IT Management  >   Systems Operations  >   Security  >  

Internet Application Security

RSS Feed    Add to Google    Add to My Yahoo!
Internet Application Security Reports
 
The Evolving Role Of Cloud Security: Understanding Why A New Approach Is Needed
sponsored by Cloud Sherpas
WHITE PAPER: The way forward will lead the security industry of tomorrow in one of two very different directions: The top-down approach of IT pushing back against user autonomy, or the opposite approach, where empowerment and user agency are balanced by behavior analytics and risk measurement policy.
Posted: 08 Jun 2015 | Published: 20 May 2015

Cloud Sherpas

Protection from the Inside: Application Security Methodologies Compared
sponsored by Hewlett-Packard Company
WHITE PAPER: In this paper, the SANS Institute captures the relative capabilities and efficiencies of RASP and WAF technologies using a representative product in each category. Learn how your defense-in-depth strategy could benefit from the additional visibility of runtime protection.
Posted: 15 May 2015 | Published: 16 Apr 2015

Hewlett-Packard Company

Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: Access this white paper to find the right workspace aggregator for your organization. Learn to improve productivity, workplace morale, security, and overall revenues.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Matrix42

Securing Cloud Computing: How to Evaluate Providers
sponsored by IntraLinks, Inc
WHITE PAPER: In this white paper, explore the state of security in the cloud. Continue reading to reveal a 21 questions-to-ask checklist of leading security practices for protecting sensitive data in the cloud.
Posted: 14 May 2015 | Published: 17 Dec 2014

IntraLinks, Inc

How The Burgiss Group Manages Business Risk with AppFirst
sponsored by AppFirst
CASE STUDY: This case study reveals which solution the Burgiss Group trusts to help them monitor the behavior of their applications and systems and – in turn – ensure an optimal experience for their clients. View now to learn more!
Posted: 04 Sep 2013 | Published: 04 Sep 2013

AppFirst

What Security Threats Can We Expect in 2012?
sponsored by Websense, Inc.
WEBCAST: View this webcast to explore the projected security threats in 2012, how you should prepare your data, email, and web security of your organization going into the New Year, how security is being impacted in a highly mobile, socially networked, and cloud based environment, and more.
Posted: 15 Dec 2011 | Premiered: Dec 15, 2011

Websense, Inc.

HP Fortify on Demand
sponsored by Hewlett-Packard Company
DATA SHEET: Access this data sheet to discover an on-demand solution that tests the security of software quickly, accurately, and affordably.
Posted: 18 Aug 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

Accelerate Delivery of Web Applications with this Tool
sponsored by IBM
VIDEO: Watch this brief video for an overview of a software product that acts as a web application server -- providing a framework and middleware for Java-based web applications
Posted: 27 Jun 2014 | Premiered: 27 Jun 2014

IBM

IBM Security Network Intrusion Prevention System
sponsored by IBM
VIDEO: This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
Posted: 27 Dec 2012 | Premiered: 08 Mar 2011

IBM

Social Networking malware: The dangers facing SMBs
sponsored by GFI Software
WHITE PAPER: View this paper to explore the rise of social networking, the types of malware targeting social platforms, how SMBs can protect themselves against today’s social threats, and more.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

GFI Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement