IT Management  >   Systems Design and Development  >   Application Development  >  

Developing Secure Applications

RSS Feed    Add to Google    Add to My Yahoo!
Developing Secure Applications White Papers (View All Report Types)
Application Security: Evaluate Leading Testing Vendors
sponsored by IBM
WHITE PAPER: This Gartner resource compares 19 leading application security testing solution vendors, revealing the strengths and weaknesses of each one. View now and discover how the vendors performed in areas like product quality, sales execution and pricing, and customer experience.
Posted: 11 Mar 2016 | Published: 06 Aug 2015


Executive Guide: Safely Adopting Office 365
sponsored by Symantec + Blue Coat
WHITE PAPER: To safely and effectively adopt 0ffice 365, you must budget and plan for additional security measures and you will probably need to provision up to accommodate higher internet traffic volumes. This executive guide provides key security and provisioning considerations to keep in mind during your move to Office 365.
Posted: 12 Oct 2016 | Published: 31 Aug 2016

Symantec + Blue Coat

Blog: DevOps for the mainframe
sponsored by IBM
WHITE PAPER: Learn the basics of DevOps and important information you need to know in order to create a successful strategy.
Posted: 18 Oct 2013 | Published: 18 Apr 2013


10 Tips for Mobile Application Security
sponsored by Dell SecureWorks
WHITE PAPER: While the rapid growth of mobility has enabled increased customer satisfaction, operational efficiencies, employee productivity and more; it has also introduced a number of new security challenges. In this paper, uncover 10 must-know tips for deploying secure mobile applications to help you leverage mobility while keeping the bad guys out.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell SecureWorks

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013


Sharks in the AppPool: Managing Your Web Presence While Protecting the Hosting Resources You Pay For
sponsored by Verio
WHITE PAPER: This white paper details hosting best practices, discussing the advantages associated with the use of isolated, rather than shared, AppPools in a Windows-based hosting environment.
Posted: 27 Aug 2007 | Published: 01 Sep 2006


Enterprise Mobility Best Practices: MDM, Containerization or Both?
sponsored by vmware airwatch
WHITE PAPER: In this white paper, you will learn why both MDM and application-level management are still relevant for device deployments, providing additional functionality and security.
Posted: 18 Sep 2015 | Published: 18 Sep 2015

vmware airwatch

Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER: Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006


State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

Powering Disaster Recovery in the Cloud
sponsored by Commvault
WHITE PAPER: In this white paper, you will learn more about the challenges organizations face with it comes to DR, and how the cloud can come to the rescue of your organization. Read on to find out how to securely store customer data in the public cloud while fending off security concerns.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement