IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Security Testing

RSS Feed    Add to Google    Add to My Yahoo!
Security Testing Reports
 
E-Guide: VM in the Cloud
sponsored by SearchSecurity.com
EGUIDE: Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.
Posted: 01 Feb 2012 | Published: 31 Jan 2012

SearchSecurity.com

Outsourcing the problem of software security
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle.
Posted: 10 Jul 2012 | Published: 10 Jul 2012

ComputerWeekly.com

Mail Security for Microsoft Exchange Server
sponsored by ESET
DATA SHEET: ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past
Posted: 25 Mar 2011 | Published: 25 Mar 2011

ESET

Secure at the Source: Implementing Source Code Vulnerability Testing in the Software Development Life Cycle
sponsored by Ounce Labs, an IBM Company
WHITE PAPER: Learn the best models for integrating source code vulnerability testing into the software testing development life-cycle (SDLC) and how to best merge security expertise with development resources.
Posted: 20 Jul 2006 | Published: 19 Jul 2006

Ounce Labs, an IBM Company

E-Book: Technical Guide on Vulnerability Management
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
Posted: 03 Jun 2010 | Published: 03 Jun 2010

SearchSecurity.com

Magic Quadrant for Static Application Security Testing
sponsored by Veracode, Inc.
WHITE PAPER: In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Veracode, Inc.

The Top Six Risks of Employee Internet Use and How to Stop Them
sponsored by St. Bernard Software
WHITE PAPER: Learn the legal issues and security risks associated with unmanaged employee Internet use. This white paper discusses the security controls needed to mitigate risk, reduce threats and achieve compliance in the enterprise.
Posted: 27 Sep 2007 | Published: 27 Sep 2007

St. Bernard Software

CORE IMPACT 6.0
sponsored by Core Security Technologies
DATA SHEET: For organizations that need to ensure the security of critical or sensitive systems, CORE IMPACT is a must-have tool. This Information Security Review examines CORE IMPACT and highly recommends it as an effective security device.
Posted: 08 Jan 2007 | Published: 01 Dec 2006

Core Security Technologies

Metrics That Matter: Quantifying Software Security Risk
sponsored by Fortify Software
WHITE PAPER: Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
Posted: 07 May 2007 | Published: 01 Jan 2006

Fortify Software

Understanding Why Web Application Security is Critical to Business
sponsored by Sirius Computer Solutions
WHITE PAPER: This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.
Posted: 13 Oct 2009 | Published: 01 Sep 2009

Sirius Computer Solutions
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement