ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Services Security Research

  • 7 best practices for Web3 security risk mitigation

    Sponsored by: TechTarget ComputerWeekly.com

    Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.

  • Under new cloud management: What the future holds for AWS

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look at some of the challenges facing AWS in greater detail, while also taking a closer look at what the future might hold for AWS under the charge of its new CEO, and how its customers are choosing to consume its technology in 2021.

  • Web Browser Security Features Make Attacks Harder

    Sponsored by: TechTarget Security

    This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.

  • Exploring new web browser security capabilities

    Sponsored by: TechTarget Security

    New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.

  • E-Book: Technical Guide on Web Application Firewalls

    Sponsored by: TechTarget Security

    Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.

  • E-Guide: How to build a toolset to avoid Web 2.0 security issues

    Sponsored by: TechTarget Security

    Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.

  • Under new cloud management: What the future holds for AWS

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look at some of the challenges facing AWS in greater detail, while also taking a closer look at what the future might hold for AWS under the charge of its new CEO, and how its customers are choosing to consume its technology in 2021.

  • Buff Up Your Web Apps

    Sponsored by: TechTarget Security

    Secure web apps are essential to modern business. Learn what security risks they present and get our experts' advice on how to overcome them.

  • A Manifesto for Cyber Resilience

    Sponsored by: Symantec Corporation

    In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.

  • Cloud Web Security Using Cisco ASA

    Sponsored by: Cisco Systems, Inc.

    This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.

  • Cisco Web Security Appliance

    Sponsored by: Cisco Systems, Inc.

    This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic.

  • SharePoint Security Should Not Be an Afterthought

    Sponsored by: Thawte Inc.

    This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.

  • Information Security Magazine - March 2013

    Sponsored by: TechTarget Security

    This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.

  • IT Administrator Saves Engineering Firm More than 200 Hours a Week by Switching to Webroot Secure Anywhere

    Sponsored by: OpenText Security Solutions

    The antivirus protection Doris network was using created problems and slowed the productivity of employees. Fortunately, Webroot offered an efficient and effective solution. Learn how Webroot remedied the inaccurate and difficult to manage reports by reading this informative resource.

  • Securing Web Services and Service-Oriented Architectures with Oracle Web Services Manager 11g

    Sponsored by: Oracle Corporation

    While web services offer extraordinary value to a company, they are not free of challenges – especially when it comes to security and management. Read this white paper to learn how the Oracle Web Services Management (WSM) is equipped with the capabilities to help you tackle web-services-based SOA security and management issues.

  • Minimize your financial institution’s risk with solutions from IBM

    Sponsored by: IBM

    Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.

  • Simplify Security for REST and WS* Web Services: The Gateway Approach

    Sponsored by: Intel

    This solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.

  • Malware Security Report: Protecting Your Business, Customers, and the Bottom Line

    Sponsored by: VeriSign EMEA

    This white paper will help you understand the threat from malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible.

  • Web Threats 2010: The Risks Ramp Up

    Sponsored by: CSC

    In the face of unprecedented web threat level growth, CSC CloudProtection for Mail and Web delivers protection of the very highest quality for thousands of businesses worldwide. Read this white paper to learn more about today's web threats and how your business can protect itself against them comprehensively and cost-effectively.

  • Understanding Why Web Application Security is Critical to Business

    Sponsored by: Sirius Computer Solutions

    This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.

  • Security Threat Report: July 2009 Update

    Sponsored by: Sophos

    Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  • SOA Security: Oracle Web Services Manager

    Sponsored by: Oracle Corporation

    Companies worldwide are actively implementing service-oriented architectures (SOA), both in intranet and extranet environments. While SOA offers many advantages over current alternatives, deploying networks of web services still presents key challenges...this paper showcases how Oracle's Web Services Manager (WSM) addresses these challenges.

  • Enterprise Security Solutions by Trend Micro

    Sponsored by: Trend Micro, Inc.

    This resource center will help you better understand Web threats, how they function, and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.

  • Security Management of SOA

    Sponsored by: IBM Software Group

    To meet the increased business demands for collaboration, integration, and internet-based services, many organizations are beginning to look at an infrastructure strategy based on Service Oriented Architecture.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.