IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Software Development

RSS Feed    Add to Google    Add to My Yahoo!
Secure Software Development Reports
 
E-Guide: Integrating security into the ALM lifecycle
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 16 Nov 2011

SearchSecurity.com

FICO and Red Hat Seed the Cloud with Enterprise Innovations
sponsored by Red Hat
WHITE PAPER: Platform-as-a-service tools have become the market's leading solution for business rules management. This white paper examines a new and emerging PaaS cloud computing solution (one of which features promises any time, on-demand access to a full-service cloud-based application platform). Read on here to learn about receiving the following benefits.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

IBM

Maximize UC&C ROI: Advice from Zeus Kerravala
sponsored by Polycom, Inc.
WHITE PAPER: In this white paper, you will learn how to minimize deployment risk, while providing IT leaders with a rock-solid deployment with minimal challenges. Learn how to integrate your existing UC infrastructure with potential new voice/video vendors, as well as how to strategize with your partners and leverage your relationship with them.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Polycom, Inc.

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by SearchSecurity.com
EBOOK: EMM products can contain a variety of features -- for mobile device management, mobile app management, mobile content management and more -- so they vary greatly. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

Application security testing: Protecting your application and data
sponsored by SearchSecurity.com
EBOOK: Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
Posted: 07 Nov 2011 | Published: 07 Nov 2011

SearchSecurity.com

Ready Your Organization for an Enterprise Voice Transition to the Cloud
sponsored by Polycom, Inc.
WHITE PAPER: This exclusive white paper provides an outline for the benefits and considerations of balancing the transition of voice collaboration to the cloud. Continue reading to understand the key benefits UC and collaboration can bring to the modern workplace.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Polycom, Inc.

Untangling Work and Personal Data with Enterprise MAM
sponsored by SearchMobileComputing
EBOOK: This exclusive three-part guide explains how and why IT should use MAM to control enterprise applications. Read on here to see how your business can securely enable successful enterprise mobility, and get an inside look at an MAM comparison: app wrapping versus containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

SearchMobileComputing

Mobilizing Business Applications with McAfee
sponsored by McAfee.
WHITE PAPER: Before mobilising your applications to improve business performance, you must address the number of management and security concerns around it. In this paper, discover how McAfee Enterprise Mobility Management (McAfee EMM) can provide you the foundation necessary for your application mobilisation initiatives.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

McAfee.

Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER: Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement