IT Management  >   Systems Operations  >   Security  >  

Internet Application Security

RSS Feed    Add to Google    Add to My Yahoo!
Internet Application Security White Papers (View All Report Types)
 
Technology Offers Convenience, Privacy Pays the Price
sponsored by Global Knowledge
WHITE PAPER: Technology is a wonderful thing, but it comes with a price: your privacy. This white paper can help you learn more about what kind of personal data is collected by web sites and applications, and how to secure your information online.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

Global Knowledge

Security Threat Report: Mid-year 2010
sponsored by Sophos, Inc.
WHITE PAPER: Halfway through 2010, cybercrime continues to evolve and grow. As social networking becomes ever more deeply embedded in our lives, it has become an ever more fertile hunting ground for those who would steal and abuse our personal information. Knowledge is power, and understanding the dangers posed is the first step toward keeping safe and secure.
Posted: 05 Oct 2010 | Published: 04 Oct 2010

Sophos, Inc.

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Cloud Computing for the Enterprise-- Part 3: Using WebSphere CloudBurst to Create Private Clouds
sponsored by IBM
WHITE PAPER: Read this article to get an introduction to WebSphere CloudBurst and WebSphere Application Server Hypervisor Edition and discover how these new offerings bring the significant advantages of private cloud computing to WebSphere enterprise environments.
Posted: 21 Sep 2010 | Published: 21 Sep 2010

IBM

Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010

Imperva

Server and Application Protection - Behind the Lines
sponsored by Trend Micro
WHITE PAPER: For organizations evaluating the benefits of server and application protection systems and making a case for incorporating them into the IT infrastructure, Trend Micro recommends examining nine different areas of business interest. This white paper details these topics and examines Trend Micro server and application protection software.
Posted: 17 Mar 2010 | Published: 01 Feb 2009

Trend Micro

10 Tips for Mobile Application Security
sponsored by Dell SecureWorks
WHITE PAPER: While the rapid growth of mobility has enabled increased customer satisfaction, operational efficiencies, employee productivity and more; it has also introduced a number of new security challenges. In this paper, uncover 10 must-know tips for deploying secure mobile applications to help you leverage mobility while keeping the bad guys out.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell SecureWorks

IBM Rational and the Financial Services Sector
sponsored by IBM
WHITE PAPER: Financial services institutions (FSIs) are under tight pressure to reduce cost and risk in the business while improving profitability and enhancing customer satisfaction. But achieving these goals can be a daunting task.  View this paper to explore a systematic approach and key recommendations that FSI should invest in to help tackle these goals.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

IBM

How Bad Are the Bad Guys? - The Changing Nature of Web Security Threats
sponsored by Webroot
WHITE PAPER: This whitepaper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing, and other forms of remote access that could all potentially increase the attack surface of the organization. Read on to learn more about protecting your organization from emerging Web-based security threats.
Posted: 24 Nov 2009 | Published: 23 Sep 2009

Webroot

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement