IT Management  >   Systems Design and Development  >   Application Development  >  

Developing Secure Applications

RSS Feed    Add to Google    Add to My Yahoo!
Developing Secure ApplicationsReports
 
Large Financial Services Firm Passes Its PCI Audit— and Implements an Ongoing Governance Program
sponsored by Veracode, Inc.
CASE STUDY: A large financial services firm sought help with a one-time project to pass its payment card information (PCI) audit. View this case study now to see how this financial firm decided on continuous analysis, and the advantages they saw as a result. Also learn about a software system that achieves this without acquiring more servers.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

Taming Shadow IT
sponsored by BitGlass
WHITE PAPER: This white paper offers an in-depth guide book to IT security in regards to cloud computing and applications.
Posted: 21 Oct 2014 | Published: 21 Oct 2014


How to Secure Your Microsoft SharePoint Products
sponsored by Thawte Inc.
EGUIDE: This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013

Thawte Inc.

Presentation Transcript: Are your applications cloud-ready?
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

IBM

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

Veracode eLearning Subscription
sponsored by Veracode, Inc.
TRAINING GUIDE: Veracode’s eLearning contains over 30 hours of secure training content in a web-based training module format. The program is designed specifically for developers and security personnel to meet formal training and competency testing requirements. It also contains a comprehensive knowledgebase on secure software development. Read on to learn more.
Posted: 07 May 2010 | Published: 07 May 2010

Veracode, Inc.

Mobilizing Business Applications with McAfee
sponsored by McAfee.
WHITE PAPER: Before mobilising your applications to improve business performance, you must address the number of management and security concerns around it. In this paper, discover how McAfee Enterprise Mobility Management (McAfee EMM) can provide you the foundation necessary for your application mobilisation initiatives.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

McAfee.

Webcast: How Security is well suited for Agile development
sponsored by IBM
WEBCAST: View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.
Posted: 15 Jun 2011 | Premiered: Jun 15, 2011

IBM

Optimize Business and IT With New Generation Application Lifecycle Management
sponsored by SAP Community Network
WEBCAST: This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 15 Sep 2009 | Premiered: Sep 30, 2009, 12:00 EDT (16:00 GMT)

SAP Community Network

Presentation Transcript: Path to a Secure Application
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement