IT Management  >   Systems Operations  >   Security  >  

Internet Application Security

RSS Feed    Add to Google    Add to My Yahoo!
Internet Application Security Reports
 
Security risks that can affect your industry
sponsored by SearchSecurity.com
EGUIDE: As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

SearchSecurity.com

Technology Offers Convenience, Privacy Pays the Price
sponsored by Global Knowledge
WHITE PAPER: Technology is a wonderful thing, but it comes with a price: your privacy. This white paper can help you learn more about what kind of personal data is collected by web sites and applications, and how to secure your information online.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

Global Knowledge

Web Application Firewalls: Patching, SDLC Key for Security, Compliance
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

SearchSecurity.com

Live Demo: Getting Started with Web Protection
sponsored by LogicNow
VIDEO: This short video provides a demo for MAXfocus Web Protection, a system that enables your enterprise to be in control of your web security, web filtering and web bandwidth monitoring. Watch now to see how this platform can enable you to keep your systems secure.
Posted: 10 Feb 2016 | Premiered: 20 Jan 2016

LogicNow

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This whitepaper details a security solution to sure up the vulnerabilities associated with web application exposure.
Posted: 06 Mar 2014 | Published: 10 Oct 2013

IBM

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: This expert E-Guide explores the most common SSL certificate management mistakes that can set the stage for a Web application exploit, and offers key advice for avoiding these errors – read on to learn more now.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

Thawte Inc.

The four rules of complete web protection
sponsored by Sophos, Inc.
WHITE PAPER: As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.
Posted: 01 Jan 2012 | Published: 16 Dec 2011

Sophos, Inc.

Build in security and drive innovation
sponsored by IBM
PODCAST: Hear from Patrick Vandenberg, IBM Security & Compliance Marketing Manager and Ewa Hoyt, IBM Security Application & Compliance Marketing manager, on how to make application security part of your development process. Reduce risk and costs, and keep your development teams productive to drive the innovation you need to compete and win.
Posted: 10 Nov 2011 | Premiered: Nov 10, 2011

IBM

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com

The Urgent Need to rethink Security Using the Cloud
sponsored by Qualys
WHITE PAPER: This informative resource describes the many benefits that accompany the shift to a cloud-based security strategy. Discover how you can simplify, centralize, and enhance everything from endpoint security to compliance. Reduce web app vulnerabilities and manage threats with ease -- read on to learn more.
Posted: 18 Jan 2013 | Published: 28 Feb 2012

Qualys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement