IT Management  >   Systems Operations  >   Security  >  

Web-based Application Security

RSS Feed    Add to Google    Add to My Yahoo!
Web-based Application Security Reports
 
Next-Gen ADCs: The answer to performance woes?
sponsored by Radware
WHITE PAPER: This white paper highlights a next-generation ADC solution that is designed to provide SLA assurance and improvement, enabling application performance management.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radware

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 01 Feb 2015 | Published: 01 Sep 2013

Hewlett-Packard Company

WAF or IPS - Why You Need More Than a Firewall and IPS to Protect Your Applications
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains the importance of using more than just a firewall and IPS to protect your applications from malicious attacks.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by White Hat Security
WHITE PAPER: This white paper breaks down the tocal cost of web app security in the three major risk categories associated with sucessful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 16 Apr 2015 | Published: 14 Oct 2013

White Hat Security

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Disclosures 2012 - The Vulnerability of Publicly Traded Companies
sponsored by Veracode, Inc.
WEBCAST: In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Posted: 24 May 2012 | Premiered: May 23, 2012

Veracode, Inc.

ISM December 2012
sponsored by SearchSecurity.com
JOURNAL ARTICLE: In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

Protect Identities in the Cloud Secure access to SaaS applications made easier
sponsored by McAfee, Inc.
WHITE PAPER: This informative paper examines how your organization can best manage and protect your SaaS applications, discussing common management problems and an advanced security solution that can help secure all aspects of web traffic.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

McAfee, Inc.

How to Leverage Free Tools to Secure Web Apps
sponsored by Imperva
EGUIDE: Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Imperva

The Top 10 Reports for Managing Vulnerabilities
sponsored by Qualys
WHITE PAPER: Observing the complete lifecycle of vulnerability management begins with asset discovery. Learn more about the key steps for successful management with this informative resource. How can you improve your security?
Posted: 30 Jul 2012 | Published: 30 Jul 2012

Qualys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement