Application Security Research
-
Application Control at the Wireless Edge
Sponsored by: XirrusThis exclusive paper examines an application control solution that uses next-generation Deep Packet Inspection (DPI) technology to deliver Layer 7 application visibility and policy control.
-
Web Application Performance Management
Sponsored by: RadwareThis white paper introduces a solution that not only allows users to measure end-to-end application, network and browser rendering performance data in real-time, but also one that automatically accelerates web sites; optimizing HTML dynamically and reducing web page build times by up to 50% on PC and mobile browsers.
-
Deliver Virtual Apps and Desktops as Mobile Services
Sponsored by: CitrixThis video details a solution to BYOD that will give users the personalized experience they crave while keeping your data secure.
-
Application Hardening: Evolving Techniques for Proactive Enterprise Application Security
Sponsored by: TechTarget SecurityThis expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security.
-
The Use Case for Integrated Vulnerability Management CORE Security
Sponsored by: Core Security TechnologiesThis white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
-
Mobilizing Windows Apps from a Centralized Data Center
Sponsored by: CitrixThis test report demonstrates the ability to mobilize Windows apps from a central datacenter and deliver them to mobile devices such as tablets.
-
Gamania Group tightens security to strengthen game development capability
Sponsored by: Hewlett Packard EnterpriseInside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
-
Mapping Security for your Virtual Environment
Sponsored by: Hewlett Packard EnterpriseAccess this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
-
Web Application Security Insider's Edition
Sponsored by: TechTarget SecurityThis Insider Edition will help you understand threats against Web applications, how you can help developers with security tools and training and how to deploy technologies such as Web application firewalls to keep your organization's Web presence safe.
-
AppConnect and AppTunnel: Advanced Security for Mobile Apps
Sponsored by: MobileIronThis exclusive resource discusses a security solution that prevents data loss as mobile applications become business-critical and widespread tools in the enterprise.
-
Top Three Mobile Application Threats
Sponsored by: Hewlett-Packard EnterpriseThis white paper reveals the top three mobile application threats enterprises today are facing and offers advice on how to mitigate the potential risks. View now to learn more!
-
How The Burgiss Group Manages Business Risk with AppFirst
Sponsored by: AppFirstThis case study reveals which solution the Burgiss Group trusts to help them monitor the behavior of their applications and systems and – in turn – ensure an optimal experience for their clients. View now to learn more!
-
Ensuring Application Security in Mobile Device Environments
Sponsored by: IBMThis crucial paper examines mobile application security in the age of BYOD, discussing common threats and what your organization can do to seal up vulnerabilities.
-
Video: Amazon Web Services API Security Overview
Sponsored by: IntelAnimation that shows how enterprise APIs can be managed using AWS hosted API management infrastructure that allows you to scale security along with apps in the cloud. Learn how public cloud apps can be quickly secured and expose for rapid mobile access. Learn about API management from the AWS cloud.
-
Voice over IP (VoIP) Growth and the Strain on Network Security
Sponsored by: WatchGuard Technologies, Inc.Explore how VoIP can expose your organization to numerous risks and uncover why traditional firewalls often cannot thwart the many challenges VoIP presents.
-
BYOD: Bring Your Own Device – or Bring Your Own Danger?
Sponsored by: WatchGuard Technologies, Inc.This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
-
SuperMassive Series data sheet
Sponsored by: Dell SoftwareThe Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.
-
Computer Weekly special report: Corporate application access through employee-owned mobile devices
Sponsored by: BlackBerryYour employees are accessing the corporate network from mobile devices—learn how to be prepared.
-
A Foundation for Next-Generation Data Center Security
Sponsored by: CitrixThis white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing data center infrastructure.
-
How Citrix NetScaler Supports Virtualized Multi-tenant Datacenters
Sponsored by: CitrixExplore how expanding virtualization to your application delivery controllers (ADCs) can help you facilitate the journey to the cloud.
-
9 Reasons Why NetScaler Beats F5
Sponsored by: CitrixThis whitepaper compares two market-leading application delivery controllers (ADCs) to help your organizations find the one that best aligns with your business needs.
-
Global Security University: IAM Integration Classroom
Sponsored by: IBMThis Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
-
Cloud App Success Means End-User Identity Management
Sponsored by: VMware, Inc.This e-guide takes a deeper look at whether roaming profiles can increase the use and mobility of a cloud app among providers and discusses the impacts of end-user identity management on the success of your cloud apps.
-
Creating a Successful Business-Oriented Integration Strategy
Sponsored by: AdeptiaThis e-guide outlines key SOA, BPM and business capabilities that enterprises must have to stay competitive in the future.
-
Jump-start your move to Windows 8
Sponsored by: DELL TECHNOLOGIES AND MICROSOFTThis exclusive paper discusses helpful services you can utilize to help ensure that all areas of your environment are ready to make the jump to Windows 8.