ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security White Papers

  • SIG - AV-TEST: DNS-Layer Protection and Secure Web Gateway Security Efficacy Test Results

    Sponsored by: Cisco Umbrella

    AV-TEST is an independent research institute for IT security. In November and December 2019, AV-TEST performed a review of Cisco cloud security solutions alongside comparable offerings. The test was commissioned by Cisco to determine the malware protection and phishing block capabilities of all vendors. Read this report to see the results.

  • SD-WAN Overview

    Sponsored by: Arrow

    30% - 50% of large enterprise traffic is shifting to the cloud, making traditional WAN suboptimal. With the heightened need for cloud apps, bandwidth and security, SD-WAN may be the only way your organization will be able to keep up. Take a look at SD-WAN for Dummies to read in-depth on the functionality and cost-saving benefits of SD-WAN.

  • SASE For Dummies

    Sponsored by: Cisco Umbrella

    Today’s IT teams must securely enable roaming users, devices, and SaaS apps without adding complexity or reducing performance. Likewise, they must develop strategies to protect users from a variety of evolving threats. Read this e-book to examine the changing network and security landscape and steps you can take to keep your organization secure.

  • SIG - Farm Credit Customer Story

    Sponsored by: Cisco Umbrella

    Farm Credit needed to keep customer data secure while protecting its distributed, highly mobile workforce from threats no matter where employees were. They wanted a holistic, secure web gateway solution with robust capabilities, early-lifecycle threat mitigation, and seamless integration. Read this case study to go in-depth on their success.

  • TikTok Case Study

    Sponsored by: Lookout

    Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.

  • Security That Works Wherever You Go: Empower Your Workers to Safely Stay Productive

    Sponsored by: Lookout

    IT security professionals have never had their hands fuller than during ‘the new normal’. Cybercriminals see the many hundreds of thousands (if not millions) of remote workers as a breaching buffet, and as a result, organizations need to secure their workforces ASAP. View this brochure to find out how you can keep employees secure wherever they go.

  • Secure, Cloud-Controlled Network to Enable Work From Home

    Sponsored by: CradlePoint

    When organizations plan for employees to work remote, they must consider both security and bandwidth, and uncover ways for these two to be compromised or effortlessly seamed together. Which route does your department choose to go? Do you have plans for edge computing? Browse this solution brief to learn more about modernizing your network.

  • Securing Assets Using Micro-Segmentation: A SANS Review of Guardicore Centra™

    Sponsored by: Guardicore

    With the increasing complexity and interconnectivity of organizational environments, IT professionals are left to wonder how to prevent the threat of network attacks. Enter microsegmentation: a network security architecture that laterally moves unapproved connections. Fewer permissions, less vulnerability. Dive into this SANS report to learn more.

  • The Benefits of a Software Defined Secure Branch with Versa Networks

    Sponsored by: Verizon

    Branch or remote office network architectures have barely changed for more than 15 years, but what is required of them has significantly evolved. Today’s digital enterprises require a network landscape that is agile, intelligent, secure and reduces operational complexity while being cost-effective. This white paper reveals what you may be missing.

  • Workload Security: Visibility and Analysis for Cloud and Container Workloads

    Sponsored by: Lacework

    The modern cloud infrastructure requires a shift in the approach to workload security. Download this solution brief to learn more about Lacework’s automated approach to enabling visibility and analysis for cloud and container workloads.

  • Jitterbit Secures Dynamic Cloud Environment, Containers, and Microservices at Scale.

    Sponsored by: Lacework

    In this case study, discover how Jitterbit, and API service provider, was able to address issues related to monitoring activity within their expanding platform by partnering with Lacework to enable holistic activity tracking, streamlined compliance reporting and comprehensive security – without disruption.

  • Wavefront Secures DevOps Environments at Scale with Lacework

    Sponsored by: Lacework

    Due to the continually changing nature of their public cloud environment, Wavefront was facing visibility and security issues related to detecting and tracking vulnerabilities and threats. Download this white paper to see what led to their partnership with Lacework, as well as the results.

  • Carson Living Secures Rapidly Growing Cloud Environment

    Sponsored by: Lacework

    Due to the rapid growth in adoption (400% in the past year) of their AWS-hosted application, Carson Living was facing issues related to ensuring cloud compliance and maintaining security configurations. Download this white paper to see what led to their partnership with Lacework, as well as the results.

  • CIO Trends #11: Benelux

    Sponsored by: ComputerWeekly.com

    The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.

  • Why AWS + Auth0

    Sponsored by: Auth0

    Implementing the right IAM or customer IAM tool in your AWS ecosystem requires thoughtful planning. This 52-page white paper provides a comprehensive collection of expertise, best practices and project planning insights for using AWS & Auth0 to set up an API gateway and protect your critical applications.

  • Mistakes to Love: A Survey of Identity Mistakes

    Sponsored by: Auth0

    For leading application development teams, there seems to be debate around buying vs building. The following report provides in-depth insights from a survey into the successes and failures of identity professionals across their identity projects – both bought and build. Read on to unlock the key findings.

  • Web and Mobile Application Security Testing Solution Brief

    Sponsored by: WhiteHat Security

    According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.

  • The Maturity of Zero Trust in Europe

    Sponsored by: Okta

    While only 18% of organizations in Europe have a defined strategy along Zero Trust principles, 93% of European organizations polled had implemented at least one security solution that mapped to a Zero Trust strategy. How does your organization compare regarding Zero Trust? View this infographic to learn how Europe is enhancing security.

  • 2020: The State of Endpoint Resilience Report

    Sponsored by: Absolute Software Corporation

    In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.

  • Identity as a Service for Dummies

    Sponsored by: Okta

    According to the Okta 2020 “Businesses @ Work” report, the average number of apps per organization is currently 88, and the growth rate over the past 3 years has been 21 percent. Using this helpful guide, learn how companies are leveraging IDaaS to make IAM more scalable, more flexible and more cost effective.

  • 5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile

    Sponsored by: NowSecure

    Dynamic Application Security Testing (DAST) plays a critical role in any mobile app security and privacy program. However, long-held misconceptions create confusion, leading to slower and infrequent testing. Read this article to bust 5 common misconceptions about DAST for mobile.

  • 12 Reasons Why You Need Stronger Mobile App Security

    Sponsored by: NowSecure

    Whether it’s for internal communication, enhancing customer experience or part of a digital transformation initiative, mobile applications play a critical role and ensuring their protection is paramount. Download this infographic to discover 12 reasons why organizations need stronger mobile app security strategies.

  • How to Ensure NIAP Mobile Application Compliance

    Sponsored by: NowSecure

    Mobile applications allow for improved business operations and more seamless experience. However, for federal agencies, the heavy burden of ensuring each app meets the National Information Assurance Partnership (NIAP) security requirements causes a massive roadblock. Download this white paper to learn ease this headache.

  • Get Started with Application Security in 3 Easy Steps

    Sponsored by: Micro Focus

    It’s a common misconception that application security strategies are inherently disruptive to productivity. As organization rely more on apps for communication, security becomes paramount. The following guide provides 3 easy steps to help you get started with application security, read on to get started.

  • Six Steps to Comprehensive Container Security in AWS

    Sponsored by: Trend Micro

    Containers grant developers the power to create and deliver applications faster and more consistently. But, as with any technology, there’s a catch. Containers can also increase infrastructure complexity, which in turn leads to overlooked security gaps. In this guide, find 6 steps you can take toward comprehensive container security in AWS.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.