IT Management  >   Systems Design and Development  >   Application Development  >  

SDL

RSS Feed    Add to Google    Add to My Yahoo!
SDL White Papers (View All Report Types)
 
How IoT Is Making Security Imperative for All Embedded Software
sponsored by Programming Research
WHITE PAPER: This resource discusses the unique challenges of securing embedded applications and explains how to overcome these obstacles with static code analysis tools. Discover how you can identify and eliminate defects earlier on in the development cycle.
Posted: 10 Mar 2016 | Published: 10 Mar 2016

Programming Research

Internet of Things: Overcoming New Security Challenges
sponsored by IBM
WHITE PAPER: As threats targeting connected devices continue to grow, Internet of Things (IoT) systems need a way to function securely even when one or more devices have been compromised. Discover best practices for IoT security throughout the system lifecycle, from development through to operations and maintenance.
Posted: 22 Mar 2016 | Published: 30 Apr 2015

IBM

Open source: What developers and security pros need to know
sponsored by Black Duck Software
WHITE PAPER: Whether you're a developer or security professional, get a firm grip on open source software management, compliance and security risks and solutions you need to know to keep your company safeguarded.
Posted: 22 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Developing, Deploying, and Monitoring Mobile Apps with the Cloud
sponsored by Oracle Corporation
WHITE PAPER: This white paper explores how you can streamline mobile application development with cloud services. Discover how to extend and secure your mobile apps, connect new mobile apps to existing integration and security services, deploy apps in the cloud while diagnosing performance and usage, and more.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Oracle Corporation

Developing Secure Embedded Software: Quality Doesn't Equal Security
sponsored by Programming Research
WHITE PAPER: This white paper debunks 4 common misconceptions about software security and describes a variety of tools to improve embedded software security by detecting issues earlier on in development. Learn about the benefits of strategies like risk and threat management, application lifecycle management, static code analysis, and more.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

Case Study: Building a Mobile First Future
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how one company shifted to a mobile first approach with an enterprise mobility management (EMM) strategy that allows it to create, manage and secure a wide range of mobile apps.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

MobileIron

Security Breaks DevOps – Here’s How to Fix It
sponsored by CloudPassage
WHITE PAPER: This webcast presents the key ingredients your security strategy needs in order to secure and accelerate DevOps.
Posted: 20 Jan 2016 | Published: 14 Jul 2015

CloudPassage

Mobilizing Business Applications with McAfee
sponsored by McAfee.
WHITE PAPER: Before mobilising your applications to improve business performance, you must address the number of management and security concerns around it. In this paper, discover how McAfee Enterprise Mobility Management (McAfee EMM) can provide you the foundation necessary for your application mobilisation initiatives.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

McAfee.

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Five Steps to Secure Outsourced Application Development
sponsored by Veracode, Inc.
WHITE PAPER: Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development.
Posted: 10 May 2010 | Published: 10 May 2010

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
SDL White Papers | SDL Multimedia | SDL IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement