Software  >   Systems Software  >   Software Development Tools  >   Application Programming Interfaces  >  

Vendor Independent Messaging Standard

RSS Feed   
Vendor Independent Messaging Standard Reports
 
Intelligent Traffic Replication & Filtering for Virtual Machines
sponsored by Gigamon
PRODUCT OVERVIEW: Access this informative white paper to find out how this vendor's node allows specific traffic flows to be selected, forwarded and delivered to the right analysis, monitoring or security devices – with additional info on its features and benefits.
Posted: 09 Apr 2014 | Published: 30 Jun 2013

Gigamon

Email Recovery: Doing More with Less- How to save Time and Money When Recovering Email
sponsored by Kroll Ontrack, Inc.
WHITE PAPER: This paper shows how the costs associated with recovering email messages from Microsoft® Exchange Server backups can be significant and also provides us with the practical information on how to minimize those costs.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Kroll Ontrack, Inc.

The THG Hosting API
sponsored by Hosting Services
WHITE PAPER: Reducing time to market is always a key goal for app developers, and those who consistently release their products ahead of the competition are at a clear advantage. Examine this white paper to learn how the THG Hosting platform uses an innovative API that allows customers to easily automate processes, host applications, and more.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Hosting Services

How to Build an Enterprise Kubernetes Strategy
sponsored by Rancher
WHITE PAPER: When building a Kubernetes strategy for container deployment, you must assess your container-based goals and leverage Kubernetes in a way that supports them appropriately. Download this strategy guide to learn how you should build your container deployment approach to best fit your specific containers objectives.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Rancher

The Technology behind Radware Bot Manager for APIs
sponsored by Radware
WHITE PAPER: APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Agile is Broken and More SCRUM is Not the Answer
sponsored by BreakFree Solutions
WHITE PAPER: The speed of development doesn’t mean as much if the speed of deployment can’t keep up. Use this guide to learn how to improve the entire software development lifecycle with new DevOps and Agile strategies.
Posted: 10 Feb 2021 | Published: 10 Feb 2021

BreakFree Solutions

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

HPE Ezmeral Software Portfolio Is a Bold Move Into the Container Platform
sponsored by HPE and Intel®
WHITE PAPER: In this report, IDC analysts dive into HPE Ezmeral – a new brand and software portfolio which covers capabilities like container orchestration and management, AI/ML and data analytics, AI-driven operations, and more.
Posted: 29 Oct 2020 | Published: 29 Oct 2020

TOPICS:  Software
HPE and Intel®

2020 APPLICATION SECURITY OBSERVABILITY REPORT
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

Top 6 Reasons Behind Being Nominated for a Software Audit
sponsored by MetrixData 360
VIDEO: For Mike Austin, CEO of MetrixData 360, the best defense against an audit is to not get audited in the first place. To help strengthen your line of defense, Austin examines the top 6 reasons companies get audited by software publishers. Watch the quick video here to get the details.
Posted: 02 Nov 2020 | Premiered: 02 Nov 2020

MetrixData 360
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences