Application Of SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Application Of Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Application Security
 •   Enterprise Content Management (ECM)
 •   Identity Management/ User Provisioning
 •   Personalization Management

Related Searches
 •   Application Of Communication
 •   Application Of Security Manuals
 •   Application Of Security Productivity
 •   Application Of Tool
 •   Application Washington
 •   Buying Application Of Security
 •   Capture Application Of Security
 •   Devices Application Of
 •   Hr Application Of Security
 •   Offices Application Of
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices by RES Software

October 27, 2010 - (Free Research)
Today’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how  ties security to... 
(EBOOK) READ ABSTRACT |

Five Reasons It’s Time For Secure Single Sign-On by Ping Identity Corporation

July 31, 2013 - (Free Research)
This white paper outlines five reasons why single sign-on is a smart choice for cloud apps – from improved security to increased customer engagement. Inside, discover how to dramatically increase the overall ROI and user adoption rate of cloud applications. 
(WHITE PAPER) READ ABSTRACT |

Cisco: Scaling Application Vulnerability Management Across the Enterprise by IBM

February 28, 2013 - (Free Research)
This case study reveals the solution that one organization chose to help improve application security testing efficiencies at a reduced cost. 
(WHITE PAPER) READ ABSTRACT |

Third Party Applications: A Chink in Your Armour by Lumension

April 15, 2014 - (Free Research)
This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management. 
(WEBCAST) READ ABSTRACT |

Discovering Vulnerable Web Applications by Qualys

August 31, 2012 - (Free Research)
This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – April 2014 by SearchSecurity.com

April 01, 2014 - (Free Research)
In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks. 
(EZINE) READ ABSTRACT |

Application Hardening: Evolving Techniques for Proactive Enterprise Application Security by SearchSecurity.com

October 21, 2013 - (Free Research)
This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security. 
(EBOOK) READ ABSTRACT |

Improving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV by Lumension

May 03, 2013 - (Free Research)
This Tolly Test report compares the effectiveness of both anti-virus and application control solutions to help you decide which would work best for your enterprise. View now to uncover which approach provides greater performance across diverse workloads and protects against more threats to keep your endpoints safe and secure. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Novagalicia Secures Critical Applications with HP Fortify by Hewlett-Packard Limited

April 30, 2013 - (Free Research)
Assessing and improving the security of applications used in financial institutions is paramount. This case study explores the security-as-a-service (SaaS) testing solution one bank used after a merger to quickly and accurately assess their nearly 400 applications. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Top Three Mobile Application Threats by Hewlett-Packard Limited

November 30, 2012 - (Free Research)
This white paper reveals the top three mobile application threats enterprises today are facing and offers advice on how to mitigate the potential risks. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension

May 14, 2013 - (Free Research)
Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to preemptively address these vulnerabilities. 
(WEBCAST) READ ABSTRACT |

Using Free Web Application Security Scanning Tools to Secure Web Apps by Imperva

April 07, 2014 - (Free Research)
Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool. 
(EGUIDE) READ ABSTRACT |

SANS Report: Security Web Applications Made Simple and Scalable by Hewlett-Packard Company

September 30, 2013 - (Free Research)
This SANS report features an automated application security testing solution that identifies known vulnerabilities across multiple sources to keep your networks fully protected. 
(ANALYST REPORT) READ ABSTRACT |

Mobile Application Security Study by Hewlett-Packard Company

February 28, 2014 - (Free Research)
In this resource, unveil the major vulnerabilities created when mobile application developers speed through to meet deadlines instead of integrating top security measures. 
(WHITE PAPER) READ ABSTRACT |

SANS Survey on Application Security Programs and Practices by Hewlett-Packard Company

February 28, 2014 - (Free Research)
This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues. 
(WHITE PAPER) READ ABSTRACT |

Software Security for Web Developers: Providing a Helping Hand by Imperva

April 04, 2014 - (Free Research)
This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on. 
(EGUIDE) READ ABSTRACT |

Fortify Your App by Hewlett-Packard Company

April 04, 2014 - (Free Research)
Access this brief white paper to learn the biggest mobile application security shortfalls. Click now to uncover 3 steps to take to help you boost your defenses. 
(WHITE PAPER) READ ABSTRACT |

Closing the Back Door on Network Application Vulnerabilities by Sophos, Inc.

July 03, 2012 - (Free Research)
This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers. 
(WHITE PAPER) READ ABSTRACT |

Safe and Smart Surveillance Drive Selection Guide by Seagate Technology

February 28, 2014 - (Free Research)
Check out this informative, concise paper for a complete guide to selecting a safe and smart surveillance drive that's fully capable of handling the various security applications you may use. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up by Acronis

December 31, 2013 - (Free Research)
This white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce. 
(WHITE PAPER) READ ABSTRACT |

Monitor and Protect Critical Web Applications with a Web Application Firewall by Imperva

February 19, 2014 - (Free Research)
While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection. 
(WEBCAST) READ ABSTRACT |

Manage data security and application threats with a muli-tiered approach by IBM

January 31, 2014 - (Free Research)
This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for. 
(WHITE PAPER) READ ABSTRACT |

Breaking down silos of protection: An integrated approach to managing application security by IBM

October 31, 2013 - (Free Research)
This resource explores the critical risks created by application growth, why point products are unable to offer adequate protection, and the value of taking an integrated approach to managing application security. 
(WHITE PAPER) READ ABSTRACT |

Five critical steps to achieving an effective application security program by IBM

December 31, 2013 - (Free Research)
This resource provides an overview of the application threats that your organization faces and describes which risks you need to prioritize. Also inside, find five practical steps you can take to build security into your development processes. 
(WHITE PAPER) READ ABSTRACT |

State of Software Security Report Volume 4 by Veracode, Inc.

December 07, 2011 - (Free Research)
Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts