IT Management  >   Systems Design and Development  >   Application Development  >  


RSS Feed   
SDL Reports
Best Practices For Container Security
sponsored by VMware Tanzu
ANALYST REPORT: Traditional security tools aren’t cutting it in the world of containers. Luckily, this Forrester report identifies the security strategies and alternatives that do work in a container environment. Get started now—explore the best practices for container security here.
Posted: 03 Feb 2021 | Published: 03 Feb 2021

VMware Tanzu

sponsored by Contrast Security
WHITE PAPER: According to the State of DevSecOps report, 79% of IT leaders admit their average application in development has an average of 20 or more vulnerabilities. Download the State of DevSecOps report here to explore which security solutions are keeping organizations safe and reliable this year.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Contrast Security

Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

How to deploy a comprehensive DevSecOps solution
sponsored by Red Hat
WHITE PAPER: As DevOps tools grow and evolve quickly, securing DevOps can feel more and more impossible. In reality, SecDevOps is just getting a bit more complicated—and complex systems are a DevOps engineers’ forte. Learn how to stay confident while deploying your DevSecOps framework with this Red Hat guide.
Posted: 05 Apr 2021 | Published: 05 Apr 2021

Red Hat

Enabling a SASE Approach to Private Application Access and Security
sponsored by Axis Security
WHITE PAPER: Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Mobile Security App-titude
sponsored by WhiteHat Security
WEBCAST: View Mobile Security App-titude: Best Practices for Secure App Design and Data Privacy to learn about PII – what data is being collected, how sensitive information can be compromised, how you can protect user data, and more.
Posted: 24 Nov 2020 | Premiered: Nov 24, 2020

WhiteHat Security

Application Security: The Easy Way
sponsored by Ionic Security
RESOURCE: Securing internal applications is a top priority among IT security teams. Yet achieving it is time & resource consuming. In fact, 76% of total IT expenditure is spent on securing internal apps. It doesn’t need to be so difficult – this blog post highlights how Ionic’s data-centric Machina Tools may be able to help. Read on to learn more.
Posted: 03 Mar 2020 | Published: 16 Aug 2018

Ionic Security

VMs vs. containers: Which is better for security?
sponsored by
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

Securing Red Hat OpenShift Containerized Applications at Enterprise Scale
sponsored by Red Hat
WEBCAST: Over 90% of Fortune 500 companies leverage Red Hat products and solutions – one of which is their OpernShift platform for containerized applications. Professionals looking to add additional security for OpenShift should leverage this webinar detailing how CyberArk’s out-of-the-box integrations can help, demo included.
Posted: 13 Apr 2021 | Premiered: Jun 24, 2020

Red Hat

Untangling Work and Personal Data with Enterprise MAM
sponsored by IBM
EBOOK: This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Browse by Report Type:
SDL White Papers | SDL Multimedia | SDL IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences