Application Security Research
-
Security for a Faster World
Sponsored by: Hewlett Packard EnterpriseThis eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
-
HP Fortify on Demand
Sponsored by: Hewlett Packard EnterpriseAccess this data sheet to discover an on-demand solution that tests the security of software quickly, accurately, and affordably.
-
Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
Sponsored by: Veracode, Inc.A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Beyond Modernization: Legacy Applications Need New Platforms
Sponsored by: DellEMC and Intel®Not all applications that run successfully on-premise can be easily migrated to the cloud. This expert e-guide serves as a guide to application modernization, and offers a checklist to help you mitigate risk during legacy modernization.
-
The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
Sponsored by: IBMThis report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
-
Magic Quadrant for Application Security Testing
Sponsored by: Veracode, Inc.Choosing the right software security testing tool can be an overwhelming process. In this Gartner report, make your decision a little easier with a comparison of the top app security testing vendors on the market, including IBM, HP, Veracode, Aspect, and more.
-
Five critical steps to achieving an effective application security program
Sponsored by: IBMThis white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
-
Best Practices for a Secure Mobile Workforce
Sponsored by: Accellion, Inc.Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
-
Symantec Data Loss Prevention for Mobile
Sponsored by: Symantec CorporationThis webcast introduces the highest-rated DLP solution with industry-leading detection technology.
-
Defending Against Application-Layer DDoS Attacks
Sponsored by: Juniper Networks, Inc.This white paper explains the serious problem that DDoS threats present, and how it impacts your business.
-
Webinar: Practical Examples for Achieving and Maintaining DevOps Compliance for Financial Institutions
Sponsored by: WANdiscoBanking and financial institutions rely heavily on internally developed software to provide new products and services and are faced with an ever-changing regulatory environment that imposes tremendous challenges. This webinar will review specific compliance challenges, and how to automate compliance for open source software.
-
Heighten Security and Improve Availability With an Application Delivery Solution
Sponsored by: CitrixFind out which application virtualization and delivery solutions are capable of working together to provide you with both high availability and stellar security.
-
Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
Sponsored by: WANdiscoConsistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
-
Webinar: Scaling Git for the Enterprise
Sponsored by: WANdiscoThis webinar answers the most common questions when attempting to scale Git for the enterprise including how to manage thousands of users, monitor performance, and ensure compliance with regulatory standards
-
Compare Windows 8 and Windows® XP Security Problems
Sponsored by: Lenovo and MicrosoftThis white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
-
Secure Access and Continuity in a Virtualized and BYOD World
Sponsored by: Hewlett Packard EnterpriseThis business whitepaper focuses on the challenges facing midsize businesses who are looking to provide business continuity and minimized downtime. It also highlights the benefits of HP Just Right IT secure access and business continuity solutions.
-
DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
Sponsored by: FireEyeThis informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
-
How desktop and app virtualization affects IT security
Sponsored by: CitrixThis white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
-
Application Security Advice: Stop Threats before They Start
Sponsored by: TechTarget Software QualityToo often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle.
-
Best Practices for Security and Compliance with Amazon Web Services
Sponsored by: Trend MicroThis resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
-
BYOD Happens: How to Secure Mobility
Sponsored by: CitrixView this on-demand webcast for an in-depth look at 10 ways to securely optimize mobility with an architecture that spans micro apps, cloud and data protection.
-
Improve Your Mobile Application Security
Sponsored by: IBMMobile applications bring with them a whole slew of security concerns that must be addressed throughout the development and deployment process. This helpful white paper introduces a mobile application development platform that helps you tackle security issues on devices, over the network, in the enterprise, and within the application itself.
-
Tolly Test Report: IBM Security Web Gateway Appliance
Sponsored by: IBMThis white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
-
Pilot Light DR for Amazon Web Services
Sponsored by: CloudVelocityIn this paper, discover why cloud-based DR allows for improved application security, and learn about one solution that automates cloud-based disaster recovery for multi-tier, physical, and virtual production apps.