ComputerWeekly.com Research Library

Powered by Bitpipe.com

Secure Application Development Research

  • E-Guide: Integrating security into the ALM lifecycle

    Sponsored by: SearchSecurity.com

    In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.

  • Beating web application security threats

    Sponsored by: SearchSecurity.com

    Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.

  • E-Guide: Expert insights to application security testing and performance

    Sponsored by: SearchSecurity.com

    Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.

  • Application security testing: Protecting your application and data

    Sponsored by: SearchSecurity.com

    Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.

  • DevSecOps: Putting the Security in DevOps

    Sponsored by: Sonatype

    Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.

  • Buyer's Essentials: What to Look for in an EMM Strategy

    Sponsored by: SearchSecurity.com

    EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Untangling Work and Personal Data with Enterprise MAM

    Sponsored by: IBM

    This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.

  • The Modern Mobility E-Zine: An Exclusive Look at Enterprise Mobility

    Sponsored by: SearchMobileComputing

    Access this e-zine to learn how the role of DevOps is changing as enterprise mobility matures. Read on here to see how fusing mobile app development and management can change the way IT delivers mobile information to users.

  • Be a Web App Security Superhero

    Sponsored by: SearchSecurity.com

    To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.

  • Mastering Mobile Application Management: How to Adopt MAM

    Sponsored by: IBM

    Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.

  • The Essential Guide for Threat Intelligence Services: What to Look For

    Sponsored by: SearchSecurity.com

    This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.

  • An Exclusive Guide for Promoting Enterprise Mobility Management

    Sponsored by: SearchMobileComputing

    This e-book takes readers through the process of enabling and managing a secure mobile workforce. Access this resource to understand how mobility can increase agility—and why security concerns, while important, shouldn't stop mobility in your organization from taking off.

  • WAN Optimization: Expert Guidelines to Management and Security

    Sponsored by: SearchNetworking.com

    What is the next step for WAN management? This expert guide explains why WAN optimization is now the norm and provides guidelines for an all-in-one strategy to minimize cost, complexity, and risk within your organization.

  • Application Security Advice: Stop Threats before They Start

    Sponsored by: SearchSoftwareQuality.com

    Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle.

  • An Integrated Approach to Managing Application Security

    Sponsored by: IBM

    This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.

  • Empowering Information Security with Desktop Virtualization

    Sponsored by: Citrix

    In this paper, CSO explores why desktop virtualization should be core to your information security foundation.

  • Blog: DevOps for the mainframe

    Sponsored by: IBM

    Learn the basics of DevOps and important information you need to know in order to create a successful strategy.

  • How to Secure Your Microsoft SharePoint Products

    Sponsored by: Thawte Inc.

    This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.

  • The Ten Must Haves for Secure Mobile Device Management

    Sponsored by: Zenprise

    Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.

  • Mobile Security Solutions: Securing & Leveraging Mobile Devices

    Sponsored by: Entrust, Inc.

    This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.

  • Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process

    Sponsored by: IBM

    In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives.

  • State of Software Security Report Volume 4

    Sponsored by: Veracode, Inc.

    Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.

  • Presentation Transcript: Are your applications cloud-ready?

    Sponsored by: IBM

    This presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud.

  • Presentation Transcript: How Security is Well Suited for Agile Development

    Sponsored by: IBM

    View this presentation transcript as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and learn how security is linked to the software development lifecycle.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.