ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Intertrust

  • Application Shielding First Line of Defense for Financial Apps

    In this webinar, join Paul Butterworth, the Director of Product Marketing at Intertrust, as he discusses the risks your financial applications face, best practices for protecting applications, IP and keys and explore some real-world examples from financial services.

  • Protecting Healthcare Software

    For decades medical devices have been standalone instruments that interacted only with the patient or medical provider. In this white paper, learn about the shift to smart technologies and how to safeguard patient data and healthcare applications.

  • Application Shielding with Intertrust whiteCriterion Code Protection

    Traditional parameter security measures lack the flexibility needed to meet mobile and IoT security risks. This white paper goes in-depth into the specific security challenges hackers are using to expose application vulnerabilities and defines the tactics and tools that can be implemented to mitigate these risks.

  • Key Protection with Intertrust whiteCriterion Secure Key Box

    Traditional perimeter security strategies are insufficient for protecting the growing number of remote devices being used to conduct business. This white paper overviews cryptographic key security, a threat that is becoming increasingly relevant in today’s digital environment, and highlights the common techniques used by hackers.

  • Gentek Global Secures Payment Systems with Application Shielding

    In this case study, discover how Gentek, a payment systems security company, partnered with Intertrust to deploy robust application shielding for its payment systems in order to protect user data and adhere to regulatory requirements of the payments industry.

  • Connected Car Security

    As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.

  • Taking Steps to Protect Financial Mobile Applications

    Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.

  • 2019 Mid-Year Global Overview of Live OTT Sports

    Until recently, live sports has been a major force in keeping many subscribers tethered to their pay-TV subscription. However, with recent improvements in live streaming technology, sports fans are moving from traditional to online viewing at a steady pace. In this report, learn how OTT sports are evolving around the world.

  • Reverse Engineering Still a Serious Problem in 2019

    While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.

  • How to Revive the Pay TV Market

    While many factors contribute to subscriber loss for the pay TV industry, there are many steps that pay-TV providers can take to protect their revenue streams. In this white paper, learn how to revive pay TV subscriber margins by embracing multi-screen TV, addressing ad fatigue and more.

  • Bridging DRM and CAS

    With the popularity of OTT, digital rights management (DRM) is replacing traditional conditional access systems (CAS) as the content protection technology of choice. In this white paper, learn how to balance content protection to ensure your technology is future perfect and past proof.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.