Application Security Reports

Taking Action to Secure Web Applications
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.
Posted: 03 May 2013 | Published: 03 May 2013

TechTarget Security

PCI Council issues mobile application rules for software developers
sponsored by TechTarget Security
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

How a next-generation firewall prevents application-layer attacks
sponsored by TechTarget Security
EGUIDE: The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

TechTarget Security

Security Information Management Systems and Application Monitoring
sponsored by TechTarget Security
EGUIDE: Did you know your security information management (SIM) system can shed light on application performance issues? This E-Guide details a four-step process for integrating apps into your SIM. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

TechTarget Security

Discover the Risks and Rewards Behind a Mobile Workforce
sponsored by TechTarget Security
EGUIDE: Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

TechTarget Security

Mobile Application Management in the BYOD Era
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchConsumerization.com serves as the Enterprise Mobile Application Management Guide, exploring the strategies and tools available for managing the security of your BYOD applications.
Posted: 29 Mar 2013 | Published: 29 Mar 2013

TechTarget Security

New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM
sponsored by TechTarget Security
EGUIDE: This expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.
Posted: 26 Mar 2013 | Published: 26 Mar 2013

TechTarget Security

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by TechTarget Security
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

TechTarget Security

Mobile Device Management Systems Help Mitigate BYOD Risks
sponsored by TechTarget Security
EGUIDE: This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

TechTarget Security

Mobile Device Management Technical Guide
sponsored by TechTarget Security
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

TechTarget Security

Weighing the Options for an Enterprise Mobility Strategy
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

TechTarget Security

Choosing an MDM System: Fundamental Features for Success
sponsored by TechTarget Security
EGUIDE: There's a huge number of mobile device management (MDM) functions that exist today. Read this expert E-Guide to get a condensed list of the major MDM system features that most organizations require.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

TechTarget Security

Mobile: The Technology Game-Changer in 2013
sponsored by TechTarget Security
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

TechTarget Security

Public Cloud Security Tips and Best Practices
sponsored by TechTarget Business Analytics
EGUIDE: This expert E-Guide counts down 10 ways that that you can keep your applications safe in the public cloud. Also inside, uncover essential best practices for protecting your data and applications – read on to learn more.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

TechTarget Business Analytics

SSL Certificate Management: Avoiding Common Mistakes
sponsored by GeoTrust, Inc.
EGUIDE: This expert E-Guide from SearchSecurity.com explores the common mistakes inherent to SSL certificate management and provides advice on how to avoid them. View now to learn more!
Posted: 09 May 2013 | Published: 09 May 2013

GeoTrust, Inc.

On the Safe Side: Managing Security in Mobile Apps
sponsored by TechTarget Software Quality
EBOOK: This expert three-part guide provides you with all you need to know about ensuring the security of your mobile enterprise applications.  Continue on the get advice from the pros on topics such as: 7 most important security measures for enterprise data, advice on securing mobile apps, key security mistakes mobile developers make, and more.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

TechTarget Software Quality

SymEd Solutions from Symantec: Endpoint Management and Mobility
sponsored by Insight Public Sector and Symantec
WHITE PAPER: Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.
Posted: 29 Apr 2013 | Published: 31 Dec 2012

Insight Public Sector and Symantec

How to develop cloud applications based on Web app security lessons
sponsored by Hewlett Packard Enterprise
EGUIDE: Read this expert guide to get a walk-through on developing secure applications for the cloud, and what controls need to put in place once cloud-based applications are deployed. Find out more about secure development platforms, input filtering, authentication and more.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Hewlett Packard Enterprise

Oracle Mobile and Social Service: The Next Step in IAM
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: As cloud computing, mobile computing and social computing infiltrate the enterprise, an "identity explosion" is occurring – one which requires a new IAM strategy. This whitepaper explores the next steps in IAM and how to keep your enterprise safe.
Posted: 24 Apr 2013 | Published: 30 Nov 2012

Oracle Corporation UK Ltd

Security in the Age of Mobility
sponsored by Trend Micro
WHITE PAPER: This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro

Go Daddy Sets a New Standard for SecureOnline Experiences
sponsored by Trend Micro
WHITE PAPER: As a top web hosting company, Go Daddy has a big responsibility to its more than 9 million customers to provide comprehensive data security from today's threats. Read on to find out how Go Daddy was able to improve protection and ensure fast, flexible response to ever-changing threats with low total cost of ownership.
Posted: 11 Apr 2013 | Published: 31 Dec 2011

Trend Micro

Application Visibility and Control
sponsored by Aerohive Networks
WHITE PAPER: Read on to discover a way you can visualize, monitor and manage your edge network infrastructure, and learn how to keep track of when and where users are attempting to access your network and how it is being used.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Aerohive Networks

Network Security Technologies Technical Guide
sponsored by TechTarget Security
WHITE PAPER: Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Posted: 03 Apr 2013 | Published: 31 Dec 2012

TechTarget Security

Mobile Application Delivery Handbook
sponsored by TechTarget Mobile Computing
EZINE: Explore this expert IT handbook that offers advice for securely and effectively delivering reliable mobile apps to end users. Gain additional insights on mobile app virtualization, security and delivery methods.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

All resources sponsored by TechTarget Mobile Computing

Choosing & Managing Mobile Devices Ch.1
sponsored by TechTarget Mobile Computing
EBOOK: Are you prepared to face the latest mobile trends? Read this whitepaper to learn about the critical data security and employee-related challenges today's IT leaders are facing. Discover what you need to know when it comes to handling mobile devices, dealing with device diversity, and more.
Posted: 25 Feb 2013 | Published: 25 Feb 2013

TechTarget Mobile Computing