IT Management  >   Systems Operations  >   Security  >  

Web-based Application Security

RSS Feed    Add to Google    Add to My Yahoo!
Web-based Application Security White Papers (View All Report Types)
 
Security and Trust: The Backbone of Doing Business Over the Internet
sponsored by Symantec Corporation
WHITE PAPER: Carefully managing consumers' sensitive information is an essential part of online transactions. This informative resource helps you learn how you can gain the trust of your customers and keep their valuable information safe.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Symantec Corporation

Enabling Enterprise 2.0
sponsored by Websense, Inc.
WHITE PAPER: Read this whitepaper to learn ways that organizations can create a strategy that embraces Web 2.0 technologies securely and enables a successful transition to Enterprise 2.0.
Posted: 20 Aug 2009 | Published: 01 Aug 2009

Websense, Inc.

Configuration Auditing – The Next Critical Step in Compliance
sponsored by nCircle
WHITE PAPER: In this paper learn what Configuration auditing entails verifying the configurations of all assets in the environment to make sure they have the correct settings. This includes auditing new assets, monitoring for changes and verifying that planned changes are carried out properly.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

nCircle

Social Networking malware: The dangers facing SMBs
sponsored by GFI Software
WHITE PAPER: View this paper to explore the rise of social networking, the types of malware targeting social platforms, how SMBs can protect themselves against today’s social threats, and more.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

GFI Software

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Controlling Web 2.0 Applications in the Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling Web 2.0 applications in order to discover and mitigate new hidden security threats.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER: This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013

IBM

A Guide to Cyber Crime Security in 2010
sponsored by eEye Digital Security
WHITE PAPER: Internet crime is easy to commit, highly lucrative, and largely under-policed. The cyber crime economy is a vibrant, worldwide market that is spreading at an alarmingly dangerous rate. This whitepaper will cover trends behind internet vulnerabilities as well as the methods and solutions available today to help combat this pandemic.
Posted: 25 Nov 2009 | Published: 25 Nov 2009

eEye Digital Security

How Bad Are the Bad Guys? - The Changing Nature of Web Security Threats
sponsored by Webroot
WHITE PAPER: This whitepaper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing, and other forms of remote access that could all potentially increase the attack surface of the organization. Read on to learn more about protecting your organization from emerging Web-based security threats.
Posted: 24 Nov 2009 | Published: 23 Sep 2009

Webroot

Cloud Computing for the Enterprise-- Part 2: WebSphere sMash and DB2 Express-C on the Amazon EC2 Public Cloud
sponsored by IBM
WHITE PAPER: Read this article to see how IBM WebSphere sMash and IBM DB2 Express-C Amazon Machine Images can be combined to help you deliver Web applications hosted on the Amazon Elastic Compute Cloud (EC2) infrastructure.
Posted: 21 Sep 2010 | Published: 21 Sep 2010

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement