IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Software Development

RSS Feed    Add to Google    Add to My Yahoo!
Secure Software Development Reports
 
Best Practices For Public Cloud Security
sponsored by TrendMicro
WHITE PAPER: This white paper discusses the need for cloud managers to balance developer time-to-value with security risks and cost.
Posted: 01 Feb 2016 | Published: 04 Feb 2015

TrendMicro

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by SearchSecurity.com
EBOOK: Vendors are now turning to threat intelligence services to combat unseen threats. This guide will introduce you to threat intelligence services and detail how each services compares to one another. Learn how to best choose a service that can fight the specific attacks which afflict your network and who can scale as your organization grows.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com

Maximizing Your Video Utilization: The Best Practices
sponsored by Vyopta
EBOOK: Access now to learn the best practices for maximizing enterprise video utilization and adoption within your enterprise.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Vyopta

Best Practices for Secure Remote Access
sponsored by TechTarget
RESOURCE: Want to discover vendor neutral tips on assessing and implementing remote access software and best practices? Participate in our Secure Remote Access Research Program and we'll give you immediate download of our exclusive e-guide, Secure Remote Access Tools and Techniques.
Posted: 18 Mar 2014 | Published: 23 Feb 2015

TechTarget

Presentation Transcript: Optimize Business and IT with New Generation Application Lifecycle
sponsored by SAP Community Network
PRESENTATION TRANSCRIPT: This transcript provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 26 Oct 2009 | Published: 26 Oct 2009

SAP Community Network

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Sharks in the AppPool: Managing Your Web Presence While Protecting the Hosting Resources You Pay For
sponsored by Verio
WHITE PAPER: This white paper details hosting best practices, discussing the advantages associated with the use of isolated, rather than shared, AppPools in a Windows-based hosting environment.
Posted: 27 Aug 2007 | Published: 01 Sep 2006

Verio

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER: Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Citrix

The Modern Mobility E-Zine: An Exclusive Look at Enterprise Mobility
sponsored by SearchMobileComputing
EZINE: Access this e-zine to learn how the role of DevOps is changing as enterprise mobility matures. Read on here to see how fusing mobile app development and management can change the way IT delivers mobile information to users.
Posted: 14 Apr 2015 | Published: 13 Apr 2015

SearchMobileComputing
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement