ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • 4 Market Trends Driving Mobile Banking

    Sponsored by: HID

    Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.

  • Top 5 Considerations: What to Look For in Mobile Banking Security

    Sponsored by: HID

    Uncover 5 IAM considerations for choosing a mobile banking security tool. Also discover a concise market overview of mobile banking apps, including a look at opportunities for growth and major obstacles.

  • Unified Endpoint Management - Security and Productivity for the Mobile Enterprise

    Sponsored by: Citrix

    Discover a UEM solution that provides a single pane of glass to manage and secure, devices and operating systems, whether laptops, smart phones, tablets or any other device.

  • The Definitive Guide to Data Protection and Disaster Recovery on Enterprise Clouds

    Sponsored by: Nutanix

    Access this e-book to examine important challenges and trends in availability and data protection. You will learn about a simple, cost-effective approach that works with enterprise cloud computing that helps you not only catch up, but future-proof your data protection.

  • 2017 Analyst Report for Application Security Testing

    Sponsored by: IBM

    In this report, analysts review 18 application security testing (AST) tools. Learn which ones improve coordination between development and security teams.

  • How mobile remote desktop apps work

    Sponsored by: LogMeIn Rescue Lens

    Mobile remote desktop apps can be an important tool for mobile workers. The benefits of greater accessibility mean they could be a strategic fit in a variety of enterprise environments. Learn how to select the right mobile remote desktop products for your business, and how they work.

  • Evaluating the Top Application Security Testing Vendors

    Sponsored by: Veracode, Inc.

    This Gartner report focuses on top AST vendors' SAST, DAST and IAST offerings, maturity and features as tools or as a service. Learn all you need to know about top vendors' AST offerings to ensure you're picking the right tool for your business.

  • Solution Brief - Securing the mobile enterprise

    Sponsored by: IBM

    Discover a comprehensive portfolio of mobile security systems that address four key mobile security challenges: protecting devices, securing content and collaboration, safeguarding applications and data, and managing access and fraud. The portfolio also includes a layer of security intelligence for advanced threat detection.

  • Unleash the Potential of Windows 10

    Sponsored by: vmware airwatch

    Windows 10 is Microsoft's first truly mobile operating system designed to work seamlessly across the unified desktop and mobile devices' platform. Download the infographic to learn how VMware AirWatch® provides the most comprehensive solution to get your organization Windows 10 ready.

  • The New BYOD: 5 Best Practices for a Productive BYOD Program

    Sponsored by: vmware airwatch

    Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.

  • EMM Real Benefits in Today's Mobile World

    Sponsored by: vmware airwatch

    The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.

  • Five Key Indicators that You Need to Adopt EMM Now

    Sponsored by: vmware airwatch

    How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.

  • Maximizing IT Security with Configuration Management

    Sponsored by: Puppet

    This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including the creation of a Standard Operating Environment (SOE), reporting on and control of configuration drift, enhanced change remediation, and more.

  • The Internet of Things: Posing Security Threats and Delivering Beyond Expectations

    Sponsored by: Hewlett Packard Enterprise

    Not only are many early adopters struggling to secure IoT devices and apps, but many organizations disagree on what IoT means and how to extract value from it. Discover how different industries define, use, and benefit from IoT by creating "smart workplaces," increasing innovation, enhancing customer experiences, and more.

  • The Massive Mobile Migration

    Sponsored by: IBM

    The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.

  • UBM Dark Reading & VMware AirWatch® Webinar

    Sponsored by: vmware airwatch

    In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.

  • Microservices Done Right with API Management

    Sponsored by: Apigee

    This white paper explores how important APIs are for managing and securing microservice architectures. Learn about how API management platforms create analytics and reporting capabilities for deep visibility, deliver modern RESTful APIs for legacy services, boost Agile development, expose microservices securely, and more.

  • How to Understand, Monitor, and Protect Your Apps

    Sponsored by: tCell

    Learn how to implement a system to help you understand, monitor, and protect your applications in production.

  • 2017 Annual Cybersecurity Report

    Sponsored by: Cisco and Dimension Data

    This 2017 Annual Cybersecurity Report explores how to implement an integrated security architecture by connecting your security tools to work together in an automated, streamlined environment.

  • The Ultimate Guide to Cybersecurity to Drive Innovation

    Sponsored by: Cisco Systems, Inc.

    Many developers may find themselves hesitant to build digital products and services for the cloud, web, and mobile because strict federal regulations and the rise of cyberattacks make this a risky endeavor. Discover how to accelerate innovation while still protecting your data and uncover several business cases for cybersecurity.

  • Cloud, Mobility, Big Data: Future Proof Your Organization with Consolidation

    Sponsored by: Matrix42

    This white paper explores how to optimize all of your existing workflows and manage them effectively. In the face of growing big data, cloud, and mobile adoption, learn how to leverage a business process automation platform for hybrid environments that facilitates integrations, boosts compliance, and enhances reporting.

  • Tracker Corp Modernizes I-9 Compliance App to Streamline Mobile Onboarding

    Sponsored by: PowWow

    This case study explores how Tracker Corp leveraged a mobile development platform to modernize and extend their custom web app out to mobile users with no disruptions to their business. Learn how they overcame their lack of experienced in-house mobile developers to create a seamless and secure user experience.

  • Empowering the Mobile Workforce with MDM and EMM

    Sponsored by: Snow Software

    This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.

  • Mobile App Development Modernization for the Post-PC Era

    Sponsored by: PowWow

    Explore how to deliver powerful, modern native mobile apps faster and enable rapid modernizations for legacy Windows and web apps. Discover how PowWow Mobile's SmartUX platform empowers users to build and run apps smartly and securely on-premise and in the cloud, on any device, using any OS.

  • Building and Modernizing Mobile Apps for Windows 10

    Sponsored by: PowWow

    Explore how to resolve app bottlenecks in adopting or migrating to Windows 10. Discover a development platform that enables you to rapidly transform legacy Windows apps or workflows into mobile apps, build native mobile apps for Microsoft's Universal Windows Platform, and run apps in the cloud or on-premise, across a variety of devices and OS.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.