IT Management  >   Systems Operations  >   Applications Management  >  

Web Applications Management

RSS Feed    Add to Google    Add to My Yahoo!
Web Applications Management Reports
1 - 25 of 178 Matches Previous Page  |  Next Page
APM 101: Getting Started with Synthetic Monitoring
sponsored by Neotys
WHITE PAPER: This white paper will discuss the rising importance of application performance monitoring and its benefits to your organization. You'll learn the key differences between synthetic monitoring, real-user monitoring and deep-dive diagnostics and discover how they can improve the overall performance and availability of your web and mobile applications.
Posted: 06 Oct 2015 | Published: 06 Oct 2015


Web application firewall provides continuous web app protection
sponsored by Trustwave
PRODUCT OVERVIEW: Access this white paper to learn about a web application firewall appliance that provides real-time, continuous security against attacks and data loss and assures that your web applications operate as intended and are compliant with industry regulations and discover how you can protect against the loss of sensitive information.
Posted: 06 Oct 2015 | Published: 31 Dec 2014


Web Performance Optimization (WPO) as a Service for Differentiated High-end Cloud Services
sponsored by Radware
WHITE PAPER: This white paper outlines how cloud providers can offer various services for managing the SLA or the applications hosted on their infrastructure, including monitoring and maintaining applications SLA, and even accelerating application performance. Read on to learn the benefits your organization can see.
Posted: 06 Oct 2015 | Published: 31 Dec 2013


Key Considerations in Choosing a Web Application Firewall
sponsored by F5 Networks
WHITE PAPER: Access this white paper to learn how web application firewalls (WAF) have changed due to the rise of the cloud and uncover the key factors you should consider when selecting a WAF to protect your business – including basic and advanced considerations.
Posted: 02 Oct 2015 | Published: 02 Oct 2015

F5 Networks

Bypassing Security Policies using Insufficient Authorization
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.
Posted: 01 Oct 2015 | Premiered: Apr 14, 2015

WhiteHat Security

10 Features Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 01 Oct 2015 | Published: 01 Oct 2015


Protecting against Application Logic and Session Theft Attacks
sponsored by Barracuda Networks
WHITE PAPER: This white paper discusses the danger of application logic attacks and gives a five-step process for proactively staying secure against them.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Barracuda Networks

API Monetization: Unlocking the Value of Your Data
sponsored by CA Technologies.
WHITE PAPER: In this resource, you'll learn how the right API management platform can help you to securely expose your APIs and charge for access to your business data, while providing developers with the information they need to create applications against them.
Posted: 10 Aug 2015 | Published: 10 Aug 2015

CA Technologies.

A Guide to REST and API Design
sponsored by CA Technologies.
WHITE PAPER: Representational State Transfer (REST) is a web architecture style with universal constraints, enabling developers to build interfaces that can be used from nearly any device or operating system. This informative resource is packed with information on leveraging REST and API design to build applications that can last a long time.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

CA Technologies.

Work Smarter, Not Harder, to Secure Your Applications
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper features Maverick research from Gartner analyst, Joseph Feiman: Stop Protecting Your Apps: It's Time for Apps to Protect Themselves.
Posted: 18 May 2015 | Published: 01 May 2015

Hewlett-Packard Company

New Considerations for Application Integration
sponsored by
EBOOK: This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Case Study: Leading Bank Reduces Cost of Providing Consistent Brand Image
sponsored by IBM
WHITE PAPER: Jyske Bank, the third largest independent bank in Denmark, wanted to make it easy for people using mobile devices to access and use its website. This case study considers the solution Jyske Bank found, and how it created one responsive web design that adapts content and layout automatically based on channels and devices.
Posted: 17 Sep 2014 | Published: 10 Sep 2014


Making the case for the cloud in common use airport technology
sponsored by
ESSENTIAL GUIDE: This report from Amadeus looks at the business case for cloud computing in airports.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012


Enterprise Mobility Management E-Book Part 2
sponsored by SearchMobileComputing
EBOOK: In part 2 of this Enterprise Mobility Management e-book, discover the ins and outs of mobile device management, including how Exchange ActiveSync is as valuable as an MDM tool, using MDM for iOS, and using MDM for Android. In addition, learn about remote Windows desktop apps and web apps as they relate to mobility.
Posted: 11 Dec 2014 | Published: 11 Dec 2014


Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013


Developing Mobile Applications for the Cloud, with the Cloud
sponsored by IBM
EGUIDE: In this e-guide, experts define the key differences between native, hybrid, Web and cloud mobile applications, and they highlight best practices for testing and developing them. Learn how mobile development teams are finding success by leveraging cloud-based products such as PaaS, SaaS and IaaS services.
Posted: 24 Sep 2014 | Published: 24 Sep 2014


How a Top E-Commerce Strategy Leads to Strong Sales
sponsored by ZeroLag Communications Inc.
EGUIDE: In this e-guide, Brian K. Walker of Forrester and other experts provide six key factors that can make or break a customer's shopping experience and, ultimately, an e-commerce business.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

ZeroLag Communications Inc.

Introducing Big Data Repository/Reporting to Support Web Analytics and User-Centric APM
sponsored by Dell Software
WHITE PAPER: Learn the capabilities of Dell™ Foglight™ Application Performance Monitoring (APM) 5.9, and how the deep visibility into transaction flows and User Experience capitalize on innovative Big Data Technology.
Posted: 01 May 2014 | Published: 20 Jun 2013

Dell Software

Four Ways to Modernize Your Application Performance Monitoring Strategy for Web 2.0 and AJAX
sponsored by Dell Software
WHITE PAPER: Learn how Web 2.0 technologies can increase the speed and efficiency of Web applications, while uniquely combining the best of traditional and modern approaches to deliver a well-rounded application performance monitoring (APM) solution.
Posted: 01 May 2014 | Published: 10 Sep 2013

Dell Software

Web Content Acceleration for Brilliant Storytelling
sponsored by Limelight Networks, Inc.
RESOURCE: This informative guide explores one company's solution to your network performance woes and outlines the benefits of implementation.
Posted: 29 Apr 2014 | Published: 31 Dec 2013

Limelight Networks, Inc.

Drowning in a Sea of Downtime
sponsored by Borland, Micro Focus
RESOURCE: With your reputation, ROI, and revenue on the line, you can't afford downtime. You need a way to safeguard your applications and websites, ensuring top performance 100% of the time. Check out this infographic for more shocking stats about downtime, and discover a performance management technology that helps you on the road to minimal downtime.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Borland, Micro Focus

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012


API Management is the SOA Renaissance
sponsored by IBM
WHITE PAPER: Forward-thinking organizations are moving to more open ecosystems, relying on service-oriented architecture (SOA) and application programming interfaces (APIs). Access this insightful white paper to learn about combining SOA and API management to create more engaging applications through comprehensive integration.
Posted: 11 Mar 2014 | Published: 31 Dec 2013


Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This whitepaper details a security solution to sure up the vulnerabilities associated with web application exposure.
Posted: 06 Mar 2014 | Published: 10 Oct 2013

1 - 25 of 178 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement