IT Management  >   Systems Design and Development  >   Application Development  >  

Developing Secure Applications

RSS Feed    Add to Google    Add to My Yahoo!
Developing Secure Applications White Papers (View All Report Types)
 
10 Tips for Mobile Application Security
sponsored by Dell SecureWorks
WHITE PAPER: While the rapid growth of mobility has enabled increased customer satisfaction, operational efficiencies, employee productivity and more; it has also introduced a number of new security challenges. In this paper, uncover 10 must-know tips for deploying secure mobile applications to help you leverage mobility while keeping the bad guys out.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell SecureWorks

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

Secure at the Source: Implementing Source Code Vulnerability Testing in the Software Development Life Cycle
sponsored by Ounce Labs, an IBM Company
WHITE PAPER: Learn the best models for integrating source code vulnerability testing into the software testing development life-cycle (SDLC) and how to best merge security expertise with development resources.
Posted: 20 Jul 2006 | Published: 19 Jul 2006

Ounce Labs, an IBM Company

Application Security: Evaluate Leading Testing Vendors
sponsored by IBM
WHITE PAPER: This Gartner resource compares 19 leading application security testing solution vendors, revealing the strengths and weaknesses of each one. View now and discover how the vendors performed in areas like product quality, sales execution and pricing, and customer experience.
Posted: 11 Mar 2016 | Published: 06 Aug 2015

IBM

Enterprise Mobility Management Security: How to Score Vendor Fulfillment
sponsored by VMware
WHITE PAPER: This white paper offers the specifics of network connection and BYOD policies, coverage of enterprise-issued mobile devices, and managed security as fulfilled by these vendors.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

The Path to a Secure Application: A Source Code Security Review Checklist
sponsored by Ounce Labs, an IBM Company
WHITE PAPER: Read this white paper to learn a checklist to find and eliminate the source coding errors and design flaws that expose data, threaten operations, and cost your organization time and money.
Posted: 05 Feb 2007 | Published: 01 Feb 2007

Ounce Labs, an IBM Company

Mobilizing Business Applications with McAfee
sponsored by McAfee.
WHITE PAPER: Before mobilising your applications to improve business performance, you must address the number of management and security concerns around it. In this paper, discover how McAfee Enterprise Mobility Management (McAfee EMM) can provide you the foundation necessary for your application mobilisation initiatives.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

McAfee.

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

IBM

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement