Web Applications Management Reports

Toughening up web and mobile application security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

Designing a Modern Enterprise Architecture
sponsored by Metavine
EGUIDE: In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Metavine

Modern Mobility E-zine: February 2016
sponsored by TechTarget Mobile Computing
EZINE: In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

TechTarget Mobile Computing

A Case for IT Security: The Future of New EU Data Protection
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

TechTarget ComputerWeekly.com

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Enterprise Mobility Management E-Book Part 2
sponsored by TechTarget Mobile Computing
EBOOK: In part 2 of this Enterprise Mobility Management e-book, discover the ins and outs of mobile device management, including how Exchange ActiveSync is as valuable as an MDM tool, using MDM for iOS, and using MDM for Android. In addition, learn about remote Windows desktop apps and web apps as they relate to mobility.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

TechTarget Mobile Computing

New Considerations for Application Integration
sponsored by TheServerSide.com
EBOOK: This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

TheServerSide.com

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Developing Mobile Applications for the Cloud, with the Cloud
sponsored by IBM
EGUIDE: In this e-guide, experts define the key differences between native, hybrid, Web and cloud mobile applications, and they highlight best practices for testing and developing them. Learn how mobile development teams are finding success by leveraging cloud-based products such as PaaS, SaaS and IaaS services.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

IBM

How a Top E-Commerce Strategy Leads to Strong Sales
sponsored by ZeroLag Communications Inc.
EGUIDE: In this e-guide, Brian K. Walker of Forrester and other experts provide six key factors that can make or break a customer's shopping experience and, ultimately, an e-commerce business.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

ZeroLag Communications Inc.

Introducing Big Data Repository/Reporting to Support Web Analytics and User-Centric APM
sponsored by Dell Software
WHITE PAPER: Learn the capabilities of Dell™ Foglight™ Application Performance Monitoring (APM) 5.9, and how the deep visibility into transaction flows and User Experience capitalize on innovative Big Data Technology.
Posted: 01 May 2014 | Published: 20 Jun 2013

Dell Software

Four Ways to Modernize Your Application Performance Monitoring Strategy for Web 2.0 and AJAX
sponsored by Dell Software
WHITE PAPER: Learn how Web 2.0 technologies can increase the speed and efficiency of Web applications, while uniquely combining the best of traditional and modern approaches to deliver a well-rounded application performance monitoring (APM) solution.
Posted: 01 May 2014 | Published: 10 Sep 2013

Dell Software

Web Content Acceleration for Brilliant Storytelling
sponsored by Limelight Networks, Inc.
RESOURCE: This informative guide explores one company's solution to your network performance woes and outlines the benefits of implementation.
Posted: 29 Apr 2014 | Published: 31 Dec 2013

Limelight Networks, Inc.

Drowning in a Sea of Downtime
sponsored by Borland, Micro Focus
RESOURCE: With your reputation, ROI, and revenue on the line, you can't afford downtime. You need a way to safeguard your applications and websites, ensuring top performance 100% of the time. Check out this infographic for more shocking stats about downtime, and discover a performance management technology that helps you on the road to minimal downtime.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Borland, Micro Focus

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys

API Management is the SOA Renaissance
sponsored by IBM
WHITE PAPER: Forward-thinking organizations are moving to more open ecosystems, relying on service-oriented architecture (SOA) and application programming interfaces (APIs). Access this insightful white paper to learn about combining SOA and API management to create more engaging applications through comprehensive integration.
Posted: 11 Mar 2014 | Published: 31 Dec 2013

IBM

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This whitepaper details a security solution to sure up the vulnerabilities associated with web application exposure.
Posted: 06 Mar 2014 | Published: 10 Oct 2013

IBM

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Protect People, Processes, and Technology From Web Application Threats
sponsored by IBM
WHITE PAPER: This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
Posted: 05 Mar 2014 | Published: 30 Nov 2013

IBM

Web CMS Featuring Video Integration
sponsored by e-Spirit AG
WHITE PAPER: In this resource, learn about a technology that enables integration of web applications into a CMS, so they can be centrally opened and edited, improving efficiency and making better web pages. Specifically, take a look at a video integration module that allows you to easily integrate videos into web pages, online shops and portals.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

e-Spirit AG

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Delivering the Data Layer of the Cloud: The Business Case for APIs
sponsored by StrikeIron
WHITE PAPER: In this white paper, explore the business case for APIs and learn why it may be a good idea to publish APIs for your organization. Compare the options of building your API capabilities internally and leveraging an API platform provider to achieve end-to-end API management.
Posted: 18 Feb 2014 | Published: 18 Feb 2014

StrikeIron

Hosting is Dead
sponsored by Pantheon
WHITE PAPER: When launching a website, many businesses invest in a hosting service but they still don't have the infrastructure needed to handle load spikes, fix bugs, and add features. If like many companies, you chose Drupal to remain agile, managing and changing your website should be no different -- but traditional hosting can hold you back.
Posted: 17 Feb 2014 | Published: 17 Feb 2014

Pantheon

Five Ways to Address the Challenges of Data Delivery in a Mobile Environment
sponsored by TIBCO Software Inc.
WHITE PAPER: To truly embrace mobility, businesses need to communicate with all kinds of devices, regardless of model or age. In this solution brief, explore five principles that will help you address the challenges of exchanging data in real-time with mobile devices.
Posted: 14 Feb 2014 | Published: 03 Feb 2014

TIBCO Software Inc.

Single Source of Truth
sponsored by SOASTA, Inc
WHITE PAPER: With real user measurement (RUM), you can measure perceived load time for your users at the exact point of engagement, so you know exactly where to improve performance for better outcomes. In this white paper, get an overview of the business and technical aspects of measuring performance with RUM.
Posted: 07 Jan 2014 | Published: 07 Jan 2014

SOASTA, Inc