IT Management  >   Systems Design and Development  >   Application Development  >  

Security-related Design

RSS Feed    Add to Google    Add to My Yahoo!
Security-related Design White Papers (View All Report Types)
 
Five Critical Steps to Achieving an Effective App Security Program
sponsored by IBM
WHITE PAPER: This resource provides an overview of the application threats that your organization faces and describes which risks you need to prioritize. Also inside, find five practical steps you can take to build security into your development processes.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

IBM

Enterprise Security Must Move Beyond Building Protective Walls
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper outlines and explores the six steps of the Attack Life Cycle and takes you into the minds of hackers and cybercriminal teams to help you better craft your security strategy. Read on now to learn how to allocate resources so defenses are most appropriate to the risks.
Posted: 13 Apr 2015 | Published: 08 Apr 2015

Hewlett-Packard Company

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

The Evolution of Enterprise Application Security
sponsored by Prevoty
WHITE PAPER: This white paper examines the emergence of application self-protection technologies and why WAFs can't offer true app security despite common perception.
Posted: 13 Apr 2015 | Published: 14 Jan 2015

Prevoty

Solution Brief: Drive More Profit in a Turbulent Market
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper takes an in-depth look at a workflow security solution that was able to deliver rock-solid security. Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Hewlett-Packard Limited

Empower a Mobile Workforce with Secure App Delivery
sponsored by Citrix
WHITE PAPER: Explore how to integrate security into the app development process and deliver secure native-like apps to multiple devices.
Posted: 26 Mar 2015 | Published: 11 Feb 2015

Citrix

Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER: Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Citrix

Blog: DevOps for the mainframe
sponsored by IBM
WHITE PAPER: Learn the basics of DevOps and important information you need to know in order to create a successful strategy.
Posted: 18 Oct 2013 | Published: 18 Apr 2013

IBM

Protecting Data With Secure Collaboration Solutions
sponsored by Dropbox for Business
WHITE PAPER: Access this white paper to learn how a consulting firm evaluated the balance between security and usability for a popular cloud-based file sharing service.
Posted: 30 Mar 2015 | Published: 30 Jan 2015

Dropbox for Business

Mobilizing Business Applications with McAfee
sponsored by McAfee.
WHITE PAPER: Before mobilising your applications to improve business performance, you must address the number of management and security concerns around it. In this paper, discover how McAfee Enterprise Mobility Management (McAfee EMM) can provide you the foundation necessary for your application mobilisation initiatives.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

McAfee.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement