IT Management  >   Systems Operations  >   Security  >  

Application Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Application Security Threats Reports
 
Forrester Market Overview: Cloud Workload Security Management Solutions - Automate or Die
sponsored by CloudPassage
WHITE PAPER: This Forrester report is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure. In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria.
Posted: 13 Jan 2016 | Published: 02 Jun 2015

CloudPassage

Beginner's Guide to Open Source Intrusion Detection Tools
sponsored by AlienVault
WHITE PAPER: This guide provides an overview of some of the most popular Open Source IDS tools, along with pros/cons of each.
Posted: 19 Jan 2016 | Published: 06 Jan 2016

AlienVault

Data Theft Prevention: The Key to Security, Growth and Innovation
sponsored by Forcepoint
WHITE PAPER: In this white paper, you will discover how Data Theft Prevention allows you to successfully embrace technological change and new opportunities.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Forcepoint

6 Keys to Eliminating SSL Blind Spots: What You Need for SSL Inspection
sponsored by A10 Networks
WHITE PAPER: It is estimated that 67 percent of Internet traffic will be encrypted by 2016, but that won't stop hackers from using it to their advantage. Learn six ways to ensure your network can stand up to malicious traffic with SSL inspection technology.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

A10 Networks

Security Checkup: Diagnose PCI DSS Compliance for Your Hadoop
sponsored by Hortonworks
WHITE PAPER: In this white paper, you will learn how to build PCI compliance into your Hadoop environment. Read this paper to gain all you need to know about Hadoop authentication, perimeter security, customer data protection, and more.
Posted: 12 Feb 2016 | Published: 31 Oct 2015

Hortonworks

Evaluating Standout Services in the Cloud Identity and Access Management Sector
sponsored by SecureAuth
WHITE PAPER: If you're to enforce strict identity management, you must shift your gaze to focus on both internal and external users that want to access apps running on-premise or in the cloud. In this report, you will focus your efforts on how to create strong authentication and risk-based access control empowered by cloud single sign-on.
Posted: 20 Jan 2016 | Published: 31 Mar 2015

SecureAuth

The Insider Threat: From Risk to Detection
sponsored by Interset Software Inc.
WHITE PAPER: In this white paper, you will learn the 3 most common types of insider attacks and how to build an effective defense against them.
Posted: 12 Jan 2016 | Published: 30 Dec 2015

Interset Software Inc.

Monitoring that Cloudy Network
sponsored by SearchSecurity.com
EBOOK: Security pros using continuous security monitoring techniques can learn from federal programs, but must also keep up with technical advances like hybrid cloud.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

SearchSecurity.com

Securing the Enterprise with an ADC
sponsored by A10 Networks
WHITE PAPER: To protect web applications, organizations need to deploy the right firewalls. Access this infographic to learn more ways to strengthen security in the enterprise when you secure your data center assets, protect sensitive data with SSL offloading, and more.
Posted: 25 Jan 2016 | Published: 25 Jan 2016

A10 Networks

SANS Critical Security Controls - Accelerated & Simplified
sponsored by AlienVault
WHITE PAPER: The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. Learn how the AlienVault USM platform maps to each of the SANS CSCs.
Posted: 19 Jan 2016 | Published: 30 Dec 2015

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement