ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Applications Management Research

  • Application Security Stats Flash

    Sponsored by: WhiteHat Security

    API-based applications are more at risk than ever before. As such, there is a critical need for a frequent and periodic analysis of the state of application security. Use this report, AppSec Stats Flash by WhiteHat security, to explore biggest windows of exposure by industry, the most prominent security vulnerabilities and average time-to-fix.

  • Cybersecurity: It's a Team Sport

    Sponsored by: WhiteHat Security

    During the pandemic, cybercrime has quadrupled, leaving many organizations scrambling to strengthen their security posture. In this webinar, learn why it’s more important than ever for vendors, partners and customers to work together and build a true cybersecurity team to combat the evolving threat landscape.

  • How a Northeastern State Strengthened Application Security for their Voter Registration System

    Sponsored by: WhiteHat Security

    Elections are very heavily targeted by threat actors. Troublemakers as they are, these actors will go to great lengths to breach voter privacy, even by accessing user information to impersonate voters. One state recognized this and wanted to ensure the security of their voter registration apps. See this case study to learn how they did it.

  • DDoS Response Guide

    Sponsored by: Radware

    DDoS attacks can flood your network with malicious traffic, bringing applications down and preventing legitimate users from accessing your services. The good news, however, is that there is plenty to be done about it. In this white paper, explore 3 steps that will allow you to minimize the impact of a DDoS attack.

  • Webinar - Say goodbye to threats, network complexity, and inefficiency: New ESG Research

    Sponsored by: Cisco Umbrella

    Threats, network complexity and inefficient tools all drive the need for a new approach to security. With more mobile devices and more cloud access, handling and responding quickly to threats can be hard. If you’re frustrated with endless alerts and inconsistent policy enforcement, watch this webcast to learn a more efficient way to secure users.

  • Designing a Modern Enterprise Architecture

    Sponsored by: Metavine

    In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.

  • Modern Mobility E-zine: February 2016

    Sponsored by: SearchMobileComputing

    In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Enterprise Mobility Management E-Book Part 2

    Sponsored by: SearchMobileComputing

    In part 2 of this Enterprise Mobility Management e-book, discover the ins and outs of mobile device management, including how Exchange ActiveSync is as valuable as an MDM tool, using MDM for iOS, and using MDM for Android. In addition, learn about remote Windows desktop apps and web apps as they relate to mobility.

  • New Considerations for Application Integration

    Sponsored by: TheServerSide.com

    This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.

  • Protect People, Processes and Technology from Web Application Threats

    Sponsored by: IBM

    Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.

  • Developing Mobile Applications for the Cloud, with the Cloud

    Sponsored by: IBM

    In this e-guide, experts define the key differences between native, hybrid, Web and cloud mobile applications, and they highlight best practices for testing and developing them. Learn how mobile development teams are finding success by leveraging cloud-based products such as PaaS, SaaS and IaaS services.

  • How a Top E-Commerce Strategy Leads to Strong Sales

    Sponsored by: ZeroLag Communications Inc.

    In this e-guide, Brian K. Walker of Forrester and other experts provide six key factors that can make or break a customer's shopping experience and, ultimately, an e-commerce business.

  • Introducing Big Data Repository/Reporting to Support Web Analytics and User-Centric APM

    Sponsored by: Dell Software

    Learn the capabilities of Dell™ Foglight™ Application Performance Monitoring (APM) 5.9, and how the deep visibility into transaction flows and User Experience capitalize on innovative Big Data Technology.

  • Four Ways to Modernize Your Application Performance Monitoring Strategy for Web 2.0 and AJAX

    Sponsored by: Dell Software

    Learn how Web 2.0 technologies can increase the speed and efficiency of Web applications, while uniquely combining the best of traditional and modern approaches to deliver a well-rounded application performance monitoring (APM) solution.

  • Web Content Acceleration for Brilliant Storytelling

    Sponsored by: Limelight Networks, Inc.

    This informative guide explores one company's solution to your network performance woes and outlines the benefits of implementation.

  • Drowning in a Sea of Downtime

    Sponsored by: Borland, Micro Focus

    With your reputation, ROI, and revenue on the line, you can't afford downtime. You need a way to safeguard your applications and websites, ensuring top performance 100% of the time. Check out this infographic for more shocking stats about downtime, and discover a performance management technology that helps you on the road to minimal downtime.

  • Discovering Vulnerable Web Applications

    Sponsored by: Qualys

    This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.

  • API Management is the SOA Renaissance

    Sponsored by: IBM

    Forward-thinking organizations are moving to more open ecosystems, relying on service-oriented architecture (SOA) and application programming interfaces (APIs). Access this insightful white paper to learn about combining SOA and API management to create more engaging applications through comprehensive integration.

  • Tolly Test Report: IBM Security Web Gateway Appliance

    Sponsored by: IBM

    This whitepaper details a security solution to sure up the vulnerabilities associated with web application exposure.

  • An Integrated Approach to Managing Application Security

    Sponsored by: IBM

    This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.

  • Protect People, Processes, and Technology From Web Application Threats

    Sponsored by: IBM

    This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.

  • Web CMS Featuring Video Integration

    Sponsored by: e-Spirit AG

    In this resource, learn about a technology that enables integration of web applications into a CMS, so they can be centrally opened and edited, improving efficiency and making better web pages. Specifically, take a look at a video integration module that allows you to easily integrate videos into web pages, online shops and portals.

  • Your Personal Web Attack Survival Guide

    Sponsored by: Imperva

    This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences