Application Security Reports

Running Microsoft Apps on FlexPod for Vmware
sponsored by NetApp
WHITE PAPER: This white paper outlines the benefits associated with virtualizing Microsoft applications, and discusses how a newly-introduced infrastructure solution can simplify the management and cost associated with this process. Read on to learn more about this emerging technology and its benefits.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

NetApp

Disaster Preparedness: Is there a hole in your disaster recovery plan?
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to learn how software escrow agreements can be a critical tool to help ensure application continuity within your business continuity plan.
Posted: 04 Jan 2012 | Published: 04 Jan 2012

Iron Mountain

Enterprise level security, the Huddle way.
sponsored by Huddle
WHITE PAPER: This paper will give you an overview of Huddle's secure infrastructure and policies.
Posted: 01 Jan 2012 | Published: 29 Dec 2011

Huddle

Technical Guide on SIM: Moving beyond network security toward protecting applications
sponsored by TechTarget Security
EGUIDE: SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs.
Posted: 01 Jan 2012 | Published: 20 Dec 2011

TechTarget Security

How Verification Services Fortify Your Software Escrow Solution
sponsored by Iron Mountain
WHITE PAPER: This paper examines the types of verification services used in the escrow industry. It discusses why verification has become a best practice for both the users of software and the developers creating the applications, as well as a solid recommendation by the lawyers who advise them.
Posted: 28 Dec 2011 | Published: 28 Dec 2011

Iron Mountain

Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process
sponsored by IBM
PRESENTATION TRANSCRIPT: In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives.
Posted: 09 Dec 2011 | Published: 09 Dec 2011

IBM

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

Presentation Transcript: Are your applications cloud-ready?
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

IBM

Control Your Corner of the Cloud
sponsored by Intel
WHITE PAPER: Trusted compute pools allow you to control more aspects of your cloud deployment, enabling a secure transition. This white paper outlines how this foundation can ensure that your apps and data are moving across protected platforms.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

Intel

E-Guide: Integrating security into the ALM lifecycle
sponsored by IBM
EGUIDE: In this expert e-guide, learn the risks businesses take by not taking application security measures seriously - and find out what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

IBM

E-Guide: Integrating security into the ALM lifecycle
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 16 Nov 2011

TechTarget Security

eGuide: Agile Testing in the Cloud
sponsored by IBM
EGUIDE: For test teams in some application development shops, cloud computing has broken down many of the limitations caused by testing on internal resources. This expert e-guide will cover how to use the cloud for improved Agile testing and how this move to the cloud may help conquer internal limitations.
Posted: 21 Nov 2011 | Published: 16 Nov 2011

IBM

Beating web application security threats
sponsored by TechTarget Security
EGUIDE: Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.
Posted: 14 Nov 2011 | Published: 31 Oct 2011

TechTarget Security

E-Guide: Expert insights to application security testing and performance
sponsored by TechTarget Security
EGUIDE: Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
Posted: 11 Nov 2011 | Published: 11 Nov 2011

TechTarget Security

E-Guide: Remediating IT vulnerabilities: Expert Tips
sponsored by TechTarget Security
EGUIDE: This expert E-Guide uncovers 3 quick ways you can remediate IT vulnerabilities and discusses best practices for improved vulnerability management.
Posted: 10 Nov 2011 | Published: 09 Nov 2011

TechTarget Security

Application security testing: Protecting your application and data
sponsored by TechTarget Security
EBOOK: Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
Posted: 07 Nov 2011 | Published: 07 Nov 2011

TechTarget Security

Technical Guide on Windows Security
sponsored by TechTarget Security
EGUIDE: SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

TechTarget Security

Software Security Delivered in the Cloud
sponsored by Hewlett Packard Enterprise
PRODUCT OVERVIEW: HP Fortify on Demand is a Security-as-a Service (SaaS) testing solution that allows organizations to quickly, accurately and affordably test the security of their applications without the need to manage or install any software. View now to learn more about this cloud-based, automated service.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

Hewlett Packard Enterprise

E-Guide: Best practices for pen testing Web applications
sponsored by TechTarget Security
EGUIDE: This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

TechTarget Security

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: To maintain application performance and availability, enterprises must upgrade their application delivery controller (ADC) and SSL infrastructure. Specifically, consideration should be given to selecting an ADC, like Citrix NetScaler.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Citrix

8 reasons why Citrix NetScaler beats F5
sponsored by Citrix
WHITE PAPER: This white paper discusses eight important areas where Citrix NetScaler beats F5 in making enterprise networks cloud ready.
Posted: 07 Oct 2011 | Published: 07 Oct 2011

Citrix

Network Evolution E-Zine: Adopting an Application-Centric Architecture
sponsored by AdvizeX Technologies
EZINE: This E-Zine examines how networking professionals view applications and how their jobs have changed as a result of a network-centric view.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

AdvizeX Technologies

Expert Tips on Getting Mobile Securely with Virtual Desktops
sponsored by TechTarget Security
EGUIDE: In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices.
Posted: 30 Sep 2011 | Published: 30 Sep 2011

TechTarget Security

Charlotte County Public Schools: Accelerating Web Applications, Streaming Media, and SSL
sponsored by BlueCoat
CASE STUDY: View this case study to discover how Blue Coat SG appliances helped Charlotte County Public Schools radically reduce bandwidth consumption, ensure quality streaming media to large number of students, speed SSL encrypted traffic, provide overall security and control, and more.
Posted: 21 Sep 2011 | Published: 21 Sep 2011

BlueCoat

Introduction to Secure Coding for C/C++
sponsored by Klocwork
RESOURCE CENTER: When budgets, customers and reputations are at stake, software developers need every available tool to ensure that applications and code are as secure as possible. Going a step above and beyond, this interactive online learning center provides detailed lessons for securing C/C++ code.
Posted: 19 Sep 2011 | Published: 19 Sep 2011

Klocwork