IT Management  >   Systems Operations  >   Security  >  

Internet Applications Security

RSS Feed   
Internet Applications Security Reports
 
New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.
Posted: 26 Mar 2013 | Published: 26 Mar 2013

SearchSecurity.com

Key Data Protection Requirements of GDPR
sponsored by Fortinet, Inc.
WHITE PAPER: To prevent attacks and adhere to the GDPR, advanced threat protection and detection is critical. This GDPR checklist offers everything your company needs to comply with the regulation as well as strategies for improving your security posture.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Fortinet, Inc.

State of the Phish 2018
sponsored by Wombat Security Technologies
RESEARCH CONTENT: According to Wombat Security's State of the Phish 2018 Report, 76% of respondents said they experienced phishing attacks in 2017. This report helps CISOs and their teams identify opportunities to more effectively manage end-user risk within their organizations.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Wombat Security Technologies

Getting the Most out of your AppSec Program
sponsored by WhiteHat Security
VIDEO: According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.
Posted: 23 Jan 2018 | Premiered: 23 Jan 2018

WhiteHat Security

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

Web Application Security Insider's Edition
sponsored by SearchSecurity.com
EZINE: This Insider Edition will help you understand threats against Web applications, how you can help developers with security tools and training and how to deploy technologies such as Web application firewalls to keep your organization's Web presence safe.
Posted: 19 Sep 2013 | Published: 18 Sep 2013

SearchSecurity.com

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert
sponsored by Symantec Corporation
EGUIDE: This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

Symantec Corporation

Mapping Security for your Virtual Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

HP Fortify on Demand
sponsored by Hewlett Packard Enterprise
DATA SHEET: Access this data sheet to discover an on-demand solution that tests the security of software quickly, accurately, and affordably.
Posted: 18 Aug 2014 | Published: 31 Jul 2013

Hewlett Packard Enterprise

SSL Certificate Management: Avoiding Common Mistakes
sponsored by GeoTrust, Inc.
EGUIDE: This expert E-Guide from SearchSecurity.com explores the common mistakes inherent to SSL certificate management and provides advice on how to avoid them. View now to learn more!
Posted: 09 May 2013 | Published: 09 May 2013

GeoTrust, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement