Application Security Reports

Presentation Transcript: Path to a Secure Application
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

IBM

Windows Azure Platform Security Essentials for Technical Decision Makers
sponsored by Microsoft
WEBCAST: In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform.
Posted: 01 Dec 2010 | Premiered: Dec 1, 2010

Microsoft

E-Book: Technical Guide on Network Security Monitoring
sponsored by AVG Technologies USA, Inc.
EBOOK: Your organization’s network is more than a collection of pipes through which traffic flows: it’s your business’ fundamental IT architecture. Your security devices keep a watchful eye on traffic and systems, and maintain the integrity of your data and systems. Check out this guide to network security monitoring from SearchMidmarketSecurity.com.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

AVG Technologies USA, Inc.

Security Best Practices for Developing Windows Azure Applications
sponsored by Microsoft
WHITE PAPER: Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform. 
Posted: 18 Nov 2010 | Published: 17 Nov 2010

Microsoft

E-Guide: Best Practices for Developing Secure Applications
sponsored by IBM
EGUIDE: This expert e-guide brought to you by SearchSecurity.com, explains the importance of integrating application security throughout the entire software development lifecycle and provides 4 tips that must be kept in mind on the application security forefront. Read on to uncover these tips and review an assessment of Web application security.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

IBM

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management
sponsored by Information Security Magazine
EZINE: November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!
Posted: 10 Nov 2010 | Published: 10 Nov 2010

Information Security Magazine

Enterprise Management Associates Report-- The Power of AppScan: A Hands-On Review of IBM Rational AppScan Standard Edition
sponsored by IBM
WHITE PAPER: In a hands-on look at IBM Rational AppScan Standard Edition, the Enterprise Management Associates® (EMA™) team finds in the product an easily implemented, highly configurable utility that addresses multiple application security pain points.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

IBM

Platform-as-a-Service Private Cloud with Oracle Fusion Middleware (Spanish version)
sponsored by Oracle Corporation
WHITE PAPER: Download this free white paper to learn how platform-as-a-service private cloud offers enterprises one of the best ways to take advantage of cloud computing.
Posted: 26 Oct 2010 | Published: 01 Oct 2009

Oracle Corporation

Take Back Control: Increase Security, Empower Employees, Protect the Business
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

WatchGuard Technologies, Inc.

Threat Containment for Facebook
sponsored by BlueCoat
WHITE PAPER: This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.
Posted: 08 Oct 2010 | Published: 08 Oct 2010

BlueCoat

IT@Intel White Paper: Remediating Applications when Migrating from Microsoft Windows XP to Microsoft Windows 7
sponsored by Intel
WHITE PAPER: Read this paper to learn why Intel is migrating from Microsoft Windows XP to Microsoft Windows 7, and how the new system is expected to boost long-term performance, security, manageability, and productivity needs.
Posted: 27 Sep 2010 | Published: 10 May 2010

Intel

Lumension Endpoint Security: Device Control and Application Control
sponsored by Lumension
TRIAL SOFTWARE: The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
Posted: 13 Sep 2010 | Premiered: 13 Sep 2010

Lumension

The Right Tool for the Right Job: An Application Security Tools Report Card
sponsored by IBM
WHITE PAPER: This white paper examines the most common tools found in the enterprise application security environment.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM

E-Book: Hosting Applications in the Cloud
sponsored by SAVVIS
EBOOK: Whether it's public cloud, private cloud or a hybrid of the two, IT can be delivered as a service to today’s businesses faster, cheaper and more efficiently than ever before. Read this E-Book to learn more.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

SAVVIS

Intrusion Defense Firewall: Network-Level HIPS at the Endpoint
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper examines a blended approach to host intrusion defense in search optimal security combined with an ideal balance between flexibility, control, and ease of management. Specific examples highlight the benefits and pitfalls of the many different filtering techniques.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Presentation Transcript: Application Development-- Improving Productivity Among Evolving Application Platforms
sponsored by ASG Software Solutions
PRESENTATION TRANSCRIPT: Join special guest Jeffrey S. Hammond, Principal Analyst at Forrester Research, Inc., and Ian Rowlands from ASG, as they discuss some of the options shops have at their disposal for improving consistency and cross platform governance of your application development efforts.
Posted: 13 Jul 2010 | Published: 13 Jul 2010

ASG Software Solutions

Safe & Secure: An Overview of Security Features In JBoss Application Platforms
sponsored by Red Hat
WEBCAST: Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
Posted: 08 Jul 2010 | Premiered: Jul 8, 2010

Red Hat

The Application Usage and Risk Report
sponsored by Palo Alto Networks
WHITE PAPER: The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Palo Alto Networks

Solution Brief: Accelerating SSL Applications Across the WAN
sponsored by BlueCoat
WHITE PAPER: Secure Sockets Layer (SSL) is the industry-standard protocol for establishing a secure communications link when transmitting information over untrusted networks. However, SSL can create complications when it comes to prioritizing, optimizing, and accelerating network traffic. This paper outlines a solid strategy for optimizing SSL applications.
Posted: 23 Jun 2010 | Published: 23 Jun 2010

BlueCoat

Citrix and Intel Deliver Client Virtualization
sponsored by Citrix
WHITE PAPER: Citrix and Intel worked together to deliver local virtual machine desktops, aiming to make virtualization ubiquitous on client devices. The result of the collaboration is Citrix® XenClient™, a local desktop virtualization platform that provides new levels of security and user flexibility for enterprise desktops. Continue reading to learn more.
Posted: 10 Jun 2010 | Published: 09 Jun 2010

Citrix

E-Book: Technical Guide on Vulnerability Management
sponsored by TechTarget Security
EBOOK: SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
Posted: 03 Jun 2010 | Published: 03 Jun 2010

TechTarget Security

Data Sheet: Trend Micro Deep Security 7
sponsored by Trend Micro
DATA SHEET: This data sheet outlines the benefits of Trend Micro Deep Security, which provides server security in physical, virtual, and cloud computing environments. This comprehensive solution also protects applications, operating systems, web applications, and enterprise systems from attacks.
Posted: 14 Apr 2010 | Published: 21 Oct 2009

Trend Micro

Secure Smartphone Apps: The Next Generation
sponsored by BlackBerry
WHITE PAPER: The latest smartphone applications foster more mobility and productivity than ever before--as long as a secure mobile network is in place. This white paper addresses mobile applications and the potential security threats to the corporate networking as well as provide security measures to take.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

BlackBerry

Secure File Transfer Solution Saves Bank Time and Money
sponsored by Linoma Software
CASE STUDY: Integra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.
Posted: 24 Mar 2010 | Published: 24 Mar 2010

Linoma Software

Beating Web Application Security Threats
sponsored by Thawte Inc.
EBOOK: The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.
Posted: 18 Mar 2010 | Published: 18 Mar 2010

Thawte Inc.