Application Security Research
-
Web Application Firewalls Are Worth the Investment for Enterprises
Sponsored by: ImpervaThis resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
-
Structured Approach to Migrating Oracle Apps from a Physical to Virtual Environment
Sponsored by: EMC Converged Platforms.Access this in-depth white paper to discover a structured approach to migrating Oracle apps from a physical to a virtual environment. Read on to find out why this approach meets many of the challenges presented by the virtualization of Oracle databases and applications, and learn how you can get started.
-
Cisco Cloud Web Security: Single Interface for Global Control
Sponsored by: Cisco Systems, Inc.This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
-
Discovering Vulnerable Web Applications
Sponsored by: QualysThis paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
-
Eagle Bank Keeps Deposits and Customer Data Safe
Sponsored by: ImprivataThis case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
-
Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
Sponsored by: ImprivataThis case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
-
The Key to Seamless SSO: Building a Federated Identity Service
Sponsored by: Radiant Logic, Inc.This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
-
Unlock the value of BYOD: Go mobile without sacrificing security
Sponsored by: IBMThis paper explores how organizations can derive business value in the BYOD era, while still providing a security-rich IT infrastructure and consistent service levels.
-
How to Leverage Free Tools to Secure Web Apps
Sponsored by: ImpervaExpert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
-
Software Security for Web Developers: Providing a Helping Hand
Sponsored by: ImpervaThis expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
-
How Desktop Virtualization Simplifies Critical Security Tasks
Sponsored by: CitrixThis white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
-
How to Extend your Identity Management Systems to use OAuth
Sponsored by: Forum SystemsRead this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
-
Selecting a Next-Generation Firewall: Top 10 Considerations
Sponsored by: CiscoIn this white paper, learn about the 10 features your next-generation firewall should have to protect your network from a range of threats.
-
Information Security Magazine – April 2014
Sponsored by: TechTarget SecurityIn this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks.
-
Best practices: Deliver next-gen automotive infotainment systems
Sponsored by: IBMIn the realm of next-generation automotive infotainment systems, innovation continues to grow exponentially, with new system features creating both trends and challenges. In this informative webcast, discover a fundamental approach for success in E/E engineering and learn how the ever-increasing complexities can be simplified.
-
Technical Guide on Application Security
Sponsored by: TechTarget SecurityThis expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
-
Manage Data Security and Application Threats with a Multi-Tiered Approach
Sponsored by: IBMThis resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
-
An Integrated Approach to Managing Application Security
Sponsored by: IBMThis white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
-
Protect People, Processes, and Technology From Web Application Threats
Sponsored by: IBMThis resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
-
5 Easy steps to adopting an enterprise app store
Sponsored by: CitrixThis exclusive white paper examines five easy steps that your organization can take to adopt a secure and effective enterprise app store that will help you empower your workers and reap the benefits of enterprise mobility.
-
Why You Need A Next-Generation Firewall
Sponsored by: Hewlett-Packard EnterpriseThis white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
Sponsored by: ImpervaThis guide takes a look at 10 things that every web application firewall should provide.
-
Accelerating the deployment of a secure mobile enterprise
Sponsored by: IBMIn this insightful white paper, explore key challenges you'll face in ensuring the security of enterprise mobile devices, learn strategies that will help you reduce risk, and discover new ways that you can be more secure in your use of mobile technology.
-
Securing mobile devices in the business environment
Sponsored by: IBMAs smartphones and other mobile devices gain traction in consumers' personal lives, they're also being introduced into their work environments. In this white paper, learn how to safely introduce personal or corporate-owned mobile devices into the workplace, identify and prevent the risks to corporate data, and ultimately drive more business value.