Research Library

Powered by

Application Security Research

  • Forcepoint CASB: Visibility and Control of Cloud Applications

    Sponsored by: Forcepoint

    Watch this webcast to learn about the 2 flexible CASB deployment options, as well as the 6 mission-critical capabilities they provide. Finally, discover a vendor who may be able to provide you the data governance, audit protection, and more you need.

  • Endpoint Detection and Response

    Sponsored by: CrowdStrike

    Endpoint detection and response (EDR) is the most promising strategy for preventing attackers to freely roam around your environment. Utilize this white paper as a guide to understanding EDR, where it fits in your security strategy and what is involved in maturing EDR capabilities so that your organization can derive the greatest benefit.

  • IoT: Take Control of the Edge

    Sponsored by: VMware

    With the increase in IoT, companies can run into challenges of remaining secure, while managing business operations. This brief webinar offers an approach to onboarding, managing, monitoring and securing IoT use cases from the edge to the cloud.

  • Access Control is Easy

    Sponsored by: One Identity

    Effective access control is a matter of well-managed groups. This resource uncovers how to implement and manage Active Directory (AD) groups and dives into why they are at the center of the access control and governance universe.

  • Veracode Greenlight Demo

    Sponsored by: Veracode, Inc.

    To bolster your app security efforts, learn about CA Veracode's app security platform by accessing a personal demo of how their scalable, SaaS-based platform works to scan massive amounts of code.

  • 2018 Security Predictions

    Sponsored by: Splunk

    This resource offers predictions of 2018 and how machine learning and DevSecOps will impact and benefit security strategies.

  • Why Externalize?

    Sponsored by: Axiomatics

    This resource provides insight into the attribute based access control (ABAC) model, explores how it impacts authentication and application security, and reveals 4 common misconceptions.

  • Unifying Endpoint Management with Windows 10

    Sponsored by: VMware

    A key pain point for enterprises using Windows 10 is that you need insight into which devices require updates and which already have them. Read this guide to learn about this new unified endpoint management system to empower your employees while simplifying IT's job.

  • Secure Applications in the Development Phase with DevSecOps

    Sponsored by: Veracode, Inc.

    Effective application security is more than a one-time scan. Security needs to be continually assessed during every step of the app development process. This three step process puts you on the path to developing a mature app security program.

  • 3 Reasons: Why DevOps is a Game-Changer for Security

    Sponsored by: Tenable, Inc.

    Oftentimes, security teams have struggled with keeping pace with DevOps. This resource explores the intersection of DevOps and InfoSec and offers 3 reasons why security organizations will benefit by combining these 2 practices.

  • Painless DevSecOps Integration across the Value Stream

    Sponsored by: Tasktop

    This webcast explores how to take a DevSecOps approach to minimizing the impact of vulnerabilities on your apps. Find out how to make developers, QAers, and security pros aware of vulnerabilities as soon as possible and discover how you can integrate tools end-to-end across the value stream.

  • Reducing Cyber Exposure from Cloud to Containers

    Sponsored by: Tenable, Inc.

    This resource offers insight from 29 cybersecurity professionals regarding how they are beginning their cyber exposure journey to protect expanding attack surfaces.

  • Innovative Digital Bank Reduces Fraud by 70% While Increasing Business by 7x

    Sponsored by: Simility

    Explore this case study to gain insight into how Chime, a mobile financial company, overcame the challenge of fraudulent accounts by implementing a machine learning approach.

  • Identity Management and Governance: Bridging the Gap Between IT and Users

    Sponsored by: CA Technologies

    This solution brief explores how an IAM technology that combines robust functionality with an intuitive and business-oriented experience can help you meet modern security challenges

  • Future of Device Fingerprinting

    Sponsored by: Simility

    A crucial part of fraud detection in the virtual world has been assigning an identity to every laptop, tablet and mobile device that accesses websites or apps. Explore this white paper to gain insight into an advanced device fingerprinting strategy and how it can boost your current authentication approach.

  • On-Demand Cloud Security for Microsoft Azure

    Sponsored by: Fortinet, Inc.

    94% of organizations are running applications or experimenting with infrastructure-as-a-service, according to Fortinet. With this growth, securing the cloud is more important than ever before. This resource offers an on-demand cloud security strategy for Microsoft Azure.

  • Shedding Light on the Cloud App Visibility Blind Spot

    Sponsored by: Forcepoint

    In this white paper, learn how the risk posed by shadow IT has grown, as well as why traditional controls and security policies don't address account-centric threats. Then explore 3 criteria organizations should consider to address the visibility blind spots between themselves and their cloud providers.

  • Moving from Vulnerability Management to Effective Vulnerability Response

    Sponsored by: ServiceNow

    How does your team respond to new high-profile vulnerabilities? Explore this webinar to gain insight into the transition of vulnerability management to effective vulnerability response.

  • The Definitive Guide to Micro-Segmentation

    Sponsored by: Illumio

    The more an organization is connected to the internet, the more vulnerable it becomes. This 80-page e-book will guide you in understanding and implementing micro-segmentation. In addition, learn about how it can make your organization more secure and agile.

  • 4 Essential Strategies for Endpoint Security and Protection

    Sponsored by: Absolute

    Endpoint devices are the single largest group of devices inside your network today. Disruption of endpoints can have a serious impact on your day to day business operations. This resource offers 4 essential strategies to improve your endpoint security and protection.

  • Maintaining Business Continuity & Security for Your Organization

    Sponsored by: Citrix

    Whether planned or unplanned, business disruptions that aren't managed effectively come at a high cost. This white paper offers strategies for keeping your company productive during unplanned security incidents.

  • Leading Consultancy Company Case Study: Providing Single-Sign-On Cloud App Security

    Sponsored by: Forcepoint

    Read this case study to learn how this consultancy company was able to safeguard both customer-facing and employee applications when migrating to the cloud.

  • Applying Secure Design Patterns to Microservices Development

    Sponsored by: Whitehat Securities

    From a developer's perspective, find out what you can do to improve app security for microservices-based development so that you can find and resolve issues even as you continuously release and iterate code.

  • A Cloud App Visibility Platform Gave this Airline Peace of Mind

    Sponsored by: Forcepoint

    Read this case study to learn what this geographically dispersed airline gained when they adopted a comprehensive cloud app visibility and control program.

  • The State Of Software Security

    Sponsored by: Veracode, Inc.

    Learn about the key components that comprise an effective app security program, and find out how developers are making strides to play a bigger and more impactful role in app security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.