IT Management  >   Systems Operations  >   Security  >  

Internet Application Security

RSS Feed    Add to Google    Add to My Yahoo!
Internet Application SecurityReports
 
2013 MarketScope Report for Web Access Management
sponsored by IBM
ANALYST REPORT: This Gartner MarketScope report compares the top Web access management (WAM) vendors on the market today to help you decide which product will best fit your business needs.
Posted: 15 Apr 2014 | Published: 15 Nov 2013

IBM

Not All SOA Gateways Are Created Equal
sponsored by CA Technologies.
WHITE PAPER: Most service-oriented architecture (SOA) gateways offer similar functionality: they address security and performance issues that arise when using XML-based messaging protocols. However, not all SOA gateways are created equal, as the total cost of ownership (TCO) can vary greatly.
Posted: 06 Feb 2014 | Published: 31 Dec 2011

CA Technologies.

A Computer Weekly buyer's guide to testing and code quality
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

PCI Council issues mobile application rules for software developers
sponsored by SearchSecurity.com
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

SearchSecurity.com

Prioritizing WAN Application Delivery Go Beyond WAN QoS
sponsored by Talari Networks
EGUIDE: This E-Guide from SearchEnterpriseWAN.com describes why Quality of Service (QoS) is not the cure-all it used to be and explores how to go beyond the constraints of WAN QoS to safeguard and deliver the applications in your enterprise.
Posted: 04 Dec 2012 | Published: 04 Dec 2012

Talari Networks

The Top 10 Reports for Managing Vulnerabilities
sponsored by Qualys
WHITE PAPER: Observing the complete lifecycle of vulnerability management begins with asset discovery. Learn more about the key steps for successful management with this informative resource. How can you improve your security?
Posted: 30 Jul 2012 | Published: 30 Jul 2012

Qualys

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

IBM Security Network Intrusion Prevention System
sponsored by IBM
VIDEO: This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
Posted: 27 Dec 2012 | Premiered: 08 Mar 2011

IBM

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: This expert E-Guide explores the most common SSL certificate management mistakes that can set the stage for a Web application exploit, and offers key advice for avoiding these errors – read on to learn more now.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

Thawte Inc.

The Urgent Need to rethink Security Using the Cloud
sponsored by Qualys
WHITE PAPER: This informative resource describes the many benefits that accompany the shift to a cloud-based security strategy. Discover how you can simplify, centralize, and enhance everything from endpoint security to compliance. Reduce web app vulnerabilities and manage threats with ease -- read on to learn more.
Posted: 18 Jan 2013 | Published: 28 Feb 2012

Qualys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement