IT Management  >   Systems Operations  >   Applications Management  >  

Web Applications Management

RSS Feed   
Web Applications Management Reports
1 - 25 of 130 Matches Previous Page  |  Next Page
Webinar: What's New in iOS 12 Security
sponsored by Data Theorem
WEBCAST: This webcast led by Phillip Tennen of Data Theorem explores the major changes in Apple's iOS 12. Watch now to learn about new security and privacy changes, how to take advantage of these changes and best practices to continuously improve privacy and data security for mobile apps.
Posted: 10 Apr 2019 | Premiered: Oct 22, 2018

Data Theorem

5 Web Application Security Threats You Should Care About
sponsored by Oracle Dyn
WHITE PAPER: Today, threat actors can spread malicious content and execute attacks all over the world, crossing borders—and industries—in a matter of seconds. How can you protect your web applications? In this e-book learn how you can navigate the threat landscape as well as execute an intelligent approach to web application security.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Surviving the Bot Matrix
sponsored by Oracle Dyn
WHITE PAPER: Bot technology is becoming increasingly sophisticated and bot traffic right now makes up more than 50% of all Internet traffic – more than human. This e-book will help understand how to survive the bot matrix and take control of bot detection, mitigation and elimination. Download the e-book now, so you can stay above the bot epidemic today.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Operational Intelligence Supporting Online Growth at John Lewis Website
sponsored by Splunk
WHITE PAPER: Inside this case study, learn how esteemed UK retailer John Lewis improved troubleshooting and resolution times, gained real-time infrastructure insights, and more with the help of a cutting-edge analytics and operations platform – and find out how they integrated intelligence tech into their capacity planning process.
Posted: 15 Feb 2019 | Published: 15 Feb 2019

Splunk

How Neustar Security Solutions Helps MLB Advanced Media Defend and Deliver Baseball Content
sponsored by Neustar
CASE STUDY: In recent years, MLB Advanced Media (MLBAM) has released a number of mobile apps and a subscription streaming service. In order to continue offering reliable access and prevent DDoS attacks, MLBAM was looking for a new security solution provider. In this case study, learn how Neustar was able to meet these pressing needs.
Posted: 14 Feb 2019 | Published: 08 Nov 2017

Neustar

IP Intelligence Improves Company Efficiency, Customer Experience, and Security
sponsored by Neustar
WHITE PAPER: Successful brands are the ones that identify and connect with their customers – and that's why IP Intelligence (IPI) is so critical. IPI helps companies sort out the good actors from the bad, improving the customer experience while keeping security systems safe. In this white paper, learn how different companies have implemented Neustar's IPI.
Posted: 13 Feb 2019 | Published: 19 Jul 2017

Neustar

App Dev Trends to Watch in 2019
sponsored by Magenic
WHITE PAPER: Technologies from cloud-native development, to container-based development and deployment, serverless computing, and more have made waves in 2018. But where does the future of these technologies lie as we head into the new year?
Posted: 13 Feb 2019 | Published: 31 Jan 2019

Magenic

AO.com, When It's Time for a Change
sponsored by Cloudflare
CASE STUDY: AO.com is the largest online-only electricals retailer in the UK, and wanted to achieve better site performance across all of their web domains. Read this white paper to find out why AO decided on Cloudfare to help optimize their sites, and see how Cloudfare helped reduce web page sizes by 50%.
Posted: 24 Jan 2019 | Published: 24 Jan 2019

Cloudflare

Why Web Performance Matters
sponsored by Cloudflare
VIDEO: Watch this webinar to see how Cloudflare can help accelerate web performance using their 150+ data centers around the world, and see a demonstration from Catchpoint on how to use their synthetic monitoring platform.
Posted: 23 Jan 2019 | Premiered: 17 Jan 2019

Cloudflare

The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018

DomainTools

SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

DomainTools

Making the case for the cloud in common use airport technology
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Amadeus looks at the business case for cloud computing in airports.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

End Web Application Security Risks with WAF
sponsored by F5 Networks
EGUIDE: In this expert e-guide, educate yourself on all things WAF by discovering how a WAF works, the best WAF features and more. Additionally, learn how to further resolve web application vulnerabilities.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

Designing a Modern Enterprise Architecture
sponsored by Metavine
EGUIDE: In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Metavine

Modern Mobility E-zine: February 2016
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

SearchMobileComputing

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Enterprise Mobility Management E-Book Part 2
sponsored by SearchMobileComputing
EBOOK: In part 2 of this Enterprise Mobility Management e-book, discover the ins and outs of mobile device management, including how Exchange ActiveSync is as valuable as an MDM tool, using MDM for iOS, and using MDM for Android. In addition, learn about remote Windows desktop apps and web apps as they relate to mobility.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SearchMobileComputing

New Considerations for Application Integration
sponsored by TheServerSide.com
EBOOK: This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

TheServerSide.com

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Developing Mobile Applications for the Cloud, with the Cloud
sponsored by IBM
EGUIDE: In this e-guide, experts define the key differences between native, hybrid, Web and cloud mobile applications, and they highlight best practices for testing and developing them. Learn how mobile development teams are finding success by leveraging cloud-based products such as PaaS, SaaS and IaaS services.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

IBM

How a Top E-Commerce Strategy Leads to Strong Sales
sponsored by ZeroLag Communications Inc.
EGUIDE: In this e-guide, Brian K. Walker of Forrester and other experts provide six key factors that can make or break a customer's shopping experience and, ultimately, an e-commerce business.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

ZeroLag Communications Inc.

Introducing Big Data Repository/Reporting to Support Web Analytics and User-Centric APM
sponsored by Dell Software
WHITE PAPER: Learn the capabilities of Dell™ Foglight™ Application Performance Monitoring (APM) 5.9, and how the deep visibility into transaction flows and User Experience capitalize on innovative Big Data Technology.
Posted: 01 May 2014 | Published: 20 Jun 2013

Dell Software

Four Ways to Modernize Your Application Performance Monitoring Strategy for Web 2.0 and AJAX
sponsored by Dell Software
WHITE PAPER: Learn how Web 2.0 technologies can increase the speed and efficiency of Web applications, while uniquely combining the best of traditional and modern approaches to deliver a well-rounded application performance monitoring (APM) solution.
Posted: 01 May 2014 | Published: 10 Sep 2013

Dell Software

Web Content Acceleration for Brilliant Storytelling
sponsored by Limelight Networks, Inc.
RESOURCE: This informative guide explores one company's solution to your network performance woes and outlines the benefits of implementation.
Posted: 29 Apr 2014 | Published: 31 Dec 2013

Limelight Networks, Inc.
1 - 25 of 130 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement