connected, globally-distributed end-users by delivering faster website and mobile app responses. Discover how your enterprise can defend against all types of DDoS and web application attacks at a high accuracy, and more.

  • The Security Champion's Guide to Web Application Security

    Sponsored by: Akamai

    Learn about web application firewalls (WAFs) and how to apply them effectively such as considering whether a WAF is appropriate for your web application security, how to baseline your existing WAF against a set of recommended criteria, generate ideas for extending an existing WAF and improving web application security, and more.

  • A Step-By-Step Guide to Improving Application Insight

    Sponsored by: Splunk

    In this getting started guide, discover how you can use Splunk software to better manage your enterprise's apps to ensure uninterrupted uptime, smooth out hiccups in performance, and more. Learn what causes these issues, common solutions, and more advanced approaches that can save your organization time, money, and effort.

  • Heat Map: 2016 IoT Research Shows Areas of Biggest Impact On Digital Business

    Sponsored by: Cloudera

    Discover a "heat map" in which Forrester illustrates IoT trends and areas of biggest impact on digital businesses. Download to uncover the impact of IoT app deployment, compare your organization to others, and find business-led use cases.

  • Effectively Manage Application Security Risk in the Cloud

    Sponsored by: IBM

    Discover why application security is so important, why organizations struggle to achieve it and what effective application security looks like.

  • Cloud IAM TCO Assessment: How Much Could You be Saving?

    Sponsored by: IBM

    This guide helps you compare and contrast the TCO of on-premise IAM with cloud-based IAM to effectively show your board the financial differences between the two.

  • Using Metrics to Manage Your Application Security Program

    Sponsored by: Veracode, Inc.

    This SANs resource help you measure your application security (AppSec) program and ensure AppSec is part of your organization's culture moving forward.

  • Assessing Application Security: A Buyer’s Guide

    Sponsored by: Veracode, Inc.

    In this SANs guide, learn the four-step method for acquiring the services you need to support a comprehensive application security (AppSec) lifecycle security program. Discover what goes into an effective AppSec team and how to acquire the resources necessary for deployment.

  • Top 5 Reasons Why You Need an AppSec Program

    Sponsored by: Veracode, Inc.

    A variety of misconceptions lead to the lag in AppSec adoption, but the reality is you need an AppSec program. Learn the top 5 reasons why in this white paper.

  • The Platform Transformation: How IoT Will Change IT and When

    Sponsored by: PTC

    This O'Reilly Media report explores key considerations for future-proofing elements of the IT stack and smoothing the transition to IoT components. Discover how IoT initiatives are expected to affect various layers of the IT stack, including data management, APIs, IoT apps, analytics, and more.

  • Your Guide to Securing Office 365

    Sponsored by: MobileIron

    Learn how to employ a security model focused on mobile device deployment of Office 365. Discover how to distribute apps securely, protect app data-at-rest on the device, protect app data-in-motion to back-end services, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.