IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Application Development

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Development Lifecycle, SDL, Developing Secure Applications, Coding Vulnerabilities, Secure Software Development, Secure Programming, Security-related Design
DEFINITION: Ability to maintain security across the application development lifecycle.
Secure Application Development Reports
1 - 25 of 65 Matches Previous Page  |  Next Page
Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: Access this webcast to learn how to automate your enterprise apps to ensure secure mobile data access and fortify your valuable enterprise information. Tune in now to strengthen your mobile security without unduly burdening your IT infrastructure.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015

Citrix

Top 10 Caveats Mobile IT Admins Need to Know about Windows 10
sponsored by MobileIron
WHITE PAPER: Download this resource for a list of the top 10 things you need to know about Windows 10 to keep pace with industry updates and your peers.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

MobileIron

From GPO to MDM: A New Era of Enterprise Computing
sponsored by MobileIron
WHITE PAPER: This white paper looks to enterprise mobility management (EMM) as the primary means of securing and managing enterprise devices during the evolution of operating systems.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

MobileIron

Be a Web App Security Superhero
sponsored by SearchSecurity.com
EBOOK: To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015

SearchSecurity.com

Case Study: Building a Mobile First Future
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how one company shifted to a mobile first approach with an enterprise mobility management (EMM) strategy that allows it to create, manage and secure a wide range of mobile apps.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

MobileIron

Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

IBM

Application Security: Evaluate Leading Testing Vendors
sponsored by IBM
WHITE PAPER: This Gartner resource compares 19 leading application security testing solution vendors, revealing the strengths and weaknesses of each one. View now and discover how the vendors performed in areas like product quality, sales execution and pricing, and customer experience.
Posted: 11 Mar 2016 | Published: 06 Aug 2015

IBM

Transforming Cloud Datacenter Security for Business Mobility
sponsored by vmware airwatch
WHITE PAPER: In this white paper, you'll learn ways to secure proprietary applications and data in the cloud data center. Learn what these cloud security approaches can offer over traditional security methods.
Posted: 18 Sep 2015 | Published: 18 Sep 2015

vmware airwatch

Support and Secure Mobile Devices with Enterprise Cloud Management
sponsored by vmware airwatch
WHITE PAPER: This white paper is designed to help organizations securely leverage Office 365 on their mobile devices. Discover how to secure all company apps both cloud and on-premise.
Posted: 18 Sep 2015 | Published: 31 Jan 2014

vmware airwatch

Empower More Productive Users with EMM and Enterprise Mobility
sponsored by vmware airwatch
RESOURCE: This infographic will review how current mobility trends (like the expansion of cloud architecture) are affecting EMM. Discover how cloud-enabled EMM can power the productivity of your users and IT, as well as 5 reasons to employ advanced EMM.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

vmware airwatch

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix Ready
WEBCAST: This webinar describes how Citrix Ready showcases verified products that are trusted to enhance Citrix solutions for mobility, virtualization, networking, and cloud platforms. Plus you learn why becoming a technology partner with Citrix will expand your business reach and bottom line.
Posted: 09 Sep 2015 | Premiered: Nov 3, 2015

Citrix Ready

Powering Disaster Recovery in the Cloud
sponsored by Commvault
WHITE PAPER: In this white paper, you will learn more about the challenges organizations face with it comes to DR, and how the cloud can come to the rescue of your organization. Read on to find out how to securely store customer data in the public cloud while fending off security concerns.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Top 5 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by SearchSecurity.com
EBOOK: EMM products can contain a variety of features -- for mobile device management, mobile app management, mobile content management and more -- so they vary greatly. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Untangling Work and Personal Data with Enterprise MAM
sponsored by IBM
EBOOK: This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

IBM

The State of Mobile Application Insecurity
sponsored by IBM MaaS360
WHITE PAPER: This research report conducted by Ponemon Institute examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

IBM MaaS360

The Modern Mobility E-Zine: An Exclusive Look at Enterprise Mobility
sponsored by SearchMobileComputing
EZINE: Access this e-zine to learn how the role of DevOps is changing as enterprise mobility matures. Read on here to see how fusing mobile app development and management can change the way IT delivers mobile information to users.
Posted: 14 Apr 2015 | Published: 13 Apr 2015

SearchMobileComputing

Protecting Data With Secure Collaboration Solutions
sponsored by Dropbox for Business
WHITE PAPER: Access this white paper to learn how a consulting firm evaluated the balance between security and usability for a popular cloud-based file sharing service.
Posted: 30 Mar 2015 | Published: 30 Jan 2015

Dropbox for Business

Mastering Mobile Application Management: How to Adopt MAM
sponsored by IBM
EBOOK: Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

IBM

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by SearchSecurity.com
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com

An Exclusive Guide for Promoting Enterprise Mobility Management
sponsored by SearchMobileComputing
EBOOK: This e-book takes readers through the process of enabling and managing a secure mobile workforce. Access this resource to understand how mobility can increase agility—and why security concerns, while important, shouldn't stop mobility in your organization from taking off.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

SearchMobileComputing

WAN Optimization: Expert Guidelines to Management and Security
sponsored by SearchEnterpriseWAN.com
EBOOK: What is the next step for WAN management? This expert guide explains why WAN optimization is now the norm and provides guidelines for an all-in-one strategy to minimize cost, complexity, and risk within your organization.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

SearchEnterpriseWAN.com

Application Security Advice: Stop Threats before They Start
sponsored by SearchSoftwareQuality.com
EBOOK: Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle.
Posted: 20 May 2014 | Published: 20 May 2014

SearchSoftwareQuality.com
1 - 25 of 65 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement