ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Application Security Research

  • E-Book: Technical Guide on Combatting Emerging Web Threats

    Sponsored by: TechTarget Security

    Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.

  • Security Threat Report: Mid-year 2010

    Sponsored by: Sophos

    Halfway through 2010, cybercrime continues to evolve and grow. As social networking becomes ever more deeply embedded in our lives, it has become an ever more fertile hunting ground for those who would steal and abuse our personal information. Knowledge is power, and understanding the dangers posed is the first step toward keeping safe and secure.

  • IT@Intel Brief: Enterprise Security Benefits of Microsoft Windows 7

    Sponsored by: Intel

    Read this solution brief to learn how Microsoft Windows 7 provides enterprise information security and protects against malware and phishing. This paper discusses all the key features.

  • Cloud Computing for the Enterprise-- Part 3: Using WebSphere CloudBurst to Create Private Clouds

    Sponsored by: IBM

    Read this article to get an introduction to WebSphere CloudBurst and WebSphere Application Server Hypervisor Edition and discover how these new offerings bring the significant advantages of private cloud computing to WebSphere enterprise environments.

  • Deep Security 7.5

    Sponsored by: Trend Micro, Inc.

    Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.

  • Database Security: Audit and Protect Critical Databases

    Sponsored by: Imperva

    Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.

  • The Right Tool for the Right Job: An Application Security Tools Report Card

    Sponsored by: IBM

    This white paper examines the most common tools found in the enterprise application security environment.

  • Integrating IBM WebSphere Portal and IBM Mashup Center Software

    Sponsored by: IBM

    This white paper outlines the potential integration options between IBM WebSphere® Portal and IBM Mashup Center software. Organizations can implement these integration options to achieve greater flexibility while lowering costs.

  • Total Economic Impact™ of Trend Micro Enterprise Security

    Sponsored by: Trend Micro, Inc.

    The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.

  • Data Protection Solutions at Midsize Organizations

    Sponsored by: Trend Micro, Inc.

    In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.

  • NetScaler VPX: Harness the Power of Virtualized Web App Delivery

    Sponsored by: Citrix

    This technical white paper shows you how the NetScaler VPX virtual appliance offers maximum physical, functional, and operational flexibility for delivering web apps. Learn how virtual application delivery controllers can unleash the power of a virtualized dynamic data center! Compliments of Citrix.

  • Technology Audit: Imperva SecureSphere Data Security Suite

    Sponsored by: Imperva

    Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.

  • Data Sheet: Trend Micro Deep Security 7

    Sponsored by: Trend Micro

    This data sheet outlines the benefits of Trend Micro Deep Security, which provides server security in physical, virtual, and cloud computing environments. This comprehensive solution also protects applications, operating systems, web applications, and enterprise systems from attacks.

  • Beating Web Application Security Threats

    Sponsored by: Thawte Inc.

    The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.

  • Managing a Growing Threat: An Executive’s Guide to Web Application Security

    Sponsored by: IBM

    Cyber-criminals are leveraging relatively simple application exploits to gain access to sensitive information for fun and profit. It’s more important than ever to implement secure application strategies to effectively protect your business. Read this guide to learn more.

  • Staying a Step Ahead of the Hackers: The Importance of Identifying Critical Web Application Vulnerabilities

    Sponsored by: IBM

    Security managers worldwide working for midsize or large organizations share a common goal: to better manage the risks associated with their business infrastructure. This session discusses new and emerging network and application security attacks and ways organizations can protect themselves against Web application and network security threats.

  • Presentation Transcript: Three Reasons Why Security Fails and What to Do About It

    Sponsored by: Sophos

    Web security seems to get tougher every year. Dynamic content, user generated content, and social networking increase the complexity of securing hosted web servers. Read this presentation transcript to learn about the latest web threats, which ones to be most concerned with, and what IT pros should do to help prevent them.

  • Information Security - IT Decision Checklist: Application Security

    Sponsored by: Ounce Labs, an IBM Company

    Standards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer.

  • E-Book: Protecting Against Web Threats

    Sponsored by: TechTarget Security

    Some organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social Networking policies.

  • Web Content Control: Five Steps to a Successful Implementation

    Sponsored by: Untangle, Inc.

    Implementing Web Content Control can seem intimidating. It represents the uneasy marriage of network administration and human resource management. With a little forethought, however, it becomes straightforward and very effective. Read this whitepaper for a step-by-step overview of a successful web content control implementation.

  • Why Traditional Anti-Malware Solutions Are No Longer Enough

    Sponsored by: AVG Technologies USA, Inc.

    Security used to be a straightforward matter. Email was the primary attack vector. Simply installing an anti-virus product and using caution with attachments was enough. Today's threats are rapidly evolving, stealthy, and targeted. Read this paper to find out where your current security solutions may be lacking and how to close that gap.

  • Designing a Strategy for End-to-End Web Protection

    Sponsored by: IBM

    Web applications are extremely flexible and valuable assets to any organization. But they’re also vulnerable to threats like hijacking, splitting, forging and injection. Read this white paper to find out how IBM Rational® AppScan® solutions can help your agency overcome virtual threats to achieve mission objectives.

  • Understanding Why Web Application Security is Critical to Business

    Sponsored by: Sirius Computer Solutions

    This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.

  • Security Threat Report: July 2009 Update

    Sponsored by: Sophos

    Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  • Security Threat Report: July 2009 Update

    Sponsored by: Sophos

    Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.