Research Library

Powered by

Application Security Research

  • Mobility Management Made Simple With IBM MaaS360

    Sponsored by: IBM

    In this webcast learn about a program that enables simple and intuitive application management while keeping mission-critical information safe without slowing down mobile development. Discover a software that allows for single-sign on, separates data for business security, and end-user peace of mind, and more.

  • Employ a Smart, Secure, and Efficient Database and Application Machine

    Sponsored by: Oracle Corporation UK Ltd

    In this webcast learn how Oracle's MiniCluster allows you to run all tiers of your application in one consolidated system. Learn how you can implement a DB system that uses all-flash storage, is built to allow for both private and public cloud integration, includes a virtual assistant, and more.

  • Are You Ready for RASP?

    Sponsored by:

    This runtime application self-protection handbook covers the basics and offers advice on RASP implementation for IT security professionals.

  • QRAT Malware-As-A-Service

    Sponsored by: Booz Allen Hamilton

    QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.

  • Mobile Data Report 2016

    Sponsored by: Wandera

    This 2016 Mobile Data report highlights an analysis of mobile data security and usage trends along with traffic patterns across a global network of enterprise mobile devices. Access now to uncover new mobile threats and compare security and data usage between Samsung Galaxy and Apple devices, as well as between roaming and domestic data usage.

  • Barracuda NextGen Firewall X: Simple Cloud-Based Network Management for Small to Midsized Businesses

    Sponsored by: Barracuda Networks

    Discover a next-generation firewall that can stand up to new and evolving cyber threats. Gain antivirus and web filtering functionality without the need for additional IT staff or special training.

  • Why You Need to Test All Your Cloud, Mobile and Web Applications

    Sponsored by: Trustwave

    Uncover the importance of complete application testing and find recommendations on how to beat the challenges associated with protecting all web applications. Learn how to prioritize testing to receive the greatest ROI and manage your risk without a huge monetary investment.

  • Stop Malware Before It Stops You

    Sponsored by: Trustwave

    Discover how to detect and eliminate modern malicious activities and add significant value to your detection mechanism without impacting user experience. Learn how to stop new, dynamic malware that most mechanisms overlook, as well as close the 60% malware gap missed by other gateways.

  • Enterprise Apps OWASP Mobile Security Risks Report

    Sponsored by: Wandera

    This report demonstrates a security assessment of the 10 most popular business apps used on corporate-liable devices, using the Open Web App Security Project (OWASP) Mobile Security Risks as a foundation. Find out how these 10 apps performed on the OWASP tests so that you can better prepare your data security strategy for enterprise apps.

  • How to Build Your Application Security Program

    Sponsored by: TechTarget

    Organizations often begin their application security program by focusing on the testing of the apps once the software has been designed and built. But many IT security pros agree – this is not the best move. Access our new e-guide for expert tips on building your enterprise application security program today.

  • Top 5 Applications You Should Blacklist Now

    Sponsored by: Thycotic

    Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Download now to gain the best practices for restricting malicious software.

  • Don't Guess. Test. Uncover Your Security Vulnerabilities

    Sponsored by: Trustwave

    Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.

  • Level Up With LinuxOne

    Sponsored by: EOH IBM

    Is it time to take your apps to the next level? Find out the benefits of the new IBM LinuxONE Rockhopper and discover if this server is right for your organization.

  • Executive Guide: Safely Adopting Office 365

    Sponsored by: Symantec + Blue Coat

    To safely and effectively adopt 0ffice 365, you must budget and plan for additional security measures and you will probably need to provision up to accommodate higher internet traffic volumes. This executive guide provides key security and provisioning considerations to keep in mind during your move to Office 365.

  • How To Build An Enterprise Application Security Program

    Sponsored by: Symantec + Blue Coat

    Building an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.

  • The Rise of Cloud-based Application Security Vulnerabilities

    Sponsored by: Symantec + Blue Coat

    While it can be beneficial to store app data in the cloud, it's causing many security concerns because of the sensitive nature of the information. Explore this e-guide to learn common vulnerabilities in cloud-based apps and best practices for properly protecting app data.

  • Security by Design: Building Defense in Depth with an Application Network

    Sponsored by: MuleSoft

    This white paper explores how CIOs and CISOs can work together to build security into app development with an API-lead approach to connectivity and integration. Find out how to weave security by design into an app network so that you can improve visibility, tackle tough challenges like shadow IT, and more.

  • 5 Signs You Need A Mobile Security Game Plan

    Sponsored by: Appthority

    Learn five signs that indicate you need to step up your mobile security game plan. If mobile security is your blind spot or you simply sense a breach on the horizon, the time to beef up mobile security is right now.

  • 2016 Mobile Applications Security Update

    Sponsored by: Appthority

    Here's a comprehensive review of 2 major vulnerability types surfacing in Android apps: autorooting and overlay malware. Plus get analysis on whether Apple's faster app review times coincided with vulnerabilities that have plagued the App Store. And if that weren't enough, find out if the revised Android permissions model makes their apps safer.

  • Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts

    Sponsored by: Appthority

    This white paper explores the twin problems which most often lead to data breaches in mobile hardware: spear phishing and watering hole attacks. In addition, learn about a solution to stop them in their tracks by automating the scanning and analysis of employee mobile apps for risky behaviors, hidden actions, and mobile malware.

  • Security Report: 2016 DDoS Attack Trends

    Sponsored by: Akamai

    In this recent security report, discover where, when and how hard DDoS attacks are hitting across the globe and how you can avoid them. Leverage this data to better make more intelligent, strategic decisions on security.

  • DDoS Attacks: Q2 2016 vs. Q2 2015

    Sponsored by: Akamai

    This security report shows you the cybersecurity and attack trends to the end of Q2 2016, specifically in regards to DDoS and web application attacks. Discover why there's been such a dramatic increase in DDoS and web application attacks.

  • 5 Considerations for Securing Hybrid Clouds

    Sponsored by: Intel Security

    This white paper explores both old and new security best practices, as well as how to apply them to cloud-based infrastructures and 5 considerations for securing hybrid clouds. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.

  • Analysts Reveal how to Secure SaaS

    Sponsored by: Palo Alto Networks

    This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps.

  • Neustar DDOS Attacks & Protection Report: North America & EMEA The Continuous Risk to Digital Brands

    Sponsored by: Neustar

    This report encapsulates the survey results of 760 CSOs, CIOs, CTOs and others in IT security. Its purpose is to learn how companies in North America and the EMEA region (Europe, the Middle East, and Africa) encounter and defend against DDoS attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.