IT Management  >   Systems Operations  >   Applications Management  >  

Web Applications Management

RSS Feed   
Web Applications Management Reports
1 - 25 of 128 Matches Previous Page  |  Next Page
Why Alloy?
sponsored by Yotta
RESOURCE: In this infographic, discover Alloy, the flexible, adaptable, fully mobile asset management platform.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

Yotta

10 Myths in Selecting a Web Application Firewall
sponsored by Akamai
WHITE PAPER: Securing your web applications can be a daunting task. However, a web application firewall (WAF) can help keep threats at bay while preserving application performance. The challenge is choosing the right WAF. This white paper dispels 10 WAF myths that will help you evaluate what matter most when choosing a WAF.
Posted: 09 Jul 2019 | Published: 30 Apr 2019

Akamai

Malware: The Ubiquitous Menace
sponsored by The Media Trust
WHITE PAPER: Every day seems to bring news of web-based malware attacking another popular, highly trafficked website, causing harm to visitors and tarnishing the site owner's reputation and bottom line. In this white paper, learn how IT and SOC managers can protect their customers and employees by addressing security gaps on the front-end of their website.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

The Media Trust

Armor Monitored Web Application Firewall
sponsored by Armor
PRODUCT OVERVIEW: In this resource, learn about the Armor monitored WAF and how it gives you control over which traffic to allow or block to your web applications by defining customizable web security rules to stop OWASP Top 10 application attacks including SQL injections (SQLi), XML external entity (XXE) attacks, and cross-site scripting (XSS) attacks.
Posted: 02 May 2019 | Published: 02 May 2019

Armor

Operational Intelligence Supporting Online Growth at John Lewis Website
sponsored by Splunk
WHITE PAPER: Inside this case study, learn how esteemed UK retailer John Lewis improved troubleshooting and resolution times, gained real-time infrastructure insights, and more with the help of a cutting-edge analytics and operations platform – and find out how they integrated intelligence tech into their capacity planning process.
Posted: 15 Feb 2019 | Published: 15 Feb 2019

Splunk

How Neustar Security Solutions Helps MLB Advanced Media Defend and Deliver Baseball Content
sponsored by Neustar
CASE STUDY: In recent years, MLB Advanced Media (MLBAM) has released a number of mobile apps and a subscription streaming service. In order to continue offering reliable access and prevent DDoS attacks, MLBAM was looking for a new security solution provider. In this case study, learn how Neustar was able to meet these pressing needs.
Posted: 14 Feb 2019 | Published: 08 Nov 2017

Neustar

IP Intelligence Improves Company Efficiency, Customer Experience, and Security
sponsored by Neustar
WHITE PAPER: Successful brands are the ones that identify and connect with their customers – and that's why IP Intelligence (IPI) is so critical. IPI helps companies sort out the good actors from the bad, improving the customer experience while keeping security systems safe. In this white paper, learn how different companies have implemented Neustar's IPI.
Posted: 13 Feb 2019 | Published: 19 Jul 2017

Neustar

App Dev Trends to Watch in 2019
sponsored by Magenic
WHITE PAPER: Technologies from cloud-native development, to container-based development and deployment, serverless computing, and more have made waves in 2018. But where does the future of these technologies lie as we head into the new year?
Posted: 13 Feb 2019 | Published: 31 Jan 2019

Magenic

AO.com, When It's Time for a Change
sponsored by Cloudflare
CASE STUDY: AO.com is the largest online-only electricals retailer in the UK, and wanted to achieve better site performance across all of their web domains. Read this white paper to find out why AO decided on Cloudfare to help optimize their sites, and see how Cloudfare helped reduce web page sizes by 50%.
Posted: 24 Jan 2019 | Published: 24 Jan 2019

Cloudflare

Why Web Performance Matters
sponsored by Cloudflare
VIDEO: Watch this webinar to see how Cloudflare can help accelerate web performance using their 150+ data centers around the world, and see a demonstration from Catchpoint on how to use their synthetic monitoring platform.
Posted: 23 Jan 2019 | Premiered: 17 Jan 2019

Cloudflare

The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018

DomainTools

SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

DomainTools

Web Application Firewalls: 2018 Executive Summary
sponsored by Akamai Technologies
RESEARCH CONTENT: Enterprise security teams considering WAFs should evaluate the pros and cons of stand-alone and cloud-based WAFs for their specific environments. Download this executive summary of the 2018 Gartner Magic Quadrant for Web Application Firewalls for guidance on vendors and specific products in the WAF arena.
Posted: 26 Dec 2018 | Published: 26 Dec 2018

Akamai Technologies

4 AI Quick Hits You Can Add to Your Enterprise Search App Right Now
sponsored by Lucidworks
WHITE PAPER: An increasing number of organizations are realizing the benefits of integrating machine learning or AI with their website's search feature. Download this report to learn the 4 changes you could make to your search function to create a better user experience.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Lucidworks

Making the case for the cloud in common use airport technology
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Amadeus looks at the business case for cloud computing in airports.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

Designing a Modern Enterprise Architecture
sponsored by Metavine
EGUIDE: In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Metavine

Modern Mobility E-zine: February 2016
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

SearchMobileComputing

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Enterprise Mobility Management E-Book Part 2
sponsored by SearchMobileComputing
EBOOK: In part 2 of this Enterprise Mobility Management e-book, discover the ins and outs of mobile device management, including how Exchange ActiveSync is as valuable as an MDM tool, using MDM for iOS, and using MDM for Android. In addition, learn about remote Windows desktop apps and web apps as they relate to mobility.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SearchMobileComputing

New Considerations for Application Integration
sponsored by TheServerSide.com
EBOOK: This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

TheServerSide.com

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Developing Mobile Applications for the Cloud, with the Cloud
sponsored by IBM
EGUIDE: In this e-guide, experts define the key differences between native, hybrid, Web and cloud mobile applications, and they highlight best practices for testing and developing them. Learn how mobile development teams are finding success by leveraging cloud-based products such as PaaS, SaaS and IaaS services.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

IBM

How a Top E-Commerce Strategy Leads to Strong Sales
sponsored by ZeroLag Communications Inc.
EGUIDE: In this e-guide, Brian K. Walker of Forrester and other experts provide six key factors that can make or break a customer's shopping experience and, ultimately, an e-commerce business.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

ZeroLag Communications Inc.

Introducing Big Data Repository/Reporting to Support Web Analytics and User-Centric APM
sponsored by Dell Software
WHITE PAPER: Learn the capabilities of Dell™ Foglight™ Application Performance Monitoring (APM) 5.9, and how the deep visibility into transaction flows and User Experience capitalize on innovative Big Data Technology.
Posted: 01 May 2014 | Published: 20 Jun 2013

Dell Software
1 - 25 of 128 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement