ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Applications Management Research

  • Season 2 Episode 3 Diving into WAF and on Ways to Prevent DDoS

    Sponsored by: Rackspace

    In this episode of ‘CloudSpotting’ by Rackspace, join the hosts as they explore Web Application Firewalls (WAFs) and the business impacts of DDoS. Give the podcast a listen now.

  • CA SiteMinder Migration Guide

    Sponsored by: Okta

    To address issues related to connecting users to apps, organizations adopted services like CA SiteMinder to manage web access. But, as technology evolved, new web access management solutions were needed. In this guide, you’ll learn milestones and best practices for migrating from CA SiteMinder to Okta. Read on to learn more.

  • Application Security: The Easy Way

    Sponsored by: Ionic Security

    Securing internal applications is a top priority among IT security teams. Yet achieving it is time & resource consuming. In fact, 76% of total IT expenditure is spent on securing internal apps. It doesn’t need to be so difficult – this blog post highlights how Ionic’s data-centric Machina Tools may be able to help. Read on to learn more.

  • WAFs Should Do More Than Cover the OWASP Top 10

    Sponsored by: Radware

    As applications become more prevalent in everyday life, they become increasingly attractive targets for hackers. For organizations, securing applications is paramount to avoiding financial, legal and reputational cost. Read on to uncover 4 key application security challenges organizations face, underlining the importance of strong WAFs.

  • Innovative data strategies for smarter predictions

    Sponsored by: Dataiku

    By leveraging a collaborative and flexible AI-based tool, Europcar was able to build a predictive web app as well as dashboards that forecasted market activity at a very granular level. Access this case study to learn more about the technology Europcar used and the positive impact the solution had.

  • The New Era of Fraud: A Bot-Driven Threat

    Sponsored by: F5 Networks

    With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. This article highlights the many faces of fraud and some of the common tactics used to detect and prevent attacks. Read on to learn more.

  • Web Application Firewall Vendor Comparison Report

    Sponsored by: Barracuda

    The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.

  • Courier Prevents Shipping Fraud

    Sponsored by: Shape Security

    A top 5 global courier wanted to protect its customers from account takeover and prevent fraudulent account creation. In this case study, learn how the provider was able to do this by deploying Shape Enterprise Defense across its login and account creation applications on both the web and mobile devices.

  • Malware: The Ubiquitous Menace

    Sponsored by: The Media Trust

    Every day seems to bring news of web-based malware attacking another popular, highly trafficked website, causing harm to visitors and tarnishing the site owner's reputation and bottom line. In this white paper, learn how IT and SOC managers can protect their customers and employees by addressing security gaps on the front-end of their website.

  • App Dev Trends to Watch in 2019

    Sponsored by: Magenic

    Technologies from cloud-native development, to container-based development and deployment, serverless computing, and more have made waves in 2018. But where does the future of these technologies lie as we head into the new year?

  • AO.com, When It's Time for a Change

    Sponsored by: Cloudflare

    AO.com is the largest online-only electricals retailer in the UK, and wanted to achieve better site performance across all of their web domains. Read this white paper to find out why AO decided on Cloudfare to help optimize their sites, and see how Cloudfare helped reduce web page sizes by 50%.

  • Why Web Performance Matters

    Sponsored by: Cloudflare

    Watch this webinar to see how Cloudflare can help accelerate web performance using their 150+ data centers around the world, and see a demonstration from Catchpoint on how to use their synthetic monitoring platform.

  • The Beginner's Guide to Threat Hunting

    Sponsored by: DomainTools

    Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.

  • SANS Fingerprinting Threat Actors with Web Assets

    Sponsored by: DomainTools

    Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.

  • Making the case for the cloud in common use airport technology

    Sponsored by: ComputerWeekly.com

    This report from Amadeus looks at the business case for cloud computing in airports.

  • Designing a Modern Enterprise Architecture

    Sponsored by: Metavine

    In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.

  • Modern Mobility E-zine: February 2016

    Sponsored by: SearchMobileComputing

    In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Enterprise Mobility Management E-Book Part 2

    Sponsored by: SearchMobileComputing

    In part 2 of this Enterprise Mobility Management e-book, discover the ins and outs of mobile device management, including how Exchange ActiveSync is as valuable as an MDM tool, using MDM for iOS, and using MDM for Android. In addition, learn about remote Windows desktop apps and web apps as they relate to mobility.

  • New Considerations for Application Integration

    Sponsored by: TheServerSide.com

    This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.

  • Protect People, Processes and Technology from Web Application Threats

    Sponsored by: IBM

    Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.

  • Developing Mobile Applications for the Cloud, with the Cloud

    Sponsored by: IBM

    In this e-guide, experts define the key differences between native, hybrid, Web and cloud mobile applications, and they highlight best practices for testing and developing them. Learn how mobile development teams are finding success by leveraging cloud-based products such as PaaS, SaaS and IaaS services.

  • How a Top E-Commerce Strategy Leads to Strong Sales

    Sponsored by: ZeroLag Communications Inc.

    In this e-guide, Brian K. Walker of Forrester and other experts provide six key factors that can make or break a customer's shopping experience and, ultimately, an e-commerce business.

  • Introducing Big Data Repository/Reporting to Support Web Analytics and User-Centric APM

    Sponsored by: Dell Software

    Learn the capabilities of Dell™ Foglight™ Application Performance Monitoring (APM) 5.9, and how the deep visibility into transaction flows and User Experience capitalize on innovative Big Data Technology.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.