ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • The 411 on Mobile Application Security Testing and Runtime Protection for iOS Applications

    Sponsored by: IBM

    This webcast provides best practices for mobile application testing for security vulnerabilities and protecting them at runtime, with a special emphasis on iOS applications. You'll learn how to protect your ever-expanding portfolio of mobile apps, to stay one step ahead of the rush-to-release phenomenon.

  • Five Signs It’s Time for Mobile Workspace Delivery

    Sponsored by: Citrix

    Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.

  • The Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business ApplicationsThe Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business Applications

    Sponsored by: Onapsis

    Discover how SAP implementations have transformed through each technology trend such as cloud, mobile, big data and IoT. Learn why securing SAP applications is critical to accelerate the adoption of these new technology paradigms and to enable companies to realize the maximum value from their investment in SAP solutions.

  • Account Takeover How Hacking Happens in 2016

    Sponsored by: IMMUNIO, Inc.

    This white paper helps you understand what's inside the head of a modern cybercriminal and the techniques they use to steal your hard earned data. Through this understanding, you'll be able to improve your security posture and reduce the likelihood of a breach quickly.

  • Simplifying the Complexity of the Internet of Things

    Sponsored by: Xively by LogMeIn

    To understand exactly what it takes to create strong IoT products and engage customers, Forrester conducted research into the key priorities and objects of IoT manufacturers. Access this report to explore their 4 key findings about product differentiation, device management, IoT data analysis, and third party support for manufacturers.

  • Protecting Mission-Critical Source Code from Application Security Vulnerabilities

    Sponsored by: IBM

    In this webcast, you'll learn how to test application source code for potential security vulnerabilities, so you can confidently release your organization's applications.

  • Making the Case for Application Security Testing on Cloud

    Sponsored by: IBM

    It presents to you the pros and cons of application security testing and penetration testing techniques. Discover how you can combat application security threats conveniently and effectively in the cloud.

  • Manage risk by protecting apps, data and usage

    Sponsored by: Citrix

    This white paper teaches you best practices to control apps and modern methods to secure your mobile workforce. Discover how to assure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.

  • Strategy Guide for Securing the SAP Landscape

    Sponsored by: Onapsis

    Your organization should be thinking about how best to protect SAP systems. Learn how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.

  • Total Economic Impact (TEI) Study

    Sponsored by: IBM

    This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.

  • Above Security Delivers Customer Value

    Sponsored by: Above Security

    It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.

  • Day in the Life of a Security Admin

    Sponsored by: RSA Softcat

    Luckily for your CISO, it's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements directed by the CISO for each application for any user, from anywhere, to anything.

  • Onapsis Research Labs: SAP Systems Security Analysis

    Sponsored by: Onapsis

    This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.

  • Transform your "Good Backup" to Efficient App Availability And Recovery

    Sponsored by: Dell, Inc.

    Discover a data protection solution with recovery options and tools that enable enterprises to achieve optimal application availability and fast restores. This single solution can provide your enterprise with the abilities to centralize data protection and recovery across your environment, recover from public cloud storage providers, and more.

  • Information Security and Data Privacy Practices

    Sponsored by: Gigya

    Explore several information security and data privacy practices that will enable you to better protect your data. Topics discussed include infrastructure, data security, compliance, privacy, and more.

  • Advanced Persistent Threats and the Case for a Security Intelligence and Response Program

    Sponsored by: Above Security

    Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.

  • Application Defense In Depth

    Sponsored by: IMMUNIO, Inc.

    The best security solutions for web applications build a layer of protection inside and around your apps. Learn how to control access, monitor activity and clean-up input to your applications. Paint an accurate picture of your threat environment to get actionable reports when vulnerabilities are found within your applications.

  • Comparing App Security Strategies: WAFs vs. RASP

    Sponsored by: IMMUNIO, Inc.

    Examine the current threat landscape for web applications and the approaches you should take to secure those applications. Uncover a comparison of one of the most common approaches – Web Application Firewalls (WAFs) - with the most recent addition to the application protection arsenal, Run-Time Application Self-Protection (RASP).

  • Optimize Application Life Cycle with a Hybrid Cloud Strategy

    Sponsored by: NetApp

    In this white paper, you will discover how to create a seamless app development process by leveraging a hybrid cloud strategy. Access now to uncover a 3-phase approach to a faster app lifecycle.

  • Web Application Security: Is your Site Vulnerable to Attackers?

    Sponsored by: Akamai

    This short infographic shows you the importance of intelligent security for your web applications including the necessity of a web application firewall (WAF). Learn how to seamlessly integrate and manage a cloud-based WAF to keep hackers out of your business.

  • KONA SITE DEFENDER PROTECT YOUR WEBSITES AND WEB APPLICATIONS FROM DOWNTIME AND DATA THEFT

    Sponsored by: Akamai

    This white paper teaches you how to expand your business without constantly watching the door for intruders. Learn how to reduce your risk for a cyberattack, but also be able to maintain performance if a cyberattack should hit.

  • Lifecycle Management Best Practices for Mobile Apps

    Sponsored by: IBM

    This white paper explores the role of app security in mobile app lifecycle management. From design through deployment, learn about the proactive best practices that can simplify and strengthen the development process.

  • Top Ways to Enhance Security in 2016

    Sponsored by: Intel

    Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.

  • Top Ways to Enhance Security in 2016

    Sponsored by: Intel

    Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.

  • Top Ways to Enhance Security in 2016

    Sponsored by: Intel

    Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.