IT Management  >   Systems Operations  >   Security  >  

Internet Applications Security

RSS Feed    Add to Google    Add to My Yahoo!
Internet Applications Security Reports
 
Next Generation Cloud Security
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.
Posted: 13 May 2015 | Published: 10 Dec 2014

Symantec Corporation

E-Guide: Configure Outbound Firewall Rules for Data Protection
sponsored by SearchSecurity.com
EGUIDE: A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

SearchSecurity.com

Examining the Current Cyber Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: With attacks no longer a question of "if" but "when," it's crucial to know what your enemies are up to. This white paper examines the prevalent vulnerabilities in organizations today, how hackers are exploiting them, and which tools they are using to get the job done.
Posted: 28 Apr 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

Taking Action to Secure Web Applications
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Web-Facing Applications: Mitigating Likely Web Application Threats
sponsored by SearchSecurity.com
EGUIDE: In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

SearchSecurity.com

NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER: This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013

IBM

The Urgent Need to rethink Security Using the Cloud
sponsored by Qualys
WHITE PAPER: This informative resource describes the many benefits that accompany the shift to a cloud-based security strategy. Discover how you can simplify, centralize, and enhance everything from endpoint security to compliance. Reduce web app vulnerabilities and manage threats with ease -- read on to learn more.
Posted: 18 Jan 2013 | Published: 28 Feb 2012

Qualys

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
sponsored by IBM
WEBCAST: This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
Posted: 19 Jul 2013 | Premiered: Jul 19, 2013

IBM

Protect People, Processes, and Technology From Web Application Threats
sponsored by IBM
WHITE PAPER: This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
Posted: 05 Mar 2014 | Published: 30 Nov 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement