IT Management  >   Systems Operations  >   Security  >  

Web-based Application Security

RSS Feed   
Web-based Application Security Reports
 
Securing Your Wherever Whenever Workforce
sponsored by Forcepoint
EBOOK: Currently, 87% of organizations rely on employee access to business apps from personal devices. While BYOD trend allows for unhindered agility and collaboration, it also invites additional security risks. In this e-book, uncover the truth about cloud security, and learn how to optimize your mobile-cloud security strategy.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

Airline Stops Automated Attacks on Web & Mobile
sponsored by Shape Security
CASE STUDY: A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop credential stuffing attacks immediately. In this case study, learn why they decided to deploy Shape Enterprise Defense.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

The Missing Link in Website Security
sponsored by Tala Security
WHITE PAPER: Traditional back-end website security technologies are ineffective at maintaining security in today’s threat landscape – especially considering the additional pressures of regulatory requirements. In this white paper, take a look at the key gaps in the website security environment and explore ways to rethink current tactics.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

Tala Security

Emergency Communications of Southern Oregon
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Emergency Communications of Southern Oregon (ECSO), an emergency dispatch facility, was able to save lives through their partnership with Absolute by ensuring endpoint visibility and security to increase efficiency and meet CJIS compliance.
Posted: 21 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation

A Modern Approach to Endpoint Remediation
sponsored by Malwarebytes
DATA SHEET: According to incident response teams, 68% of cases they investigate are caused by malware. The costs and manpower required to remediate these issues is rising, and organizations need a modern approach to protecting their endpoints. In this solution brief, dive deeper into Malwarebytes’ modern approach to endpoint protection and response.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Malwarebytes

The State of Web Application Security
sponsored by Radware
RESEARCH CONTENT: Download The State of Web Application Security for a summary of current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

Radware

Securing the Human Perimeter with Natural Language Understanding
sponsored by Armorblox
WHITE PAPER: The traditional notion of what constitutes a perimeter is disappearing, user behavior is evolving, and organizations are incorporating mobile workforces and remote devices. Applying adequate security today requires a change in mindset to focus on the human perimeter. Download this white paper to learn more.
Posted: 21 Feb 2020 | Published: 31 May 2019

Armorblox

Protection Inside and Outside the Office: The New State of Cybersecurity
sponsored by Cisco Umbrella
RESOURCE: Download this infographic to explore key findings from the Enterprise Strategy Group's survey of 450 cybersecurity experts on their experience protecting a network without perimeters.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Cisco Umbrella

Office 365 and Microsoft 365: Security and Management
sponsored by Insight
WEBCAST: In this webinar, join security experts at Insight as they provide an overview of Microsoft 365 and Office 365; highlighting key differences between them, the importance of implementing security and management protocols, and key security tools that exist within the stack. Continue to watch the full webinar.
Posted: 28 Feb 2020 | Premiered: Feb 28, 2020

Insight

Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up
sponsored by Proofpoint
ANALYST REPORT: Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.
Posted: 19 Aug 2019 | Published: 16 May 2019

Proofpoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info