IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed    Add to Google    Add to My Yahoo!
Software SecurityReports
 
Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 18 Aug 2014 | Published: 01 Sep 2013

Hewlett-Packard Company

Best Practices in BYOD: Addressing BYOD Challenges in the Enterprise
sponsored by BlackBerry
WHITE PAPER: This white paper investigates the key challenges seen with BYOD today and how this particular solution works to combat any troubles.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: This white paper explores the growing world of mobile application development and highlights the benefits of providing security for mobile applications during the development and deployment stages.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

IBM

Large Financial Services Firm Passes Its PCI Audit— and Implements an Ongoing Governance Program
sponsored by Veracode, Inc.
CASE STUDY: A large financial services firm sought help with a one-time project to pass its payment card information (PCI) audit. View this case study now to see how this financial firm decided on continuous analysis, and the advantages they saw as a result. Also learn about a software system that achieves this without acquiring more servers.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

SAP Case Study
sponsored by Hewlett-Packard Company
CASE STUDY: With the escalating number and increasing sophistication of cyber-attacks, perimeter defenses are no longer enough. Companies who used HP Fortify on Demand—a cloud-based solution—saw results and achieved time to value faster. Read the report to learn how.
Posted: 04 Sep 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

Affinity Credit Union Chooses HP Fortify On Demand - Cloud-Based Security Assessment Service for Mobile Remote Deposit Capture Application
sponsored by Hewlett-Packard Company
CASE STUDY: In this case study, explore how this company used a cloud-based security assessment service to improve banking applications.
Posted: 10 Sep 2014 | Published: 30 Nov 2013

Hewlett-Packard Company

Defending Against Application-Layer DDoS Attacks
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains the serious problem that DDoS threats present, and how it impacts your business.
Posted: 25 Jun 2014 | Published: 31 Dec 2013

Juniper Networks, Inc.

ROI Case Study: Cloud-Application Security Service
sponsored by Veracode, Inc.
CASE STUDY: A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Veracode, Inc.

Analysit Fact Sheet: Who’s Minding your Cloud?
sponsored by CA Technologies.
ANALYST BRIEF: 46% of companies have stopped or slowed adoption of cloud services due to security concerns. View this analyst fact sheet to learn more about how companies are handling software, application, and cloud security.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

CA Technologies.

10 Critical Requirements for Cloud Applications
sponsored by Workday
VIDEO: Uncover the top 10 requirements for cloud applications, and find out what you should be looking for from vendors.
Posted: 08 Sep 2014 | Premiered: 29 Jun 2013

Workday
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement