IT Management  >   Systems Design and Development  >   Application Development  >  

Developing Secure Applications

RSS Feed    Add to Google    Add to My Yahoo!
Developing Secure Applications Reports
How to Deliver Value, Not Risk, With Your Organization's Mobile Apps
sponsored by IBM
WEBCAST: To insulate your organization from modern security threats and earn the trust of your customers, this webcast explains, you need to bolster your apps against threats from all sides. View now to learn how one platform can address your mobile app security challenges.
Posted: 06 Nov 2015 | Premiered: Sep 2, 2015


The Unified Communications Guide: 6 Ways to Boosting Productivity
sponsored by ThinkingPhones
WHITE PAPER: This white paper highlights 6 key advantages stemming from employing the cloud in your enterprise unified communications (UC). Read on here to see why the cloud isn't just a fad, and can deliver you the following advantages.
Posted: 02 Sep 2015 | Published: 02 Sep 2015


Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

A Guide to Security and Privacy in a Hosted Exchange Environment
sponsored by Intermedia.Net
WHITE PAPER: This white paper will assist you in choosing the right hosted Exchange environment for you, with top-notch provider security. Access this white paper to improve your Exchange experience and get exclusive access to a checklist comparison of hosted Exchange providers' security offerings.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Strategic Mobility: Boosting Operational Productivity for the Oil and Gas Sector
sponsored by Red Hat
WHITE PAPER: In this white paper, you will learn about the opportunities for mobile initiatives to drive efficiency across asset and workforce management, specifically in the competitive oil and gas sector.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Red Hat

The Strategic Impact of Mobile Transformation on Business Value
sponsored by VMware, Inc.
WHITE PAPER: Mobile is not just a device, but a new way of working. This research report reveals the three major themes revealed to be critical for success in mobile transformation, discovered by a recent mobile computing survey of over 500 organizations across the education, healthcare, high tech, and retail sectors.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

VMware, Inc.

Financial MDM: Bringing Secure BYOD to You
sponsored by IBM
WHITE PAPER: This white paper examines the growth of bring your own device (BYOD) culture in financial services, and outlines the host of security challenges IT finance departments face when implementing MDM. Click through to address your financial mobility concerns with a cloud-based solution.
Posted: 13 Aug 2015 | Published: 31 Dec 2014


8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015


MDM Best Practices: Proactive Application Security
sponsored by IBM
WHITE PAPER: Ensuring mobile security now goes beyond MDM and MAM to mobile application lifecycle management (MALM). This white paper reviews MALM best practices for organizations with bring your own device (BYOD) policies.
Posted: 06 Jul 2015 | Published: 26 Dec 2014


Mastering Mobile Application Management: How to Adopt MAM
sponsored by SearchMobileComputing
EBOOK: Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement