IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Software Development

RSS Feed    Add to Google    Add to My Yahoo!
Secure Software Development Reports
Enterprise Mobility Best Practices: MDM, Containerization or Both?
sponsored by VMware, Inc.
WHITE PAPER: This white paper highlights several enterprise mobility management (EMM) use cases and defines the advantages of MDM, containerization, and the layered approach to security that both can provide.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

VMware, Inc.

Integrating Testing and Service Virtualization in a WebSphere Environment
sponsored by IBM
WEBCAST: In this webinar, Nick Portalski and Stephen Rowles of Integration Testing at IBM explain how to integrate testing and server virtualization in a WebSphere environment. View now to see the four types of testing performed on load and virtualization servers as well as discover how to test apps built on WebSphere.
Posted: 22 Sep 2015 | Premiered: Sep 22, 2015


The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by
EBOOK: This buyer's guide can help you find the right threat intelligence service for your organization. Access it now to learn what features every successful threat intelligence platform must offer.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

Integrate the Cloud into Your Business Lifecycle and Mobile App Management
sponsored by Oracle Corporation
WHITE PAPER: This white paper outlines several mobility strategies that will help your organization embrace and mobilize cloud applications. Read on to extend and secure your mobile apps, and learn how deploy to apps in the cloud while diagnosing performance and usage.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Oracle Corporation

Top 5 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 24 Aug 2015 | Published: 24 Aug 2015


How to Make Android Work For Your Enterprise
sponsored by IBM
WHITE PAPER: This white paper walks you through how to customize the Android security and management capabilities to your company's mobile strategy.
Posted: 13 Jul 2015 | Published: 13 Jul 2015


An Exclusive Guide for Promoting Enterprise Mobility Management
sponsored by SearchMobileComputing
EBOOK: This e-book takes readers through the process of enabling and managing a secure mobile workforce. Access this resource to understand how mobility can increase agility—and why security concerns, while important, shouldn't stop mobility in your organization from taking off.
Posted: 02 Feb 2015 | Published: 02 Feb 2015


Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012


How to Secure Your Microsoft SharePoint Products
sponsored by Thawte Inc.
EGUIDE: This e-guide from our experts at will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013

Thawte Inc.

Protecting Data With Secure Collaboration Solutions
sponsored by Dropbox for Business
WHITE PAPER: Access this white paper to learn how a consulting firm evaluated the balance between security and usability for a popular cloud-based file sharing service.
Posted: 30 Mar 2015 | Published: 30 Jan 2015

Dropbox for Business
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement