IT Management  >   Systems Operations  >   Applications Management  >  

Web Applications Management

RSS Feed    Add to Google    Add to My Yahoo!
Web Applications ManagementReports
126 - 150 of 160 Matches Previous Page  | Next Page
Try Rational AppScan
sponsored by IBM
ASSESSMENT TOOL: Download Rational® AppScan® Standard Edition V7.9, previously known as Watchfire AppScan, a leading Web application security testing tool that automates vulnerability assessments and scans and tests for all common Web application vulnerabilities including SQL-injection, cross-site scripting, and buffer overflow.
Posted: 03 Nov 2009 | Published: 03 Nov 2009

IBM

Web Application Security for a Smarter Planet
sponsored by IBM
WHITE PAPER: As threats to Web applications continue to grow, IBM offers Web application security for a smarter planet—integrated, end-to-end security to build secure Web applications, run secure Web applications and protect SOA environments.
Posted: 28 Oct 2009 | Published: 09 Jul 2009

IBM

Designing a Strategy for End-to-End Web Protection
sponsored by IBM
WHITE PAPER: Web applications are extremely flexible and valuable assets to any organization. But they’re also vulnerable to threats like hijacking, splitting, forging and injection. Read this white paper to find out how IBM Rational® AppScan® solutions can help your agency overcome virtual threats to achieve mission objectives.
Posted: 27 Oct 2009 | Published: 10 Jul 2009

IBM

Web Platform Installer 2.0
sponsored by Microsoft
TRIAL SOFTWARE: In one neat package, the Web Platform Installer gives you the frameworks, web server, database, tools and applications you need to quickly build and run Web applications and solutions on Windows.
Posted: 20 Oct 2009 | Premiered: 20 Oct 2009

Microsoft

Hosted VoIP Reduces Costs and Improves Efficiencies for Small Business
sponsored by 8x8, Inc.
WHITE PAPER: Read this brief yet informative paper to learn how hosted VoIP can benefit your small business.
Posted: 09 Sep 2009 | Published: 11 Aug 2009

8x8, Inc.

Web application security: automated scanning versus manual penetration testing
sponsored by IBM
WHITE PAPER: There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods.
Posted: 09 Sep 2009 | Published: 01 Jan 2008

IBM

The Dirty Dozen: Preventing Common Application-Level Hack Attacks
sponsored by IBM
WHITE PAPER: This paper describes 12 of the most common hacker attacks and provides basic rules that you can follow to help create more hack-resistant Web applications.
Posted: 09 Sep 2009 | Published: 01 Dec 2007

IBM

The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success
sponsored by Breach Security
WHITE PAPER: This resource provides IT security professionals with the information needed to understand PCI compliance and specifically, one of the standard's latest requirements, 6.6. In addition, the paper offer tips for successful PCI 6.6 compliance and highlights compliance successes from real-world companies.
Posted: 14 Aug 2009 | Published: 08 Jun 2009

Breach Security

Load Testing 2.0 - The Next Generation of Load Testing for the Web 2.0 World
sponsored by Gomez
WHITE PAPER: Read this paper to learn why Load Testing 2.0 solutions are needed and who benefits. Learn best practices to get business value out of advanced load testing features, the limits of load testing 1.0 solutions, how today's approach complements existing 1.0 solutions, and what factors are important for selecting successful Load Testing 2.0 solutions.
Posted: 09 Jul 2009 | Published: 09 Jul 2009

Gomez

Reducing TCO for Web-Based Applications
sponsored by Hewlett Packard Company and Intel
WHITE PAPER: Servers based on the Intel® Xeon® processor 5500 series deliver both intelligent performance and energy efficiency. Migrating to this platform can enable server consolidation in the deployment of database-driven Web applications, resulting in operational cost savings that far exceed the cost of server refresh. Read on to learn more.
Posted: 08 Jul 2009 | Published: 08 Jul 2009

Hewlett Packard Company and Intel

Driving Revenue and Increasing Value with Application Performance Management
sponsored by BlueCoat
EBOOK: As a leading provider of solutions for Service Providers, Blue Coat appliances give you the visibility, acceleration and security needed for optimizing your network. Read this e-book to learn how Blue Coat gives you the control you need to deliver a whole set of new managed services for your business and consumer customers.
Posted: 26 Jun 2009 | Published: 22 Dec 2008

BlueCoat

Managing Application Performance to Achieve Mission Success
sponsored by CA Technologies.
WHITE PAPER: The reliance on web-based applications in government organizations has significant consequences. Success depends on end users' ability to interact well with their web applications. The key to success is an application performance management strategy that monitors end-user experiences and application performance from a transaction perspective.
Posted: 29 Apr 2009 | Published: 01 Feb 2008

CA Technologies.

Seven Design Requirements for Web 2.0 Threat Protection
sponsored by McAfee, Inc.
WHITE PAPER: Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements.
Posted: 23 Apr 2009 | Published: 02 Apr 2009

McAfee, Inc.

IDC ROI Paper: Determining the Return on Investment of Web Application Acceleration Managed Services
sponsored by Akamai Technologies
ANALYST REPORT: To assess and quantify the business benefits of Akamai's Web Application Accelerator (WAA), IDC conducted in-depth interviews with IT staff members of eight organizations using WAA. This paper presents the results of that study.
Posted: 02 Apr 2009 | Published: 02 Apr 2009

Akamai Technologies

Web Application Security - How to Minimise Prevalent Risk of Attacks
sponsored by Qualys
WHITE PAPER: Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options.
Posted: 27 Mar 2009 | Published: 02 Mar 2009

Qualys

Think You Have an Application Delivery Strategy?: The Role of Application Delivery Services Within the Enterprise
sponsored by Akamai Technologies
WHITE PAPER: Read this white paper to learn about the importance of network performance in optimizing all IP-based applications as well as web-based applications. Optimizing application traffic flows can only be achieved by subscribing to an Application Delivery Service (ADS) offered by a managed service provider.
Posted: 09 Feb 2009 | Published: 09 Feb 2009

Akamai Technologies

Avoiding Data Center Costs through Managed Application Delivery Services: Getting the Computing Resources You Need with Minimal Investment
sponsored by Akamai Technologies
WHITE PAPER: In this white paper, Stratecast identifies operating and capital expenses associated with traditional data center options, including private data centers, co-located options, and managed hosting. The cost data will provide a valuable baseline for enterprises to compare against alternatives such as Akamai's dynamic Web acceleration services.
Posted: 09 Feb 2009 | Published: 09 Feb 2009

Akamai Technologies

PCI DSS Success: Archiving Compliance and Increasing Web Application Availability
sponsored by Citrix
WHITE PAPER: This paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc..
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

Blackberry Enterprise Server v4.1 Service Pack 6
sponsored by BlackBerry
WEBCAST: The BlackBerry Enterprise Solution provides push-based access to email; calendar, contacts, tasks and notes; instant messaging; web-based applications and services and enterprise applications.
Posted: 25 Aug 2008 | Premiered: Aug 25, 2008

BlackBerry

The Impact of AJAX on the Network
sponsored by F5 Networks
WHITE PAPER: Though AJAX has a unique impact on the client, server, and the network, these challenges are addressed by existing, proven application delivery methods that address similar challenges arising from other technologies.
Posted: 28 Apr 2008 | Published: 01 Mar 2007

F5 Networks

Improving End-User Performance by Eliminating HTTP Chattiness
sponsored by F5 Networks
WHITE PAPER: Many organizations embark on global multi-million dollar web application deployments only to later discover that their users are unsatisfied with the performance compared to their old client server application. This paper provides alternatives.
Posted: 28 Apr 2008 | Published: 01 Apr 2007

F5 Networks

BIG-IP Application Security Manager™
sponsored by F5 Networks
HARDWARE LISTING: The BIG-IP Application Security Manager delivers the industry's most comprehensive application delivery security solution with the option to deliver both applications together. Read this white paper to learn how this can benefit your company.
Posted: 28 Apr 2008 | Published: 01 Jan 2007

F5 Networks

Best Practices in Application Performance Management
sponsored by CA Technologies.
PODCAST: In this podcast, discover what is meant by an end-to-end approach to Application Performance Management and, from the perspective of the IT organization, why it's so critical.
Posted: 31 Mar 2008 | Premiered: Mar 31, 2008, 09:00 EDT (13:00 GMT)

CA Technologies.

End-User Monitoring: Gaining Visibility into Hidden Business Risks
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how to implement effective end-user transaction monitoring and management to attain greater visibility into the user experience.
Posted: 18 Sep 2007 | Published: 01 Aug 2007

CA Technologies.

CA Wily Customer Experience Manager
sponsored by CA Technologies.
PRODUCT LITERATURE: This white paper highlights a method for attaining real-time visibility into the end-user experience on web-based applications.
Posted: 18 Sep 2007 | Published: 01 Aug 2007

CA Technologies.
126 - 150 of 160 Matches Previous Page    4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement