ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Orchestration of App-Driven Security Policies

    Sponsored by: Silver Peak

    Take a look at this webcast to discover how to orchestrate security policies within applications.

  • Deploying Your API Infrastructure: Cloud, On-Premises or Both?

    Sponsored by: CA Technologies

    Find out how to approach API management from a usage model perspective, and learn about an end-to-end API management platform that offers secure cloud, on-premise, and hybrid deployment options.

  • Choosing the Right API Management Platform

    Sponsored by: CA Technologies

    Explore the main challenges and risks of enabling secure API management. To make sure that your information stays safe while still accelerating development, find out how to enable end-to-end API lifecycle management, security, and governance.

  • CitiPower and Powercor Equip Mobile Engineers with Productivity-boosting Apps with CA API Gateway

    Sponsored by: CA Technologies

    In this case study explore how CitiPower and Powercor utilized an API gateway product to build workplace applications more rapidly and securely. Also, learn how they seamlessly integrated the apps with cloud-based services.

  • Assessing the Impact of Full Lifecycle API Management

    Sponsored by: CA Technologies

    This Forrester Research report examines the potential economic impact of the CA API management platform. Uncover the report's key findings and find out how to improve API management and security for fast, efficient app development.

  • Mobile API Gateway: Improve Mobile App Development, Security, and UX

    Sponsored by: CA Technologies

    Explore how to simplify the process of adapting internal data, apps, and security infrastructure for mobile and IoT, and learn about the CA Mobile API Gateway.

  • Service NSW Digitizes and Secures State Services with Flexible API Solution

    Sponsored by: CA Technologies

    Find out how Service NSW became a leader in delivering secure, federated identity digital services underpinned by an API gateway that facilitates better API management and security.

  • CASB Podcast

    Sponsored by: Oracle

    This brief podcast reveals the importance of Cloud Access Security Brokers (CASB) and how they can advance your security posture, without having an effect on the end users.

  • Windows 10: If Compatibility is Not a Problem, What Is?

    Sponsored by: Flexera Software

    Explore this white paper to gain insight into the security challenges of adopting Windows 10 and how to reduce risks when implementing and using the software.

  • How CA API Gateway Can Help Business Embrace the Cloud

    Sponsored by: CA Technologies

    In this resource, learn about the key features of the CA API Gateway for exposing even legacy apps to mobile devices, cloud services, developers, and more.

  • Tata Communications Dives Deep into Containers, Adds Managed Services for Azure

    Sponsored by: Tata Communications and Intel

    This 451 Research Report takes a closer look at a Containers as a Service (CaaS) offering that aims to shorten the app development cycle while providing the controls, compliance, security (including LDAP/AD integration), and support that matter most to IT admins. Read on to get your copy.

  • Top 10 Advantages of a Proxy Deployment in Conjunction with a NGFW

    Sponsored by: Symantec

    While next-generation fire walls provide value to enterprises, they do not replace a secure web gateway technology. This solutions brief offers 10 advantages of a proxy deployment in conjunction with a next-generation firewall. Access this asset to learn about how the two complement each other and can improve your security posture.

  • Essential Guide to Mobile App Testing

    Sponsored by: Applause

    Discover how to improve testing throughout the mobile app lifecycle to mitigate a variety of issues, from functionality and usability to security and OS fragmentation.

  • Optimize App Performance and Security by Managing Microsoft Workloads on AWS

    Sponsored by: Amazon Web Services

    As cloud continues to mature into the new standard for workload deployment, it has been revealed that certain cloud environments better optimize certain applications. If you are running Microsoft apps, there is a cloud platform that goes beyond the typical cloud benefits, optimizing performance and security. Find out more inside.

  • Mobile Management for Android Devices

    Sponsored by: SOTI Inc.

    Download this white paper to discover a mobile device management platform with Android management capabilities that ensures devices are secured, managed and supported, regardless of OS version or device manufacturer.

  • Accelerate Digital Transformation with High Performance, Agile Container Services

    Sponsored by: Tata Communications and Intel

    Download this datasheet to examine a containers-as-a-service (CaaS) offering that launches Docker containers with pre-built templates and app images, has 3 layers of security, and which enables you to maintain complete container control.

  • Chrome OS: Secure from Bootup to Shutdown

    Sponsored by: Google Cloud

    As businesses create more data, it's becoming more important than ever to protect it. Watch this on-demand Google webinar to understand how Chrome OS is uniquely designed with best-in-class security at both the hardware and software levels.

  • App-ID Tech Brief: Traffic classification that identifies applications traversing your network

    Sponsored by: Palo Alto Networks

    In this technology brief, learn about App-ID, a patented traffic classification technology that identifies applications traversing your network. Find out how App-ID enables creation and enforcement of safe application enablement policies and brings increased application visibility and control back to the firewall.

  • How to Gain IT Efficiencies with Automation

    Sponsored by: VMware

    Every IT team has chores to do before they can have fun, time-consuming manual processes to take care of before they can focus on business innovations. Read this white paper to learn how to automate key processes.

  • Virtualization And The Digital Workspace

    Sponsored by: VMware

    Download this white paper to discover five considerations to take into account to integrate virtualization into your digital workspace strategy and tackle the challenge of today's mobile, dynamic workforce.

  • Enterprise Mobility Roadmap

    Sponsored by: VMware

    Download this roadmap for 5 essential steps to future-proofing your mobility strategy. You'll learn how unified and cloud-based platforms, analytics and security infrastructures can drive visibility in device usage and policies to protect your organization – while allowing employees the flexibility they demand.

  • Firewall Buyer's Guide

    Sponsored by: Palo Alto Networks

    Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.

  • How to Implement an SD-WAN Solution Without Compromising Security

    Sponsored by: Silver Peak

    In this resource, gain insights on how to build a high-performing SD-WAN that provides secure direct Internet access to any website or cloud application from branch and remote office locations.

  • Cybersecurity Trends: 2017 Spotlight Report

    Sponsored by: Alert Logic

    According to the 2017 Spotlight Report, the 3 biggest obstacles to stronger cybersecurity are lack of skilled employees, lack of budget, and a lack of security awareness among employees. Explore this in-depth 72-page Spotlight Report to uncover top data points and trends in cybersecurity to help advance your company's security approach.

  • Not all SD-WAN are Created Equal

    Sponsored by: Hughes Network Systems

    Enterprises with branch locations are seeking next-generation WAN architectures that deliver high performance, application availability and industry leading security as cloud and rich-media apps grow.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.