ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Arxan

  • APIs, digital transformation and the need for a new approach to security

    Today, most organizations don’t know how many APIs they’ve deployed, let alone if they’re secure. According to recent threat analyses, API exploits are predicted to be the most frequent attack vector in the next two years. Learn how to protect API access from the outside in with this Arxan webinar now.

  • The Vulnerability Epidemic in Mobile Financial Apps

    A recent study examined the protective capabilities of more than 30 different financial services applications found on the Google Play store. In this webinar, Knight and Arxan chief scientist Aaron Lint discuss the report findings and share best practices to enhance mobile app protection.

  • In Plain Sight: The Vulnerability Epidemic in Financial Mobile Apps

    This study examines the perceived security of financial mobile apps. It highlights the systemic problem across the financial services industry of FIs' failure to properly secure their mobile apps. In this research report, explore key takeaways from the study which can be used as a guide to help you secure your mobile applications.

  • Securing Mobile Apps for Connected Cars

    In this white paper, learn how Arxan Application Protection hardens connected car apps to help prevent reverse engineering attacks, secure data and encryption keys, and alert you in real-time about the security status of all your deployed apps.

  • Market Guide for In-App Protection

    In this Gartner Market Guide, discover a market analysis on in-app protection, key findings and recommendations for security and risk managers, as well as vendors in the space.

  • A New Approach to Secure Mobile Banking Apps

    Customer demand has pushed for standardized mobile banking, which means financial institutions are required to properly handle the heightened security requirements that come with it. Read this whitepaper to learn the 3 transformational benefits of a well-designed endpoint security strategy for mobile banking applications.

  • Your App Security Stack: How to Defend Against the Evolving Threat

    In this webcast, Ken Jochims from Arxan sits down with Forrester Research Principal Analyst, Amy DeMartine, to talk about app security and the evolving threat landscape in 2019.

  • Trust But Verify: Mobile App Protection Best Practices

    This webcast explores how to evolve app security to face modern day threats and stop them before they can spread across your network. Discover a set of best practices for app security and threat mitigation, plus learn about Arxan's comprehensive app protection and alerting capabilities.

  • 2018 Global Study on Application Security

    Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.

  • Market Guide for Application Shielding

    Protecting applications that run within untrusted environments is crucial as mobile, IoT and modern web applications migrate software logic to the client side. Application shielding is well-suited to protect consumer mobile apps. Download this Gartner research report to learn more about application shielding.

  • Securing Web Apps From the Inside Out

    To protect against threats to JavaScript apps, organizations need more than just WAFs, they need a way to secure apps from the inside out, starting with code. Download this white paper to learn about a multilayered approach that can help protect your apps before it's too late.

  • 7 Key Factors to Software Protection

    This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.