All resources sponsored by:

ThreatX

13 Matches
A Guide to AppSec in the Age of APIs & Microservices
sponsored by ThreatX
WHITE PAPER:DevOps and CI/CD pipelines are driving fast, continuous development and security needs to be able to keep pace without slowing down delivery or losing efficacy. Download this white paper to see how major shifts like these are impacting modern application security strategies today.
Posted: 12 Mar 2019 | Published: 12 Mar 2019
Get This Now


How to Separate True Threats from False Positives with Machine Learning
sponsored by ThreatX
WHITE PAPER:Today, AppSec teams have too much to analyze and not enough people to do so. In this white paper, take a look at a blended approach to security alerts and threats and see how your organization can separate true threats from false positives.
Posted: 24 Jan 2019 | Published: 24 Jan 2019
Get This Now


Application Security Evolved: How to Use Attacker-Centric Security to Fix the WAF
sponsored by ThreatX
WHITE PAPER:Download this white paper for a security team's guide to the current state of web application security.
Posted: 15 Oct 2018 | Published: 15 Oct 2018
Get This Now


Using & Protecting Microservices: A Double-edged Sword
sponsored by ThreatX
WHITE PAPER:Microservices and containers are a hot topic right now. While they are making news because of ease of use, there are also challenges associated with protecting them. Read this blog post by Andrew Useckas, CTO of ThreatX to learn about a Web Application Firewall platform that can help secure your microservices.
Posted: 30 Aug 2018 | Published: 30 Aug 2018
Get This Now


Combatting Botnet Traffic with Behavioral Analysis
sponsored by ThreatX
RESOURCE:Find out how to detect and block a number of different distributed attacks with a robust security approach that's designed to grant you visibility into malicious traffic.
Posted: 29 Aug 2018 | Published: 28 Jun 2018
Get This Now


Tightly Coupling Applications and Security for Infinite Scale
sponsored by ThreatX
RESOURCE:Find out how to modernize security so it can keep up with the demands of microservices and container-based app development.
Posted: 29 Aug 2018 | Published: 20 Aug 2018
Get This Now


Exposed & At Risk: Why Your Approach to Web Application Security is Insufficient
sponsored by ThreatX
WEBCAST:Watch this webinar to learn about combining web app security approaches and modern web app firewall tech to address the rapidly evolving the security needs of hybrid cloud environments.
Posted: 29 Aug 2018 | Premiered: Aug 29, 2018
Get This Now


GHX Trusts ThreatX to Secure and Optimize the Performance of the Largest Footprint in Healthcare Supply Chain
sponsored by ThreatX
CASE STUDY:GHX, a healthcare business and data automation company needed to ensure security in their health-care focused technology. Find out how GHX was able to successfully do so using ThreatX's Intelligent Web Application Firewall solution.
Posted: 29 Aug 2018 | Published: 29 Aug 2018
Get This Now


BMC Software Relies on ThreatX to Protect Its Vast Portfolio of Enterprise Applications and Websites Across a Multi-Cloud Environment
sponsored by ThreatX
CASE STUDY:A premier provider of global IT Management found that their traditional security tools could not effectively support and protect their rapidly evolving cloud application portfolio. Find out how they were able to protect their critical business portfolio applications and websites distributed globally across a hybrid cloud environment.
Posted: 27 Aug 2018 | Published: 27 Aug 2018
Get This Now


Your Current Approach to Threat Detection & Neutralization is Broken
sponsored by ThreatX
VIDEO:The complexity of modern cloud, web application, and legacy environments along with mobile, IoT, and web APIs have created a vast attack surface that simply can't be managed by current rules-based approaches and WAF. This webinar covers the challenges and new approaches to threat analysis, and more.
Posted: 02 Jul 2018 | Premiered: 02 Jul 2018
Get This Now


Dynamic Cyber Defenses: A Fresh Approach to an Old Problem
sponsored by ThreatX
RESEARCH CONTENT:In this Frost & Sullivan report, learn why the standard approach of blocking malicious activity has structural shortcomings, and how these prevention shortcomings favor attackers. Also uncover insight about a cloud-based deception approach and a rule-less WAF.
Posted: 02 Jul 2018 | Published: 06 Apr 2018
Get This Now


How to Avoid the Top 3 Pitfalls of Reputation-Based WAF's
sponsored by ThreatX
RESOURCE:Explore 3 common pitfalls of IP/reputation blacklist feeds and how you can avoid them.
Posted: 02 Jul 2018 | Published: 02 Jul 2018
Get This Now


Are Your Defenses Against Web Application Attacks Falling Further Behind?
sponsored by ThreatX
RESEARCH CONTENT:Dive into this 11-page Frost & Sullivan Report to learn why web applications are under attack, the costs associated with an attack and how you can revamp your current web application firewall strategy to continue your business engagements with confidence.
Posted: 28 Jun 2018 | Published: 30 Jun 2018
Get This Now


13 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement