IT Management  >   Systems Operations  >   Security  >  

Internet Applications Security

RSS Feed    Add to Google    Add to My Yahoo!
Internet Applications SecurityReports
 
New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.
Posted: 26 Mar 2013 | Published: 26 Mar 2013

SearchSecurity.com

E-Guide: Best practices for pen testing Web applications
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

SearchSecurity.com

A Computer Weekly buyer's guide to testing and code quality
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper describes the financial implications of web attacks, DDoS attacks, and other web-based threats, and also introduces one company's web application firewall as a potential solution.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Imperva

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
sponsored by IBM
WEBCAST: This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
Posted: 19 Jul 2013 | Premiered: Jul 19, 2013

IBM

Making Office 365 More Secure and Compliant
sponsored by Proofpoint, Inc.
WHITE PAPER: Microsoft has done a good job at developing a robust and scalable platform in Office 365, but there are some organizations that will need compliance and security capabilities not natively available. View this paper to explore what Office 365 will and will not do and where supplemental offerings from third party vendors will prove to be beneficial.
Posted: 19 Dec 2011 | Published: 19 Dec 2011

Proofpoint, Inc.

Next-Generation Security for Today's Data Center
sponsored by IBM and Juniper
WHITE PAPER: This crucial resource discusses next-generation security solutions that can offer unparalleled protection against data exfiltration, website outages, and other serious threats against the data center.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

IBM and Juniper

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
Posted: 05 May 2014 | Published: 25 Sep 2013

IBM

NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER: This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013

IBM

Is your security as good as the cloud’s?
sponsored by Trend Micro, Inc.
WHITE PAPER: This paper examines the relative merits of Software-as-a-Service and Infrastructure-as-a-Service, as well as issues and risks to consider. View now to determine whether these models are likely to provide better or worse security than your current in-house security.
Posted: 07 Oct 2011 | Published: 04 Oct 2011

Trend Micro, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement