ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • 2013 Magic Quadrant for Application Security Testing

    Sponsored by: IBM

    This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!

  • College Board Case Study: Quality Software is Secure Software

    Sponsored by: IBM

    In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.

  • 2012 IBM X-Force Annual Trend and Risk Report

    Sponsored by: IBM

    Access this informative resource to learn about the latest trends and technology that security pros are taking advantage of in order to provide effective and efficient mobile security.

  • Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business

    Sponsored by: IBM

    This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.

  • Creating the Ultimate Security Platform

    Sponsored by: IBM

    This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.

  • Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert

    Sponsored by: Thawte Inc.

    This e-guide from SearchSecurity.com outlines how to address web app design flaws and fight these weaknesses once and for all.

  • A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM

    Sponsored by: TechTarget Security

    In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.

  • Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler

    Sponsored by: Citrix

    Explore the details of an end-to-end mobility solution that simplifies mobile integration into the network and helps you overcome the top challenges enterprise mobility presents, from visibility and management to scalability and security.

  • Going the Last Mile to Deliver Mobile Apps

    Sponsored by: Apperian, Inc.

    Read on to find out who D.W. Morgan, a global organization responsible for the transportation of critical inventory for multinational companies, partnered up with to radically optimize its already existing mobile logistics application, ChaninLinq.

  • Citrix Mobile Solutions Bundle - Product Overview

    Sponsored by: Citrix Systems, Inc.

    Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.

  • Healthcare Networking Classroom

    Sponsored by: TechTarget Health IT

    Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.

  • Shadow IT - Embrace it

    Sponsored by: Tier 3 and VMware

    This e-guide explores the challenges arising from shadow IT and offers advice for getting ahead of the curve to safely and securely embrace it.

  • Securing Enterprise Data in a BYOD World

    Sponsored by: Globo

    Bring-your-own-device (BYOD) initiatives can increase productivity and make for happier employees, but they pose serious security risks. This resource outlines the fundamentals of mobile security that so often go overlooked. Read on to get advice on how to leverage a security strategy to make your enterprise mobilization effective and safe.

  • How to Secure Your Microsoft SharePoint Products

    Sponsored by: Thawte Inc.

    This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.

  • SharePoint Security Should Not Be an Afterthought

    Sponsored by: Thawte Inc.

    This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.

  • Five Security Considerations for the Mobile Age

    Sponsored by: IBM

    While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.

  • GRC Solutions from itelligence: Balance Risk And Opportunity With A Practical Approach to GRC

    Sponsored by: itelligence, Inc.

    To keep pace in today's constantly evolving regulatory environment, you need a comprehensive governance, risk, and compliance (GRC) system. This brief white paper highlights how the right GRC strategy can help you standardize business process and increase control over compliance issues.

  • How iOS Encryption and Data Protection Work

    Sponsored by: Symantec Corporation

    This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.

  • Enterprise Mobility Management Options to Keep Corporate Data Safe

    Sponsored by: MobileIron

    This guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.

  • Implementing Your BYOD Mobility Strategy: AN IT Checklist and Guide

    Sponsored by: Insight

    This mobility checklist will offer readers an easy-to-read breakdown of what the IT department absolutely needs to consider when implementing a BYOD program into their enterprise. Read on to learn about the applications to choose, the installation and configuration options available, how to evaluate device performance, and more.

  • Choose Your Own Device (CYOD) Workshop

    Sponsored by: Insight

    Read on to learn about a CYOD workshop that can help you understand and develop a winning CYOD strategy with help from industry experts. Find out how taking advantage of this valuable learning experience will help you get a good grasp on policies and compliance, device lifecycles, device management, and more.

  • Sophos EndUser Protection Overview

    Sponsored by: Sophos

    This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  • SSL Certificate Management: Avoiding Common Mistakes

    Sponsored by: GeoTrust, Inc.

    This expert E-Guide from SearchSecurity.com explores the common mistakes inherent to SSL certificate management and provides advice on how to avoid them. View now to learn more!

  • Taking Action to Secure Web Applications

    Sponsored by: TechTarget Security

    This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.