IT Management  >   Systems Operations  >   Security  >  

Internet Applications Security

RSS Feed    Add to Google    Add to My Yahoo!
Internet Applications Security White Papers (View All Report Types)
Top 3 Reasons to Deliver Web Apps With App Virtualization
sponsored by Citrix
WHITE PAPER: This white paper discusses three top benefits of browser virtualization with the use of a virtual application management solution, including efficient management, less security risks, and faster-performance. Learn how this solution can provide your enterprise with a simple and secure way to manage your browsers and apps.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Building a Web Application Security Program
sponsored by Qualys
WHITE PAPER: This white paper details how to build a pragmatic web application security program that provides effective security. View now to review the top 12 web app security weak points.
Posted: 12 Oct 2015 | Published: 09 Mar 2009


Mitigating Web Security Risk with SSL Certificates: Benefits and Best Practices
sponsored by Symantec Corporation
WHITE PAPER: This white paper highlights several benefits and best practices when using Secure Sockets Layer (SSL) applications to authenticate users, applications and Web services.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Symantec Corporation

Case Study: Major Financial Institution Defends against High Volume SQL Injection
sponsored by Akamai
WHITE PAPER: Access this resource to learn how a global financial firm kept valuable data safe from an SQL injection attack.
Posted: 09 Nov 2015 | Published: 09 Nov 2015


A Security Champion's Guide to Web Application Security
sponsored by Akamai
WHITE PAPER: Access this resource for tips on ensuring your web applications aren't the weakest link in your enterprise security strategy.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

Simplify Network Management to Control WAN Traffic and Protect SLAs
sponsored by Exinda Networks
WHITE PAPER: In this white paper, you will discover how to strategically add a layer of intelligence to your network to boost performance. Learn how to orchestrate WAN bandwidth to configure all your applications, devices, users, locations, and activities from one management dashboard.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

Exinda Networks

Addressing Single Sign-On Inside, Outside, and Between Organizations
sponsored by Prolifics, A Premier IBM Business Partner
WHITE PAPER: This white paper examines how IBM Tivoli Unified Single Sign-On addresses the needs of organizations for enterprise single sign-on, Web single sign-on, and federated single sign-on.
Posted: 03 Aug 2010 | Published: 29 Dec 2008

Prolifics, A Premier IBM Business Partner

The 10 myths of safe web browsing
sponsored by Sophos, Inc.
WHITE PAPER: Do you and your users practice safe web browsing? Avoid risky sites? Limit time spent online during work hours? Employ a rock-solid internet access policy? Use a secure browser? Have the experience to know a risky site when you see one? If you answered “Yes” to any of these questions, you need to read the rest of this report.
Posted: 05 Oct 2010 | Published: 04 Oct 2010

Sophos, Inc.

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
Posted: 05 May 2014 | Published: 25 Sep 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement