IT Management  >   Systems Design and Development  >   Application Development  >  

Security-related Design

RSS Feed   
Security-related Design Reports
 
4 Ways to Improve Your DevOps Testing
sponsored by xMatters, Inc.
WHITE PAPER: Explore some of the most common DevOps testing mistakes and learn how to optimize your testing processes. Delve down into topics like why service monitoring and testing matter, and how DevOps is failing 3 key tenets of privacy compliance.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

xMatters, Inc.

A New Security Strategy that Protects the Organization When Work Is Happening from Anywhere
sponsored by Citrix
RESOURCE: The concept of the "digital perimeter" has changed dramatically. Protecting the perimeter by building a wall too keep the bad guys out is no longer appropriate because of mobility, the cloud and constant remote access to internal systems. In this resource, learn how to better secure your organization against increasingly sophisticated attacks.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

Citrix

A CISO’s Guide to Fixing Flat Networks and Vulnerable Systems
sponsored by ShieldX
WHITE PAPER: Traditional perimeter security is obsolete when it comes to preventing lateral hacker movement in the cloud era. Even Gartner recommends an updated approach focused on security access at the workload level. This guide highlights the faults of traditional security tactics includes a checklist of the benefits of a micro-segmentation approach.
Posted: 24 Jan 2020 | Published: 30 Nov 2018

ShieldX

Security for Cloud and On-Premises Deployment
sponsored by Mendix
WHITE PAPER: In this whitepaper, take an in-depth look at the Mendix platform, specifically as it relates to security for cloud, private cloud & on-premises environments. Download this report & discover why businesses across multiple industries trust Mendix to oversee the protection of their mission-critical data.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Mendix

Leveraging the Agility of DevOps Processes to Secure Hybrid Clouds
sponsored by Trend Micro, Inc.
WHITE PAPER: In this white paper, explore how hybrid clouds bring changes to business models, methodologies, and technologies, the intersection of which represents an opportunity to efficiently improve an organization's cybersecurity while also enabling the speed of business.
Posted: 02 Apr 2019 | Published: 30 Apr 2018

Trend Micro, Inc.

Contrast Assess Route Intelligence
sponsored by Contrast Security
DATA SHEET: Learn how Contrast Assess Route Intelligence transforms AppSec by observing the routes of an application while it’s running—thereby exposing all the different points of entry into the application.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Contrast Security

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by SearchSecurity.com
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com

Podcast: How Security is well suited for Agile development
sponsored by IBM
PODCAST: Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.
Posted: 09 Jun 2011 | Premiered: Jun 7, 2011, 13:30 EDT (17:30 GMT)

IBM

DevSecOps: Putting the Security in DevOps
sponsored by Sonatype
EGUIDE: Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
Posted: 08 May 2017 | Published: 04 May 2017

Sonatype

Presentation Transcript: How Security is Well Suited for Agile Development
sponsored by IBM
PRESENTATION TRANSCRIPT: View this presentation transcript as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and learn how security is linked to the software development lifecycle.
Posted: 21 Jun 2011 | Published: 21 Jun 2011

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info