Application Security White Papers

(View All Report Types)
Kaspersky Endpoint Security 8 for Windows
sponsored by Kaspersky
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011

Kaspersky

Testing and Quality Management - Best Practices
sponsored by SAP America, Inc.
WHITE PAPER: Read this white paper to learn the best practices for testing and configuration that Aberdeen's best-in-class designated organizations used to reduce operating costs by 26% and improve process efficiencies by 41% so you can adopt them to create a streamlined, stable IT environment for your business.
Posted: 07 May 2012 | Published: 28 Feb 2010

SAP America, Inc.

More Complex = Less Secure: Miss a Test Path and You Could Get Hacked
sponsored by McCabe Software, Inc.
WHITE PAPER: The same improvements that increase software performance create new security risks that IT pros must contend with. This white paper takes a closer look at the nature of software complexity and describes tactics you can implement to minimize it.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Software Security Analysis: Control Flow Security Analysis with McCabe IQ
sponsored by McCabe Software, Inc.
WHITE PAPER: Read this white paper to learn how comprehensive security analysis equips you with the proper insight into the structure of your software code to identify and resolve possible security holes
Posted: 17 Apr 2012 | Published: 17 Apr 2012

McCabe Software, Inc.

The Application Usage and Risk Report
sponsored by Palo Alto Networks
WHITE PAPER: This Application Usage and Risk Report from Palo Alto Networks provides a global review of enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide. View now to uncover key findings so that you can build effective strategies to mitigate the risks inherent in certain application.
Posted: 16 Apr 2012 | Published: 01 Dec 2011

Palo Alto Networks

The Ten "Must Haves" for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Discover why an end-to-end mobile security framework is vital to protecting your network, corporate information, and the devices accessing them.
Posted: 08 Mar 2012 | Published: 30 Dec 2011

Zenprise

Intel® Cloud Builders Guide: Secure Cloud On-Boarding over Distance for Mission-Critical Applications
sponsored by Intel
WHITE PAPER: This white paper provides detailed insights on what cloud on-boarding and cloud bursting operations are and introduces technologies you can leverage to simplify both. Discover how easy it can be to securely migrate application workloads between your cloud environments when you have the right strategy in place.
Posted: 01 Mar 2012 | Published: 01 Sep 2011

Intel

Looking Beyond Mobile Device Management to Mobile Application and Enterprise Mobility Management
sponsored by Apperian, Inc.
WHITE PAPER: Discover why it is important for organizations to look beyond mobile device management and implement a mobile application management solution and an all-encompassing enterprise mobility management strategy.
Posted: 24 Feb 2012 | Published: 31 Aug 2011

Apperian, Inc.

Integrate banking services with IBM WebSphere DataPower Integration Appliance XI50 for zEnterprise
sponsored by IBM
WHITE PAPER: An enterprise service bus (ESB) increases the flexibility provided by a service oriented architecture (SOA) by decoupling a service requester from a service provider. Read this white paper to learn how these capabilities can be used by banks to simplify integration of banking services, lower costs and speed up time to market.
Posted: 14 Feb 2012 | Published: 28 Feb 2011

IBM

Running Microsoft Apps on FlexPod for Vmware
sponsored by NetApp
WHITE PAPER: This white paper outlines the benefits associated with virtualizing Microsoft applications, and discusses how a newly-introduced infrastructure solution can simplify the management and cost associated with this process. Read on to learn more about this emerging technology and its benefits.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

NetApp

Disaster Preparedness: Is there a hole in your disaster recovery plan?
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to learn how software escrow agreements can be a critical tool to help ensure application continuity within your business continuity plan.
Posted: 04 Jan 2012 | Published: 04 Jan 2012

Iron Mountain

Enterprise level security, the Huddle way.
sponsored by Huddle
WHITE PAPER: This paper will give you an overview of Huddle's secure infrastructure and policies.
Posted: 01 Jan 2012 | Published: 29 Dec 2011

Huddle

How Verification Services Fortify Your Software Escrow Solution
sponsored by Iron Mountain
WHITE PAPER: This paper examines the types of verification services used in the escrow industry. It discusses why verification has become a best practice for both the users of software and the developers creating the applications, as well as a solid recommendation by the lawyers who advise them.
Posted: 28 Dec 2011 | Published: 28 Dec 2011

Iron Mountain

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

Control Your Corner of the Cloud
sponsored by Intel
WHITE PAPER: Trusted compute pools allow you to control more aspects of your cloud deployment, enabling a secure transition. This white paper outlines how this foundation can ensure that your apps and data are moving across protected platforms.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

Intel

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: To maintain application performance and availability, enterprises must upgrade their application delivery controller (ADC) and SSL infrastructure. Specifically, consideration should be given to selecting an ADC, like Citrix NetScaler.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Citrix

8 reasons why Citrix NetScaler beats F5
sponsored by Citrix
WHITE PAPER: This white paper discusses eight important areas where Citrix NetScaler beats F5 in making enterprise networks cloud ready.
Posted: 07 Oct 2011 | Published: 07 Oct 2011

Citrix

Intel Cloud Builders Guide: Cloud Design and Development on Intel Platforms Trusted Computer Pools with Parellels
sponsored by Intel
WHITE PAPER: This white paper describes six key aspects of security and offers advice for addressing them in your cloud strategy.
Posted: 23 Aug 2011 | Published: 22 Aug 2011

Intel

Taking Enterprise Application Integration Into The Cloud
sponsored by DellEMC and Intel®
WHITE PAPER: Of all the advancements to enterprise computing, the cloud is the latest, coming with an assortment of promises to totally reshape your organization's computing approach. Access this brief and exclusive resource for an overview of cloud computing, specifically software-as-a-service.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

DellEMC and Intel®

Controlling Risk Through Software Code Governance
sponsored by Coverity by Synopsys
WHITE PAPER: Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain.
Posted: 27 Jul 2011 | Published: 26 Jul 2011

Coverity by Synopsys

Managing data and application security risks cost effectively
sponsored by IBM
WHITE PAPER: This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit.
Posted: 01 Jul 2011 | Published: 01 Oct 2009

IBM

The Future of Enterprise Computing: Preparing for the Compute Continuum
sponsored by Intel
WHITE PAPER: Server virtualization and the cloud are creating a future for enterprise computing in which access to information via a variety of devices from any location at any time will be mission-critical. Access this exclusive resource to help formulate a plan for a continuous end-user experience.
Posted: 13 Jun 2011 | Published: 01 May 2011

Intel

VMware vCloud Director: Build Secure Private Clouds to Deliver Infrastructure as a Service
sponsored by VMware, Inc.
WHITE PAPER: By now, many organizations have taken advantage of the benefits cloud computing can provide. So how can you gain even more benefits from your cloud without sacrificing security or control? Learn about a private cloud platform that allows IT organizations to become cloud service providers for the business.
Posted: 20 May 2011 | Published: 20 May 2011

VMware, Inc.

Cloud computing for the enterprise, Part 3: Using WebSphere CloudBurst to create private clouds
sponsored by IBM
WHITE PAPER: This article provides an introduction to IBM® WebSphere® CloudBurst™ and WebSphere Application Server Hypervisor Edition.
Posted: 19 May 2011 | Published: 19 May 2011

IBM