Web Applications Management Reports

E-Book: Technical Guide on Web Application Firewalls
sponsored by TechTarget Security
EBOOK: Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

TechTarget Security

Solution Brief: Managing the WAN to Optimize Business
sponsored by BlueCoat
WHITE PAPER: Bandwidth management is a common technique employed by IT organizations to improve quality of service over the WAN. It typically involves assigning guaranteed levels of bandwidth and traffic prioritization to improve application performance.
Posted: 01 Apr 2011 | Published: 01 Apr 2011

BlueCoat

IBM DB2 and IBM Power Systems: Transform information into insight and accomodate rising transaction volume - NEW! (Translated) 
sponsored by IBM
WHITE PAPER: This paper explains how the synergy of DB2 and Power Systems can help businesses simplify deployment of Web applications, achieve cost-effective large-scale processing, construct a large-capacity messaging backbone and consolidate workloads-- all accelerating your time to value
Posted: 18 Mar 2011 | Published: 18 Mar 2011

IBM

Presentation Transcript: Save Money with Cloud Computing and Google Apps
sponsored by Google Apps
PRESENTATION TRANSCRIPT: Read this transcript, as Google Apps Expert, Rhonda Stites, walks through a simple financial model that evaluates the savings in adopting Google Apps. You will hear about real customers and their experiences.
Posted: 19 Jan 2011 | Published: 19 Jan 2011

Google Apps

Presentation Transcript: Implementing Cloud Ready Data Management Strategy
sponsored by VMware, Inc.
PRESENTATION TRANSCRIPT: Today's modern, web applications require elasticity, scalability and flexibility. Learn how a cloud-ready approach to data management can help reduce database bottlenecks and improve application performance and availability. Read this presentation transcript and learn how to achieve high performance for your apps.
Posted: 14 Jan 2011 | Published: 14 Jan 2011

VMware, Inc.

Transaction Tracing through Complex Web Applications
sponsored by Dell Software
WHITE PAPER: To ensure that application slowdowns and other revenue-impeding application issues are isolated, diagnosed and fixed quickly, sometimes it’s necessary to trace transactions from their source across all of the technology domains that contribute to transaction response time. Read this paper now to learn more.
Posted: 27 Dec 2010 | Published: 27 Dec 2010

Dell Software

E-Guide: Best Practices for Developing Secure Applications
sponsored by IBM
EGUIDE: This expert e-guide brought to you by SearchSecurity.com, explains the importance of integrating application security throughout the entire software development lifecycle and provides 4 tips that must be kept in mind on the application security forefront. Read on to uncover these tips and review an assessment of Web application security.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

IBM

The Shortcut Guide to Assuring Website Performance through External Web Monitoring
sponsored by Neustar®
EBOOK: Businesses have become dependent on Web sites and RIAs. As dependency increases, so does the complexity of Web site systems and expectations on service delivery. This book offers a detailed look at external monitoring, how to leverage monitoring to protect your brand and a roadmap for implementing and maintaining an external monitoring process.
Posted: 15 Oct 2010 | Published: 15 Oct 2010

Neustar®

Is Your Load Balancer Cloud-Ready?
sponsored by Citrix
WHITE PAPER: Build a Cloud computing infrastructure with maximum availability, performance and security. This white paper shows how you can support public, private or hybrid Cloud configurations, scale app delivery, and support multi-tenant environments with the best load balancing technology.
Posted: 14 Oct 2010 | Published: 14 Oct 2010

Citrix

IBM WebSphere eXtreme Scale and WebSphere DataPower XC10 Appliance
sponsored by IBM
WHITE PAPER: Learn how elastic caching solutions in your distributed environment can empower the application performance you need to obtain business agility and thrive against the competition while managing costs.
Posted: 12 Oct 2010 | Published: 20 Jul 2010

IBM

Integrating IBM WebSphere Portal and IBM Mashup Center Software
sponsored by IBM
WHITE PAPER: This white paper outlines the potential integration options between IBM WebSphere® Portal and IBM Mashup Center software. Organizations can implement these integration options to achieve greater flexibility while lowering costs.
Posted: 17 Aug 2010 | Published: 06 Mar 2009

IBM

Presentation Transcript: Save Money with Cloud Computing and Google Apps
sponsored by Google Apps
PRESENTATION TRANSCRIPT: Read this transcript, as Google Apps Expert, Rhonda Stites, walks through a simple financial model that evaluates the savings in adopting Google Apps. You will hear about real customers and their experiences.
Posted: 11 Jun 2010 | Published: 11 Jun 2010

Google Apps

NetScaler VPX: Harness the Power of Virtualized Web App Delivery
sponsored by Citrix
WHITE PAPER: This technical white paper shows you how the NetScaler VPX virtual appliance offers maximum physical, functional, and operational flexibility for delivering web apps. Learn how virtual application delivery controllers can unleash the power of a virtualized dynamic data center! Compliments of Citrix.
Posted: 08 Jun 2010 | Published: 08 Jun 2010

Citrix

Customer Satisfaction with Application Delivery Controller Vendors
sponsored by Citrix
ANALYST REPORT: Enterprise Management Associates Report: "Customer Satisfaction with Application Delivery Controller Vendors" - shows how Citrix NetScaler beats F5 and Cisco in customer satisfaction. Discover why Citrix is superior in 16 out of 21 categories and tops the competition in Presales, Tech Support, Product, Technology, and Overall Business Value.
Posted: 07 Jun 2010 | Published: 01 Mar 2010

Citrix

Technology Audit: Imperva SecureSphere Data Security Suite
sponsored by Imperva
WHITE PAPER: Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

SharePoint E-Zine Volume 19: Time to Beef Up Code Retention Policies
sponsored by TechTarget Search Windows Server
EZINE: When a separate team is tasked with patching your SharePoint servers, play it safe by adding code retention policies to your governance plan. In this month's issue, learn how to use governance policies effectively so you can respond quickly when a buggy patch puts SharePoint at risk.
Posted: 18 May 2010 | Published: 18 May 2010

TechTarget Search Windows Server

Control IM, P2P and Streaming Applications
sponsored by BlueCoat
DATA SHEET: Blue Coat’s secure Web gateway solution provides network administrators with the tools to control Internet applications, such as IM, P2P and streaming applications. Deployed between internal users and external applications, such as IM datacenters, ProxySG intercepts all outbound and inbound communications.
Posted: 11 May 2010 | Published: 11 May 2010

BlueCoat

Application Awareness for Service Providers
sponsored by BlueCoat
WHITE PAPER: Managed Service Providers (MSPs) can inject application awareness into their services as their next value-add and as a critical differentiator. Anyone offering managed services, either on-premise, in the cloud or as a hybrid solution, must build application awareness into their infrastructures from the bottom up.
Posted: 11 May 2010 | Published: 11 May 2010

BlueCoat

Zynga Grows to #1 Social Gaming Site with RightScale
sponsored by RightScale
CASE STUDY: With the skyrocketing popularity of Zynga games such as FarmVille – which is now the largest single application on Facebook – Zynga’s technology strategy has to be as savvy as its business model. Find out why Zynga now relies on cloud services to manage its precipitous growth, maintain high availability, and keep costs in check.
Posted: 06 Apr 2010 | Published: 06 Apr 2010

RightScale

Managing a Growing Threat: An Executive’s Guide to Web Application Security
sponsored by IBM
WHITE PAPER: Cyber-criminals are leveraging relatively simple application exploits to gain access to sensitive information for fun and profit. It’s more important than ever to implement secure application strategies to effectively protect your business. Read this guide to learn more.
Posted: 12 Mar 2010 | Published: 17 Dec 2007

IBM

Staying a Step Ahead of the Hackers: The Importance of Identifying Critical Web Application Vulnerabilities
sponsored by IBM
WHITE PAPER: Security managers worldwide working for midsize or large organizations share a common goal: to better manage the risks associated with their business infrastructure. This session discusses new and emerging network and application security attacks and ways organizations can protect themselves against Web application and network security threats.
Posted: 10 Mar 2010 | Published: 01 Sep 2008

IBM

Designing a Strategy for End-to-End Web Protection
sponsored by IBM
WHITE PAPER: Web applications are extremely flexible and valuable assets to any organization. But they’re also vulnerable to threats like hijacking, splitting, forging and injection. Read this white paper to find out how IBM Rational® AppScan® solutions can help your agency overcome virtual threats to achieve mission objectives.
Posted: 27 Oct 2009 | Published: 10 Jul 2009

IBM

Web Platform Installer 2.0
sponsored by Microsoft
TRIAL SOFTWARE: In one neat package, the Web Platform Installer gives you the frameworks, web server, database, tools and applications you need to quickly build and run Web applications and solutions on Windows.
Posted: 20 Oct 2009 | Premiered: 20 Oct 2009

Microsoft

Web application security: automated scanning versus manual penetration testing
sponsored by IBM
WHITE PAPER: There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods.
Posted: 09 Sep 2009 | Published: 01 Jan 2008

IBM

The Dirty Dozen: Preventing Common Application-Level Hack Attacks
sponsored by IBM
WHITE PAPER: This paper describes 12 of the most common hacker attacks and provides basic rules that you can follow to help create more hack-resistant Web applications.
Posted: 09 Sep 2009 | Published: 01 Dec 2007

IBM