IT Management  >   Systems Operations  >   Security  >  

Internet Applications Security

RSS Feed    Add to Google    Add to My Yahoo!
Internet Applications Security White Papers (View All Report Types)
 
Getting a handle on mobile devices – securely, reliably and tidily
sponsored by Matrix42
WHITE PAPER: Mobile access to data and applications is now the rule rather than the exception. This trend has notably spurred thegenesis of both web and SaaS applications, which are used on a daily basis by allcompanies of all sizes nowadays. This technological progress is confronting both IT professionals and ordinary users with new problems.
Posted: 18 Mar 2016 | Published: 30 Dec 2015

Matrix42

How Modern Access Security Works
sponsored by Ping Identity Corporation
WHITE PAPER: Review the 4 important differences between federated access management and traditional WAM and uncover why WAM has failed now that apps have moved on from a web-only environment. Read on to learn the 5 key benefits of modern access security.
Posted: 22 Oct 2015 | Published: 07 Oct 2015

Ping Identity Corporation

Strategies for Web and API Access Management
sponsored by Ping Identity Corporation
WHITE PAPER: In this white paper, you'll learn about next-gen identity standards and requirements and how to secure access to apps - regardless of their environment.
Posted: 27 Oct 2015 | Published: 14 Jul 2014

Ping Identity Corporation

Building the Business Case for Modern Access Management
sponsored by Ping Identity Corporation
WHITE PAPER: Discover the 4 questions you need to consider when building your IAM strategy to protect users, customers, third-parties, and sensitive data.
Posted: 22 Oct 2015 | Published: 07 Oct 2015

Ping Identity Corporation

Enterprise Management Associates Report-- The Power of AppScan: A Hands-On Review of IBM Rational AppScan Standard Edition
sponsored by IBM
WHITE PAPER: In a hands-on look at IBM Rational AppScan Standard Edition, the Enterprise Management Associates® (EMA™) team finds in the product an easily implemented, highly configurable utility that addresses multiple application security pain points.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

IBM

Web Application Security: How to Minimize the Risk of Attacks
sponsored by Qualys
WHITE PAPER: This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Posted: 26 Jul 2012 | Published: 26 Jul 2012

Qualys

IBM Rational and the Financial Services Sector
sponsored by IBM
WHITE PAPER: Financial services institutions (FSIs) are under tight pressure to reduce cost and risk in the business while improving profitability and enhancing customer satisfaction. But achieving these goals can be a daunting task.  View this paper to explore a systematic approach and key recommendations that FSI should invest in to help tackle these goals.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

IBM

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

The Industrialization of Hacking
sponsored by Imperva
WHITE PAPER: The industrialization of hacking coincides with a critical shift in what's considered today's prized commodity: data. Read this paper to find out more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

Imperva’s Web Application Attack Report
sponsored by Imperva
WHITE PAPER: Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 22 Sep 2011 | Published: 01 Jul 2011

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement