IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Application Development

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Development Lifecycle, SDL, Developing Secure Applications, Coding Vulnerabilities, Secure Software Development, Secure Programming, Security-related Design
DEFINITION: Ability to maintain security across the application development lifecycle.
Secure Application Development Reports
1 - 25 of 127 Matches Previous Page  |  Next Page
The Total Economic Impact of Polycom Voice Solutions for Skype for Business
sponsored by Polycom, Inc.
WHITE PAPER: Access this Forrester report and learn more about a framework to examine your return on investment (ROI) by deploying several of these emerging unified communications (UC) technologies.
Posted: 20 Nov 2015 | Published: 31 Jan 2014

Polycom, Inc.

The 2015 Mobile Workforce Report for the Middle East and Africa
sponsored by Dimension Data
WHITE PAPER: In this global report, you will address the IT and security challenges that introducing a mobile workforce presents. Focusing on the Middle East and Africa, learn how organizations in these geographies are driving end-user computing growth, as well as get an insider's look at enterprise mobile app trends for 2016.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Dimension Data

The 2015 Rise of the Mobile Workforce in Asia Pacific
sponsored by Dimension Data
WHITE PAPER: In this white paper, you will learn about the state of the mobile workforce in 2015. Discover how to embrace successful end-user computing, key into MDM's relationship with market maturity, and see why mobile IT management and enterprise mobile apps are set to dominate in 2016.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Dimension Data

Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015


The 10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This white paper presents 10 key points to consider as you develop your enterprise mobility strategy—from security to BYOD. Unlock the full potential of your mobility, and develop a comprehensive and security-conscious mobility strategy for your organization.
Posted: 28 Oct 2015 | Published: 31 Oct 2014


The Top 10 Must-Haves for Secure Enterprise Mobility Management
sponsored by Citrix
WHITE PAPER: Security is the primary inhibitor to both enterprise mobility and BYOD programs. In this white paper, you will learn the 10 must-ask questions for EMM solution providers regarding their mobility security frameworks.
Posted: 27 Oct 2015 | Published: 31 May 2013


Mobile Security Threats: Get Ready for 2016
sponsored by CloudMine
WHITE PAPER: This valuable resource will help your organization to bolster your mobile security defenses as you race to adopt new technologies to stay ever-more innovative and agile. View now to discover 6 top mobile security threats, as well as 8 best practices for securing your enterprise mobile apps.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

The State of Mobile Application Insecurity: Reducing the Risk of Unsecure Apps
sponsored by IBM
WHITE PAPER: In this case study, you will learn how to successfully reduce the risk of unsecured mobile apps in your business, and see what steps enterprises are taking to secure these apps.
Posted: 14 Oct 2015 | Published: 14 Oct 2015


The Power of Collaboration with an Expiration Date and Data-Centric Security
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn the role of data-centric security in expiration collaboration. Access this paper now to see why the movement of consumers to apps like Snapchat clearly presages a similar move for enterprises to EFSS tools with real expiration built in.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Building a Web Application Security Program
sponsored by Qualys
WHITE PAPER: This white paper details how to build a pragmatic web application security program that provides effective security. View now to review the top 12 web app security weak points.
Posted: 12 Oct 2015 | Published: 09 Mar 2009


A Guide to Security and Privacy in a Hosted Exchange Environment
sponsored by Intermedia.Net
WHITE PAPER: This white paper will assist you in choosing the right hosted Exchange environment for you, with top-notch provider security. Access this white paper to improve your Exchange experience and get exclusive access to a checklist comparison of hosted Exchange providers' security offerings.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Security and Compliance: The New Watchwords of Enterprise App Delivery
sponsored by IBM
WHITE PAPER: This white paper examines the driving forces behind the establishment of corporate application stores, and highlights one best-in-class mobile app management (MAM) program. Read on to learn how to ride the crest of this new wave of mobility and enhance your enterprise app security.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


When Business is the App, the App is the Business: Securing Enterprise Apps
sponsored by IBM
WHITE PAPER: In this report, you will learn the key security dangers enterprise mobile apps face, and find out how to eliminate these threats them in your app-driven business. Access this comprehensive white paper now to optimize the use of apps in your business.
Posted: 07 Oct 2015 | Published: 07 Oct 2015


The Importance of Secure Application Development Lifecycles
sponsored by WhiteHat Security
EGUIDE: This expert e-guide lays out four steps to implementing secure code. View now to learn how to develop the skills to mitigate malware attacks at the application layer. Additionally, examine the myths about compliance-ready web app security assessment tools.
Posted: 01 Oct 2015 | Published: 11 Mar 2015

WhiteHat Security

5 Days to Setting Up an Application Security Program
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 01 Oct 2015 | Published: 12 Jan 2015

WhiteHat Security

Integrating Security Across the Software Development Lifecycle (SDLC)
sponsored by WhiteHat Security
CASE STUDY: In this white paper, you will learn how to not only identify and remediate web app vulnerabilities, but to integrate security into the software development lifecycle (SDLC). Access now to learn more.
Posted: 01 Oct 2015 | Published: 03 Jan 2014

WhiteHat Security

Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

Achieve Global PCI DSS Compliance with Managed Cloud Services
sponsored by Datapipe
CASE STUDY: This case study examines how Gateway Ticketing Systems was able to upgrade to a fully managed, PCI compliant hosting environment. Read on to see how this particular cloud platform can deliver business growth enabled with scalable, secure, redundant network, and more.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


UBM Tech Whitepaper: The State of UC: Future Adopters Poised to Rap Benefits via Cloud
sponsored by XO Communications
WHITE PAPER: Companies like yours are successfully addressing communications and collaboration challenges with Unified Communications. According to a new UBM Research Study, 87% of adopters say UC met or exceeded their expectations. Learn what holds others back, and how to overcome those obstacles.
Posted: 23 Sep 2015 | Published: 23 Sep 2015

XO Communications

Integrating Testing and Service Virtualization in a WebSphere Environment
sponsored by IBM
WEBCAST: In this webinar, Nick Portalski and Stephen Rowles of Integration Testing at IBM explain how to integrate testing and server virtualization in a WebSphere environment. View now to see the four types of testing performed on load and virtualization servers as well as discover how to test apps built on WebSphere.
Posted: 22 Sep 2015 | Premiered: Sep 22, 2015


Deliver the Power of Patterns Across a Dynamic Cloud Environment
sponsored by IBM
WEBCAST: In this video, Jason McGee, IBM Fellow and CTO at PureApplication System, explains how businesses can harness the power of patterns and deploy applications on- and off- premise within the cloud, by way of an automated blueprint. View this webcast now to simplify and speed up your dynamic cloud deployment.
Posted: 15 Sep 2015 | Premiered: Feb 21, 2014


Simplify Your Journey into the Cloud with Hybrid Management
sponsored by Oracle Corporation
WEBCAST: In this webcast, enterprise cloud experts including Dan Koloski, Senior Director of Product Management at Oracle, examine a game-changing enterprise cloud management platform. View this video to access a suite of services for building modern secure cloud applications, which includes mobile, business analytics, and data management.
Posted: 11 Sep 2015 | Premiered: Sep 11, 2015

Oracle Corporation

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix Ready
WEBCAST: This webinar describes how Citrix Ready showcases verified products that are trusted to enhance Citrix solutions for mobility, virtualization, networking, and cloud platforms. View now to learn how becoming a technology partner with Citrix can expand your business reach.
Posted: 09 Sep 2015 | Premiered: Nov 3, 2015

Citrix Ready

API Management Designed for the Cloud: Getting Started
sponsored by IBM
WHITE PAPER: This white paper highlights a multi-tenant cloud-based service for API development. Access this white paper to learn how to rapidly design, secure, manage, and analyze APIs to reach both internal and external developers.
Posted: 03 Sep 2015 | Published: 03 Sep 2015


How to Develop Mobile Applications Using Windows 10
sponsored by Pluralsight
WEBCAST: To learn what else Windows 10 can do for mobile app developers, access this webinar, which outlines the development capabilities built into the Windows 10 upgrade. View now to access guiding principles to help you get started developing Windows apps today.
Posted: 03 Sep 2015 | Premiered: Sep 3, 2015

1 - 25 of 127 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement