IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed   
Software Security Reports
 
Modern Application Delivery for an Adaptive, Reliable Network
sponsored by Citrix
RESOURCE: Traditional app delivery solutions help ensure availability, performance, and security, but not all solutions can bridge the gap between modern and legacy application environments. Download this white paper to learn about a cloud-ready application delivery controller that helps to simplify complex environments and adapt to changing needs.
Posted: 07 May 2020 | Published: 07 May 2020

Citrix

Retail Guide: How to Stay Secure as a Retailer Using Cloud to Revolutionize the Customer Experience
sponsored by DivvyCloud
WHITE PAPER: Today’s retailers are facing stress on several fronts: Customer demands for improved experience, competitive pressures, and the need to ensure regulatory compliance. This cloud security guide for retailers breaks down these common challenges and offers pragmatic advice for developing a roadmap for security and compliance.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

DivvyCloud

Auth0 Platform Introduction
sponsored by Auth0
WEBCAST: This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Auth0

Protecting On-Premises Microsoft Exchange Servers
sponsored by TransientX, Inc
WHITE PAPER: On March 3, 2021 the US Government issued a directive to mitigate vulnerabilities with on-premises Microsoft Exchange servers due to a hack by a state-sponsored group Microsoft calls Hafnium. This day taught the lesson that VPN alone would not protect servers and data. Open this white paper to learn why zero trust can.
Posted: 02 Apr 2021 | Published: 02 Apr 2021


CASB Cloud Application Visibility & Controls
sponsored by iBoss
WHITE PAPER: The ability to apply fine grained controls and gain visibility into cloud application use is critical with the move of applications to the cloud. View this white paper to learn how you can apply these controls to your organization’s CASB.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

iBoss

Equifax Success in Security Transformation
sponsored by Sonatype
CASE STUDY: Access this case study to learn how Equifax achieved a security transformation through Sonatype Nexus Life cycle and Nexus Repository.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Sonatype

On The Radar: Axis Security Takes A Different Approach To Zero-Trust Access
sponsored by Axis Security
WHITE PAPER: Businesses need to ensure that their networks are protected, even when remote employees are accessing applications on a constant basis. But VPNs struggle to meet this need without latency or downtime, so what is the next best option? Download this white paper from Axis Security to discover their cloud-delivered, zero-trust inspired model.
Posted: 08 Jan 2021 | Published: 06 May 2020

Axis Security

Endpoint Defense: Security Controls to Consider Now
sponsored by TechTarget
RESOURCE: The total cost of a successful attack is over $5 million, according to Ponemon Institute's 2017 State of Endpoint Security Risk Report. Simply complete our Endpoint Security Survey to access our complimentary expert guide, Endpoint Defense: Security Controls to Consider Now.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget

The Technology Behind Radware Bot Manager for APIs
sponsored by Radware
WHITE PAPER: APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
sponsored by ComputerWeekly.com
EZINE: In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
Posted: 23 Nov 2020 | Published: 24 Nov 2020

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences