IT Management  >   Systems Operations  >   Applications Management  >  

Web Applications Management

RSS Feed    Add to Google    Add to My Yahoo!
Web Applications ManagementWhite Papers (View All Report Types)
76 - 100 of 109 Matches Previous Page  | Next Page
NetScaler VPX: Harness the Power of Virtualized Web App Delivery
sponsored by Citrix
WHITE PAPER: This technical white paper shows you how the NetScaler VPX virtual appliance offers maximum physical, functional, and operational flexibility for delivering web apps. Learn how virtual application delivery controllers can unleash the power of a virtualized dynamic data center! Compliments of Citrix.
Posted: 08 Jun 2010 | Published: 08 Jun 2010

Citrix

Features of a Comprehensive Application Security Solution
sponsored by Citrix
WHITE PAPER: This white paper discusses the features of a comprehensive application security solution.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

Citrix

The Industrialization of Hacking
sponsored by Imperva
WHITE PAPER: The industrialization of hacking coincides with a critical shift in what's considered today's prized commodity: data. Read this paper to find out more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

Technology Audit: Imperva SecureSphere Data Security Suite
sponsored by Imperva
WHITE PAPER: Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

Application Awareness for Service Providers
sponsored by BlueCoat
WHITE PAPER: Managed Service Providers (MSPs) can inject application awareness into their services as their next value-add and as a critical differentiator. Anyone offering managed services, either on-premise, in the cloud or as a hybrid solution, must build application awareness into their infrastructures from the bottom up.
Posted: 11 May 2010 | Published: 11 May 2010

BlueCoat

Managing a Growing Threat: An Executive’s Guide to Web Application Security
sponsored by IBM
WHITE PAPER: Cyber-criminals are leveraging relatively simple application exploits to gain access to sensitive information for fun and profit. It’s more important than ever to implement secure application strategies to effectively protect your business. Read this guide to learn more.
Posted: 12 Mar 2010 | Published: 17 Dec 2007

IBM

Staying a Step Ahead of the Hackers: The Importance of Identifying Critical Web Application Vulnerabilities
sponsored by IBM
WHITE PAPER: Security managers worldwide working for midsize or large organizations share a common goal: to better manage the risks associated with their business infrastructure. This session discusses new and emerging network and application security attacks and ways organizations can protect themselves against Web application and network security threats.
Posted: 10 Mar 2010 | Published: 01 Sep 2008

IBM

Roadmap for Effective Performance Monitoring at a Reduced Cost
sponsored by Neustar®
WHITE PAPER: This document provides a roadmap for web delivery teams to reduce operational expenditures, and shows how to improve the effectiveness of critical information required for decision-making for Internet services.
Posted: 11 Feb 2010 | Published: 11 Feb 2010

Neustar®

Web Application Security for a Smarter Planet
sponsored by IBM
WHITE PAPER: As threats to Web applications continue to grow, IBM offers Web application security for a smarter planet—integrated, end-to-end security to build secure Web applications, run secure Web applications and protect SOA environments.
Posted: 28 Oct 2009 | Published: 09 Jul 2009

IBM

Designing a Strategy for End-to-End Web Protection
sponsored by IBM
WHITE PAPER: Web applications are extremely flexible and valuable assets to any organization. But they’re also vulnerable to threats like hijacking, splitting, forging and injection. Read this white paper to find out how IBM Rational® AppScan® solutions can help your agency overcome virtual threats to achieve mission objectives.
Posted: 27 Oct 2009 | Published: 10 Jul 2009

IBM

Hosted VoIP Reduces Costs and Improves Efficiencies for Small Business
sponsored by 8x8, Inc.
WHITE PAPER: Read this brief yet informative paper to learn how hosted VoIP can benefit your small business.
Posted: 09 Sep 2009 | Published: 11 Aug 2009

8x8, Inc.

Web application security: automated scanning versus manual penetration testing
sponsored by IBM
WHITE PAPER: There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods.
Posted: 09 Sep 2009 | Published: 01 Jan 2008

IBM

The Dirty Dozen: Preventing Common Application-Level Hack Attacks
sponsored by IBM
WHITE PAPER: This paper describes 12 of the most common hacker attacks and provides basic rules that you can follow to help create more hack-resistant Web applications.
Posted: 09 Sep 2009 | Published: 01 Dec 2007

IBM

The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success
sponsored by Breach Security
WHITE PAPER: This resource provides IT security professionals with the information needed to understand PCI compliance and specifically, one of the standard's latest requirements, 6.6. In addition, the paper offer tips for successful PCI 6.6 compliance and highlights compliance successes from real-world companies.
Posted: 14 Aug 2009 | Published: 08 Jun 2009

Breach Security

Load Testing 2.0 - The Next Generation of Load Testing for the Web 2.0 World
sponsored by Gomez
WHITE PAPER: Read this paper to learn why Load Testing 2.0 solutions are needed and who benefits. Learn best practices to get business value out of advanced load testing features, the limits of load testing 1.0 solutions, how today's approach complements existing 1.0 solutions, and what factors are important for selecting successful Load Testing 2.0 solutions.
Posted: 09 Jul 2009 | Published: 09 Jul 2009

Gomez

Reducing TCO for Web-Based Applications
sponsored by Hewlett Packard Company and Intel
WHITE PAPER: Servers based on the Intel® Xeon® processor 5500 series deliver both intelligent performance and energy efficiency. Migrating to this platform can enable server consolidation in the deployment of database-driven Web applications, resulting in operational cost savings that far exceed the cost of server refresh. Read on to learn more.
Posted: 08 Jul 2009 | Published: 08 Jul 2009

Hewlett Packard Company and Intel

Managing Application Performance to Achieve Mission Success
sponsored by CA Technologies.
WHITE PAPER: The reliance on web-based applications in government organizations has significant consequences. Success depends on end users' ability to interact well with their web applications. The key to success is an application performance management strategy that monitors end-user experiences and application performance from a transaction perspective.
Posted: 29 Apr 2009 | Published: 01 Feb 2008

CA Technologies.

Seven Design Requirements for Web 2.0 Threat Protection
sponsored by McAfee, Inc.
WHITE PAPER: Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements.
Posted: 23 Apr 2009 | Published: 02 Apr 2009

McAfee, Inc.

Web Application Security - How to Minimise Prevalent Risk of Attacks
sponsored by Qualys
WHITE PAPER: Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options.
Posted: 27 Mar 2009 | Published: 02 Mar 2009

Qualys

Think You Have an Application Delivery Strategy?: The Role of Application Delivery Services Within the Enterprise
sponsored by Akamai Technologies
WHITE PAPER: Read this white paper to learn about the importance of network performance in optimizing all IP-based applications as well as web-based applications. Optimizing application traffic flows can only be achieved by subscribing to an Application Delivery Service (ADS) offered by a managed service provider.
Posted: 09 Feb 2009 | Published: 09 Feb 2009

Akamai Technologies

Avoiding Data Center Costs through Managed Application Delivery Services: Getting the Computing Resources You Need with Minimal Investment
sponsored by Akamai Technologies
WHITE PAPER: In this white paper, Stratecast identifies operating and capital expenses associated with traditional data center options, including private data centers, co-located options, and managed hosting. The cost data will provide a valuable baseline for enterprises to compare against alternatives such as Akamai's dynamic Web acceleration services.
Posted: 09 Feb 2009 | Published: 09 Feb 2009

Akamai Technologies

PCI DSS Success: Archiving Compliance and Increasing Web Application Availability
sponsored by Citrix
WHITE PAPER: This paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc..
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

The Impact of AJAX on the Network
sponsored by F5 Networks
WHITE PAPER: Though AJAX has a unique impact on the client, server, and the network, these challenges are addressed by existing, proven application delivery methods that address similar challenges arising from other technologies.
Posted: 28 Apr 2008 | Published: 01 Mar 2007

F5 Networks

Improving End-User Performance by Eliminating HTTP Chattiness
sponsored by F5 Networks
WHITE PAPER: Many organizations embark on global multi-million dollar web application deployments only to later discover that their users are unsatisfied with the performance compared to their old client server application. This paper provides alternatives.
Posted: 28 Apr 2008 | Published: 01 Apr 2007

F5 Networks

End-User Monitoring: Gaining Visibility into Hidden Business Risks
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how to implement effective end-user transaction monitoring and management to attain greater visibility into the user experience.
Posted: 18 Sep 2007 | Published: 01 Aug 2007

CA Technologies.
76 - 100 of 109 Matches Previous Page    2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement