Research Library

Powered by

Application Security Research

  • Continuous Application Security: A Unified Approach Across the SDLC

    Sponsored by: Contrast Security

    This webinar makes the case for instrumentation-based unified application security. With IAST and RASP, the security strategy can detect vulnerabilities, prevent exploits, secure data, and maintain compliance. Watch the webinar now to find out more.

  • Security Instrumentation is the Future of All Software

    Sponsored by: Contrast Security

    We’re in a software security crisis—and we have been for a while now. In both 2000 and 2019, applications had an average of 26.7 serious vulnerabilities. This webinar examines the state of application security and considers how strong instrumentation-based application security platforms are key to finally uniting development and security.

  • Sentinel Auto API

    Sponsored by: WhiteHat Security

    Traditional API testing is manual, time-consuming, and widely unpopular. In fact, less than 25% of organizations are testing their APIs. However, the critical nature of APIs requires them to be protected. In this data sheet, take a closer look at the key features of Sentinel Auto API and see if it meets for your API security needs.

  • Maintaining the Security Posture

    Sponsored by: Onapsis

    Based on the critical nature of Enterprise Resource Planning (ERP) applications, they are often under attack by cybercriminals looking to cause disruptions. In this white paper, explore the top threats facing your business-critical applications and discover a list of security recommendations to help you get started.

  • How to Stay Secure as a Retailer Using Cloud to Improve the Customer Experience

    Sponsored by: DivvyCloud

    Today’s retailers are facing stress on several fronts: Customer demands for improved experience, competitive pressures, and the need to ensure regulatory compliance. This cloud security guide for retailers breaks down these common challenges and offers pragmatic advice for developing a roadmap for security and compliance.

  • Data Privacy at Automox: Why SaaS Applications Deliver Superior Security

    Sponsored by: Automox

    Cloud computing has seen a meteoric rise from emerging trend to backbone of most technology infrastructures. The growing list of benefits that come from a cloud transformation often overshadow the most common concern – security. In this white paper, learn more about the current cloud security landscape and where it’s expected to go.

  • Cloud One Overview Solution Brief

    Sponsored by: Trend Micro

    In order to fully realize the benefits of cloud technologies, adequate cloud security is a critical pillar. In this solution brief, explore some of the key features and capabilities of Trend Micro Cloud One, a security services platform designed to provide the flexibility you need without slowing down your business or application delivery.

  • AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements

    Sponsored by: Contrast Security

    The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.

  • Contrast Assess Route Intelligence

    Sponsored by: Contrast Security

    Learn how Contrast Assess Route Intelligence transforms AppSec by observing the routes of an application while it’s running—thereby exposing all the different points of entry into the application.

  • Application Encryption and Security

    Sponsored by: NetLib Security

    Adequate application security is defined by protection against external threats alongside the ability to detect and prevent internal vulnerabilities. While this may sound simple, the average organization has around 50% of apps that remain vulnerable. So, what is the solution to this problem? Read on to find out.

  • Security Process Overview of the Neptune DX Platform

    Sponsored by: Neptune Software

    The Neptune DX platform offers its users a variety of speedy low-code development options. But how does it ensure that your systems remain safe? Watch this short video to learn how the security features of Neptune DX work, and learn the three different levels they use to manage security.

  • Perimeter Security Noise Leaves Applications Vulnerable to Attacks

    Sponsored by: Contrast Security

    Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.

  • A Comprehensive Approach to DevSecOps

    Sponsored by: Contrast Security

    More than half of organizations in a recent study say that their security team has reached a tipping point where the number of security tools in place has adversely impacted their security posture and increased risk. Stuck in the AppSec tool swamp? Learn about a unified AppSec platform that can alleviate this problem.

  • Ensuring Cloud Security and Compliance in the Financial Services Industry

    Sponsored by: DivvyCloud

    In order to meet customer demands, financial service organizations are embracing mobile banking applications. However, teams should be aware of the additional security threats associated with organizational changes. Download this white paper and learn how to ensure cloud security and compliance while embracing digital transformation.

  • Principles for Securing DevOps

    Sponsored by: Veracode, Inc.

    DevOps is transforming the way organizations create, test and release software. An emerging advancement in DevOps is the inclusion of security into software development lifecycle. This white paper highlights 5 key principles for integrating security into the software development lifecycle in order to meet security goals.

  • Application Security Fallacies + Realities

    Sponsored by: Veracode, Inc.

    As breaches continue to make headlines, organizations are realizing the serious risk posed by applications. Now is the time for organizations of all sizes to understand the fallacies, and the truths, of application security. Download this e-book for 7 fallacies and realities about application security.

  • Veracode Integrations

    Sponsored by: Veracode, Inc.

    To keep up with the shift to DevOps and rapid release cycles, application security solutions need to integrate into security and development teams’ existing tools and processes. Learn how the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you may already be using.

  • How Do Vulnerabilities Get into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

  • Your Path to a Mature AppSec Program

    Sponsored by: Veracode, Inc.

    Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.

  • A Tale of Two Teams

    Sponsored by: Veracode, Inc.

    The days of security and development working in silos are over. Each team needs to understand and work closely with the other. In this e-book, learn more about the new processes and priorities each team has throughout the software lifecycle.

  • State of Software Security: Executive Summary

    Sponsored by: Veracode, Inc.

    The 2019 Veracode State of Software Security represents the 10th version of the report. Gain insight into the high-level application security trends Veracode identified this year in this executive summary of their report.

  • What Is Application Security?

    Sponsored by: Veracode, Inc.

    As organizations shift from data hosted in traditional databases to application containers, security needs to also shift to reflect this change. This data sheet provides an overview of application security to equip you with the knowledge you need to get started.

  • Application Delivery for DevOps

    Sponsored by: Radware

    Alteon Multi Cloud is an application delivery controller (ADC) solution that facilitates the timely creation and deployment of ADC services across various computing environments. In this brief, learn more about the core functionalities of Radware’s Alteon Multi Cloud.

  • Smooth the Transition to the Cloud with Radware’s Secure ADC Solutions

    Sponsored by: Radware

    Many enterprises are transitioning to the cloud. As a result, their focus shifts from infrastructure-centric environments to application-centric solutions. This creates the unique challenge of how to make advanced services, such as application delivery and security simpler to consume and maintain. In this brief, learn how Radware’s ADC can help.

  • What’s Wrong With DAST

    Sponsored by: Wallarm

    Most security organizations use vulnerability scanners and other DAST tools. However, most of the scanners that are deployed today are limited in their coverage. In this white paper, learn about 3 important areas a scanner must address when conducting scans to ensure full coverage.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.