sponsored by ComputerWeekly.com
Posted:  10 Jul 2012
Published:  10 Jul 2012
Format:  PDF
Length:  14  Page(s)
Type:  Analyst Report
Language:  English
ABSTRACT:

 

 By Bob Tarzey and Clive Longbottom

 

This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle.

 

Software applications are an integral part of 21st century business processes. The majority of software is still installed in-house, either as specially developed bespoke applications or commercially acquired packages.

 

However, the proportion of software procured as a service is on the rise, as is the use of mobile apps and open source components.

 

In addition, more and more in-house applications are being web-enabled and exposed to the outside world.

 

Regardless of its origin, the vast majority of software will contain flaws which can constitute a security risk, especially for those applications that are web-enabled.

 

The report draws on new research conducted amongst US and UK enterprises from a range of industries and assesses the scale of the software security problem, the ways in which it can be mitigated, the extent to which this is being achieved, the costs involved and how these can be minimised.

 

 Click on the button below to download this report

 

 

Quocirca is a research and analysis company specialising in the business impact of information technology and communications.






BROWSE RELATED RESOURCES
Firewall Appliances | Hackers | Penetration Testing | Security | Security Best Practices | Security Software | Software | Software Testing | Vulnerability Management

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement