Mobile API Management Best Practices
sponsored by TechTarget Security
EGUIDE:
This expert guide from SearchSOA.com discusses crucial best practices for mobile API management, examining the latest technologies and providing feedback from companies who have recently implemented mobile API management solutions.
Posted: 25 Oct 2013 | Published: 25 Oct 2013
|
|
|
CLOUD API SECURITY RISKS: HOW TO ASSESS CLOUD SERVICE PROVIDER APIS
sponsored by TechTarget Security
EGUIDE:
This expert guide from SearchCloudSecurity.com takes an in-depth look at API security, answering critical questions and providing helpful tips for securing your cloud APIs.
Posted: 19 Sep 2013 | Published: 19 Sep 2013
|
|
|
Application Control at the Wireless Edge
sponsored by Xirrus
WHITE PAPER:
This exclusive paper examines an application control solution that uses next-generation Deep Packet Inspection (DPI) technology to deliver Layer 7 application visibility and policy control.
Posted: 24 Oct 2013 | Published: 24 Oct 2013
|
|
|
Web Application Performance Management
sponsored by Radware
WHITE PAPER:
This white paper introduces a solution that not only allows users to measure end-to-end application, network and browser rendering performance data in real-time, but also one that automatically accelerates web sites; optimizing HTML dynamically and reducing web page build times by up to 50% on PC and mobile browsers.
Posted: 24 Oct 2013 | Published: 30 Sep 2013
|
|
|
Deliver Virtual Apps and Desktops as Mobile Services
sponsored by Citrix
VIDEO:
This video details a solution to BYOD that will give users the personalized experience they crave while keeping your data secure.
Posted: 24 Oct 2013 | Premiered: 24 Oct 2013
|
|
|
Application Hardening: Evolving Techniques for Proactive Enterprise Application Security
sponsored by TechTarget Security
EBOOK:
This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security.
Posted: 21 Oct 2013 | Published: 21 Oct 2013
|
|
|
The Use Case for Integrated Vulnerability Management CORE Security
sponsored by Core Security Technologies
WHITE PAPER:
This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
Posted: 10 Oct 2013 | Published: 10 Oct 2013
|
|
|
Mobilizing Windows Apps from a Centralized Data Center
sponsored by Citrix
WHITE PAPER:
This test report demonstrates the ability to mobilize Windows apps from a central datacenter and deliver them to mobile devices such as tablets.
Posted: 25 Sep 2013 | Published: 25 Sep 2013
|
|
|
Gamania Group tightens security to strengthen game development capability
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
Posted: 25 Sep 2013 | Published: 31 Oct 2012
|
|
|
Mapping Security for your Virtual Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012
|
|
|
Web Application Security Insider's Edition
sponsored by TechTarget Security
EZINE:
This Insider Edition will help you understand threats against Web applications, how you can help developers with security tools and training and how to deploy technologies such as Web application firewalls to keep your organization's Web presence safe.
Posted: 19 Sep 2013 | Published: 18 Sep 2013
|
|
|
AppConnect and AppTunnel: Advanced Security for Mobile Apps
sponsored by MobileIron
WHITE PAPER:
This exclusive resource discusses a security solution that prevents data loss as mobile applications become business-critical and widespread tools in the enterprise.
Posted: 13 Sep 2013 | Published: 13 Sep 2013
|
|
|
Top Three Mobile Application Threats
sponsored by Hewlett-Packard Enterprise
WHITE PAPER:
This white paper reveals the top three mobile application threats enterprises today are facing and offers advice on how to mitigate the potential risks. View now to learn more!
Posted: 06 Sep 2013 | Published: 30 Nov 2012
|
|
|
How The Burgiss Group Manages Business Risk with AppFirst
sponsored by AppFirst
CASE STUDY:
This case study reveals which solution the Burgiss Group trusts to help them monitor the behavior of their applications and systems and – in turn – ensure an optimal experience for their clients. View now to learn more!
Posted: 04 Sep 2013 | Published: 04 Sep 2013
|
|
|
Ensuring Application Security in Mobile Device Environments
sponsored by IBM
WHITE PAPER:
This crucial paper examines mobile application security in the age of BYOD, discussing common threats and what your organization can do to seal up vulnerabilities.
Posted: 03 Sep 2013 | Published: 03 Sep 2013
|
|
|
Video: Amazon Web Services API Security Overview
sponsored by Intel
WEBCAST:
Animation that shows how enterprise APIs can be managed using AWS hosted API management infrastructure that allows you to scale security along with apps in the cloud. Learn how public cloud apps can be quickly secured and expose for rapid mobile access. Learn about API management from the AWS cloud.
Posted: 27 Aug 2013 | Premiered: Aug 27, 2013
|
|
|
Voice over IP (VoIP) Growth and the Strain on Network Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER:
Explore how VoIP can expose your organization to numerous risks and uncover why traditional firewalls often cannot thwart the many challenges VoIP presents.
Posted: 26 Aug 2013 | Published: 26 Aug 2013
|
|
|
BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER:
This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013
|
|
|
SuperMassive Series data sheet
sponsored by Dell Software
PRODUCT OVERVIEW:
The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.
Posted: 23 Aug 2013 | Published: 31 Jul 2013
|
|
|
Computer Weekly special report: Corporate application access through employee-owned mobile devices
sponsored by BlackBerry
WHITE PAPER:
Your employees are accessing the corporate network from mobile devices—learn how to be prepared.
Posted: 20 Aug 2013 | Published: 20 Aug 2013
|
|
|
A Foundation for Next-Generation Data Center Security
sponsored by Citrix
WHITE PAPER:
This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing data center infrastructure.
Posted: 13 Aug 2013 | Published: 28 Sep 2012
|
|
|
How Citrix NetScaler Supports Virtualized Multi-tenant Datacenters
sponsored by Citrix
WHITE PAPER:
Explore how expanding virtualization to your application delivery controllers (ADCs) can help you facilitate the journey to the cloud.
Posted: 12 Aug 2013 | Published: 29 Apr 2011
|
|
|
9 Reasons Why NetScaler Beats F5
sponsored by Citrix
WHITE PAPER:
This whitepaper compares two market-leading application delivery controllers (ADCs) to help your organizations find the one that best aligns with your business needs.
Posted: 12 Aug 2013 | Published: 31 May 2013
|
|
|
Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT:
This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013
|
|
|
Cloud App Success Means End-User Identity Management
sponsored by VMware, Inc.
EGUIDE:
This e-guide takes a deeper look at whether roaming profiles can increase the use and mobility of a cloud app among providers and discusses the impacts of end-user identity management on the success of your cloud apps.
Posted: 25 Jul 2013 | Published: 25 Jul 2013
|
|