All resources sponsored by:

Data Theorem

14 Matches
Securing the Mobile and API Connected Work Space: Evernote Case Study
sponsored by Data Theorem
VIDEO:Evernote is a global software provider of mobile applications for individuals and teams. In this video, learn how Data Theorem helped Evernote identify and close 105 security issues and remove 17 harmful third-party libraries, all before releasing them to the public app stores.
Posted: 18 Sep 2019 | Premiered: 18 Sep 2019
Get This Now


Security for DevOps - Enterprise Survey Report
sponsored by Data Theorem
ANALYST REPORT:In order to get more insight into securing cloud-native applications, ESG surveyed IT and cybersecurity professionals responsible for evaluating, purchasing, and managing cloud security technology products and services. Read on for key research findings.
Posted: 18 Sep 2019 | Published: 18 Sep 2019
Get This Now


How to Automate API Security
sponsored by Data Theorem
WHITE PAPER:As software goes into production on a weekly, daily, and hourly basis, teams need to know if any APIs are vulnerable and be alerted to any changes in how it is being used. In this white paper, discover the benefits of automated API security, the problems with securing modern APIs, and more.
Posted: 13 Sep 2019 | Published: 13 Sep 2019
Get This Now


Data Theorem Interview Digital Anarchist RSA Conference 2019
sponsored by Data Theorem
VIDEO:In this interview from the 2019 RSA Conference, listen to Data Theorem's senior leaders, Himanshu Dwivedi and Doug Dooley, talk about the benefits of Data Theorem's newest API security product offerings.
Posted: 25 Jun 2019 | Premiered: 25 Jun 2019
Get This Now


How to Deal with Fraudulent Counterfeit Apps
sponsored by Data Theorem
WEBCAST:A counterfeit app is an unauthorized app that exploits the reach and user of a brand or mobile app for financial gain. In this webinar, learn about the different types of counterfeit apps and how to spot them.
Posted: 24 Jun 2019 | Premiered: Jun 24, 2019
Get This Now


How to Automate an API Security Program
sponsored by Data Theorem
WEBCAST:Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019
Get This Now


Webinar: Top 6 Security Needs for APIs and Serverless Apps
sponsored by Data Theorem
VIDEO:In this webinar, discover the top 6 API security needs for APIs and apps across serverless platforms such as AWS Lambda, Google Cloud Functions and Azure Functions.
Posted: 12 Apr 2019 | Premiered: 12 Apr 2019
Get This Now


How to Automate Mobile AppSec without the Staff
sponsored by Data Theorem
WEBCAST:The demand for mobile apps has caused a need for developers to improve and release features at an unprecedented rate to stay ahead of the competition—the hard part is making sure security doesn't fall through the cracks. Watch this webinar to learn top challenges and problems facing security teams for mobile AppSec and how you can remedy them.
Posted: 11 Apr 2019 | Premiered: Apr 11, 2019
Get This Now


Automating Software Security Checks for Open Source Software and SDKs
sponsored by Data Theorem
WEBCAST:The growth of open source software (OSS) and 3rd-party software development kits (SDKs) have been on the rise over the last 5 years, and for good reason. But there are downsides. Learn about them in this webinar, which covers: Risks of using OSS and SDKs for apps, challenges of staying ahead of vulnerability issues in 3rd-party software, and more.
Posted: 11 Apr 2019 | Premiered: Apr 11, 2019
Get This Now


How 1 Company Combats App Issues Before Public Release
sponsored by Data Theorem
CASE STUDY:Learn how Data Theorem's App Secure is helping Evernote identify and fix variety of vulnerability issues in their apps before releasing them to the public app stores.
Posted: 10 Apr 2019 | Published: 10 Apr 2019
Get This Now


Wildflower Health Case Study
sponsored by Data Theorem
CASE STUDY:Wildflower helps families manage their health needs on one shared mobile application. However, the development team was facing both regulatory compliance and customer demand issues, as their apps process sensitive HIPAA-regulated data. In this case study, learn how Wildflower was able to achieve security coverage of all their mobile apps.
Posted: 09 Apr 2019 | Published: 09 Apr 2019
Get This Now


RingCentral Case Study
sponsored by Data Theorem
CASE STUDY:RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019
Get This Now


Automate Compliance Audits Without the Staff
sponsored by Data Theorem
WEBCAST:Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.
Posted: 09 Apr 2019 | Premiered: Feb 1, 2019
Get This Now


Top 6 API Security Needs for Serverless Apps
sponsored by Data Theorem
WHITE PAPER:The growth in serverless apps is going to accelerate because the cost and time benefits for developers are overwhelmingly positive. However, the 6 areas in this white paper highlight the need for a new approach to security with an architecture that is substantially different than previous techniques. Read on to learn more.
Posted: 08 Apr 2019 | Published: 08 Apr 2019
Get This Now


14 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement