IT Management  >   Systems Operations  >   Applications Management  >  

Web Applications Management

RSS Feed   
Web Applications Management Reports
1 - 25 of 129 Matches Previous Page  |  Next Page
The New Era of Fraud: A Bot-Driven Threat
sponsored by F5 Networks
WHITE PAPER: With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. This article highlights the many faces of fraud and some of the common tactics used to detect and prevent attacks. Read on to learn more.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

F5 Networks

Pitney Bowes - Okta + F5 joint case study
sponsored by Okta
CASE STUDY: In this case study, uncover how Pitney Bowes partnered with Okta and F5 Networks to achieve greater scale, security and reliability for the over 2.8 million users within their cloud-based global e-commerce platform.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

Buyer’s Guide for Certificate Lifecycle Automation
sponsored by AppViewX
WHITE PAPER: The number of certificates in your infrastructure is growing with no signs of slowing down. An expiry or certificate-related issue will not only cause an application outage but could also cripple your trust-based systems. In this white paper, uncover a checklist to help you re-evaluate your current certificate management methods.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

AppViewX

Web Application Firewall Vendor Comparison Report
sponsored by Barracuda
ANALYST REPORT: The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.
Posted: 14 Oct 2019 | Published: 17 Sep 2019

Barracuda

Courier Prevents Shipping Fraud
sponsored by Shape Security
CASE STUDY: A top 5 global courier wanted to protect its customers from account takeover and prevent fraudulent account creation. In this case study, learn how the provider was able to do this by deploying Shape Enterprise Defense across its login and account creation applications on both the web and mobile devices.
Posted: 26 Aug 2019 | Published: 26 Aug 2019

Shape Security

Malware: The Ubiquitous Menace
sponsored by The Media Trust
WHITE PAPER: Every day seems to bring news of web-based malware attacking another popular, highly trafficked website, causing harm to visitors and tarnishing the site owner's reputation and bottom line. In this white paper, learn how IT and SOC managers can protect their customers and employees by addressing security gaps on the front-end of their website.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

The Media Trust

Operational Intelligence Supporting Online Growth at John Lewis Website
sponsored by Splunk
WHITE PAPER: Inside this case study, learn how esteemed UK retailer John Lewis improved troubleshooting and resolution times, gained real-time infrastructure insights, and more with the help of a cutting-edge analytics and operations platform – and find out how they integrated intelligence tech into their capacity planning process.
Posted: 15 Feb 2019 | Published: 15 Feb 2019

Splunk

How Neustar Security Solutions Helps MLB Advanced Media Defend and Deliver Baseball Content
sponsored by Neustar
CASE STUDY: In recent years, MLB Advanced Media (MLBAM) has released a number of mobile apps and a subscription streaming service. In order to continue offering reliable access and prevent DDoS attacks, MLBAM was looking for a new security solution provider. In this case study, learn how Neustar was able to meet these pressing needs.
Posted: 14 Feb 2019 | Published: 08 Nov 2017

Neustar

IP Intelligence Improves Company Efficiency, Customer Experience, and Security
sponsored by Neustar
WHITE PAPER: Successful brands are the ones that identify and connect with their customers – and that's why IP Intelligence (IPI) is so critical. IPI helps companies sort out the good actors from the bad, improving the customer experience while keeping security systems safe. In this white paper, learn how different companies have implemented Neustar's IPI.
Posted: 13 Feb 2019 | Published: 19 Jul 2017

Neustar

App Dev Trends to Watch in 2019
sponsored by Magenic
WHITE PAPER: Technologies from cloud-native development, to container-based development and deployment, serverless computing, and more have made waves in 2018. But where does the future of these technologies lie as we head into the new year?
Posted: 13 Feb 2019 | Published: 31 Jan 2019

Magenic

AO.com, When It's Time for a Change
sponsored by Cloudflare
CASE STUDY: AO.com is the largest online-only electricals retailer in the UK, and wanted to achieve better site performance across all of their web domains. Read this white paper to find out why AO decided on Cloudfare to help optimize their sites, and see how Cloudfare helped reduce web page sizes by 50%.
Posted: 24 Jan 2019 | Published: 24 Jan 2019

Cloudflare

Why Web Performance Matters
sponsored by Cloudflare
VIDEO: Watch this webinar to see how Cloudflare can help accelerate web performance using their 150+ data centers around the world, and see a demonstration from Catchpoint on how to use their synthetic monitoring platform.
Posted: 23 Jan 2019 | Premiered: 17 Jan 2019

Cloudflare

The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018

DomainTools

SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

DomainTools

Web Application Firewalls: 2018 Executive Summary
sponsored by Akamai Technologies
RESEARCH CONTENT: Enterprise security teams considering WAFs should evaluate the pros and cons of stand-alone and cloud-based WAFs for their specific environments. Download this executive summary of the 2018 Gartner Magic Quadrant for Web Application Firewalls for guidance on vendors and specific products in the WAF arena.
Posted: 26 Dec 2018 | Published: 26 Dec 2018

Akamai Technologies

Making the case for the cloud in common use airport technology
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Amadeus looks at the business case for cloud computing in airports.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

Designing a Modern Enterprise Architecture
sponsored by Metavine
EGUIDE: In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Metavine

Modern Mobility E-zine: February 2016
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

SearchMobileComputing

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Enterprise Mobility Management E-Book Part 2
sponsored by SearchMobileComputing
EBOOK: In part 2 of this Enterprise Mobility Management e-book, discover the ins and outs of mobile device management, including how Exchange ActiveSync is as valuable as an MDM tool, using MDM for iOS, and using MDM for Android. In addition, learn about remote Windows desktop apps and web apps as they relate to mobility.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SearchMobileComputing

New Considerations for Application Integration
sponsored by TheServerSide.com
EBOOK: This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

TheServerSide.com

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Developing Mobile Applications for the Cloud, with the Cloud
sponsored by IBM
EGUIDE: In this e-guide, experts define the key differences between native, hybrid, Web and cloud mobile applications, and they highlight best practices for testing and developing them. Learn how mobile development teams are finding success by leveraging cloud-based products such as PaaS, SaaS and IaaS services.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

IBM

How a Top E-Commerce Strategy Leads to Strong Sales
sponsored by ZeroLag Communications Inc.
EGUIDE: In this e-guide, Brian K. Walker of Forrester and other experts provide six key factors that can make or break a customer's shopping experience and, ultimately, an e-commerce business.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

ZeroLag Communications Inc.
1 - 25 of 129 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement