ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Micro-services: Patterns and Nimbleness

    Sponsored by: Crowd Machine

    How can your organization take advantage of the agility, scalability, and flexibility that micro-services offer? View this blog post to find out.

  • No-code Platforms Bridge the LOB-IT Gap

    Sponsored by: Crowd Machine

    View the following blog post to learn how no-code platforms can close the IT-LOB gap, as well as fulfill both internal and LOB app development requirements.

  • AI and Its Role in Software Development

    Sponsored by: Crowd Machine

    Read the following blog post to examine AI's capabilities, how AI could benefit your enterprise, and AI's future role in software development.

  • Debunking No-code and Low-code Adoption Myths

    Sponsored by: Crowd Machine

    The following post will set the record straight and debunk the three most common myths about no-code and low-code platforms. Read it here to separate fact from fiction and to get an objective take on what these platforms are capable of.

  • Safeguarding PeopleSoft Against Direct Deposit Theft

    Sponsored by: Appsian

    In this white paper, explore security challenges associated with handling payroll diversion in PeopleSoft. Also, learn how user awareness, contextual access controls, and fine-grained data security can help organizations mitigate payroll diversion.

  • Exposing PeopleSoft Self-Service Applications to the Internet

    Sponsored by: Appsian

    Despite the benefits of opening applications like PeopleSoft for remote access, security ramifications are a major concern. So how do organizations maintain secure when access to PeopleSoft is available outside a secure corporate network? In this white paper, learn how you can achieve a secure remote access environment for PeopleSoft.

  • The Role of Kubernetes in Cloud Security

    Sponsored by: Lacework

    Adoption of Kubernetes has skyrocketed in the last few years, but knowledge of the platform is still lacking. Download this white paper to learn about the role of Kubernetes in cloud security and how the landscape of security and DevOps is rapidly changing.

  • Automated Security at the Speed of DevOps

    Sponsored by: Trend Micro, Inc.

    As organizations implement DevOps on AWS, they need to understand the security implications. In this white paper, explore the main challenges businesses face at the intersection of DevOps and security. Also, learn best practices for integrating security within your development process from the start.

  • 6 Steps to Container Security

    Sponsored by: Trend Micro, Inc.

    Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.

  • The Vulnerability Epidemic in Mobile Financial Apps

    Sponsored by: Arxan

    A recent study examined the protective capabilities of more than 30 different financial services applications found on the Google Play store. In this webinar, Knight and Arxan chief scientist Aaron Lint discuss the report findings and share best practices to enhance mobile app protection.

  • In Plain Sight: The Vulnerability Epidemic in Financial Mobile Apps

    Sponsored by: Arxan

    This study examines the perceived security of financial mobile apps. It highlights the systemic problem across the financial services industry of FIs' failure to properly secure their mobile apps. In this research report, explore key takeaways from the study which can be used as a guide to help you secure your mobile applications.

  • Securing Mobile Apps for Connected Cars

    Sponsored by: Arxan

    In this white paper, learn how Arxan Application Protection hardens connected car apps to help prevent reverse engineering attacks, secure data and encryption keys, and alert you in real-time about the security status of all your deployed apps.

  • Market Guide for In-App Protection

    Sponsored by: Arxan

    In this Gartner Market Guide, discover a market analysis on in-app protection, key findings and recommendations for security and risk managers, as well as vendors in the space.

  • A New Approach to Secure Mobile Banking Apps

    Sponsored by: Arxan

    Customer demand has pushed for standardized mobile banking, which means financial institutions are required to properly handle the heightened security requirements that come with it. Read this whitepaper to learn the 3 transformational benefits of a well-designed endpoint security strategy for mobile banking applications.

  • The Secure Transformation to HANA

    Sponsored by: Onapsis

    Implementing security at the beginning of your digital transformation or cloud migration can enable your organization to migrate with confidence, knowing that their critical data and processes are secure, as well as save costs related to security fixes. Download this white paper to learn more about the secure transformation to HANA today.

  • Salesforce Data Protection Through User Activity Monitoring

    Sponsored by: FairWarning

    Salesforce holds a vast amount of regulated, proprietary and confidential information. But as data theft trends increase, a better way to protect this information is needed. In this white paper, gain a better understanding of the need for Salesforce data protection and user activity monitoring.

  • Data Theorem Interview Digital Anarchist RSA Conference 2019

    Sponsored by: Data Theorem

    In this interview from the 2019 RSA Conference, listen to Data Theorem's senior leaders, Himanshu Dwivedi and Doug Dooley, talk about the benefits of Data Theorem's newest API security product offerings.

  • How to Deal with Fraudulent Counterfeit Apps

    Sponsored by: Data Theorem

    A counterfeit app is an unauthorized app that exploits the reach and user of a brand or mobile app for financial gain. In this webinar, learn about the different types of counterfeit apps and how to spot them.

  • How to choose the right micro-segmentation provider

    Sponsored by: Guardicore

    As micro-segmentation grows in popularity, there are a number of options to choose from for security operations, from the vendors themselves to the tools and processes they offer. Download this white paper to explore the essential elements to consider before choosing a micro-segmentation provider today.

  • The Benefits of micro-segmentation in modern enterprise environments

    Sponsored by: Guardicore

    The idea of segmentation for security is nothing new but, the increases in virtualization, SDNs, and the use of cloud infrastructure have created a new set of security issues. In this white paper, learn how if you use the right techniques, micro-segmentation can address the shortcoming of alternative network segmentation approaches.

  • 7 steps to operationalize your micro-segmentation deployment

    Sponsored by: Guardicore

    Micro-segmenting your networks is a good idea because it creates secured, isolated zones, thus reducing the organizational attack surface. However, a key aspect of a successful micro-segmentation project is making sure you're prepared. In this white paper, explore 7 steps to operationalize your micro-segmentation deployment.

  • Reduce your attack surface using Guardicore Centra Security Platform

    Sponsored by: Guardicore

    Enterprise IT infrastructure is evolving to cloud and hybrid cloud architectures. Although this transformation is helping many organizations, it is also creating a larger security attack surface. In this data sheet, learn how Guardicore Centra Security Platform can help organizations apply micro-segmentation controls to reduce their attack surface.

  • Navigating the path to secure micro-segmentation in hybrid and multi-cloud data centers

    Sponsored by: Guardicore

    The path to implementing micro-segmentation isn't a straight line; without the right approach to discovering, understanding and controlling application flows you can encounter several challenges. In this solution brief, learn how Guardicore Centra Security Platform can help you successfully navigate the path to micro-segmentation in 3 steps.

  • How to Automate an API Security Program

    Sponsored by: Data Theorem

    Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.

  • Application-Centric Security

    Sponsored by: Nutanix

    Relying on antiquated methods of protecting IT is no longer feasible. It's time to consider a new application-centric approach that delivers the protection you need with more agility, more flexibility, and above all, better security. Download this e-book to learn how application-centric security can benefit your organization today.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.