Application Security And SupportWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Application Security And Support returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Data Security
 •   Network Security
 •   Application Management and Maintenance
 •   Security Monitoring
 •   Wireless Technologies and Mobile Computing
 •   Application Lifecycle Management(ALM)
 •   Wireless Security
 •   Mobile Device Management
 •   Endpoint Security

Related Searches
 •   Application Creation
 •   Application Designs
 •   Application Security And Media
 •   Application Security And Source
 •   Application Security B2B
 •   Buying Application Security And
 •   Scripts Application
 •   Starting Application Security And
 •   Strategic Application Security
 •   Vendors Application Security
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Defender 5 by Dell Software

Defender offers the essential security you need to conduct your e-business with confidence, safe in the knowledge that your critical digital assets, customers and employees are protected by reliable, future-proof software. 
(ASP & SOFTWARE PRODUCT)

SeatonCorp Delivers Low Cost, High Reliability Virtual Desktops via Quest vWorkspace by Dell Software

June 26, 2009 - (Free Research)
Read this case study to see how the benefits of Quest® Software's vWorkspace helped SeatonCorp achieve lower cost, enhanced capabilities, higher reliability, easier management and easier end-user IT support. 
(WHITE PAPER) READ ABSTRACT |

How to Address Your Top Tech Problems by AT&T Corp

August 04, 2010 - (Free Research)
For companies without full-time IT staff, affordable tech support is especially important. Subscription services like AT&T Tech Support 360SM can be a great solution for wireless network configuration, e-mail, office application and computer performance problems, mobile device setup, virus removal and other troublesome support issues. 
(WHITE PAPER)

IBM Application Security Solutions Demo by IBM

December 2008 - (Free Research)
IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture. 
(DEMO)

Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You by Dell Software

August 2012 - (Free Research)
Access this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more. 
(WHITE PAPER) READ ABSTRACT |

Managing IT Complexity: A CIO Roundtable Discussion by ASG Software Solutions

August 2010 - (Free Research)
Join JP Garbani, Vice President and Principal Analyst at Forrester Research and Alan Bolt, CIO at ASG, for a roundtable discussion of complexity issues facing CIOs today. Find out how they are addressing these growing problems within their own IT organizations. 
(WEBCAST) READ ABSTRACT |

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information by ASG Software Solutions

May 2010 - (Free Research)
The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

BIG-IP Application Security Manager™ by F5 Networks

The BIG-IP Application Security Manager delivers the industry’s foremost comprehensive application delivery security solution with the option to deliver both application delivery and security together. The ASM provides application layer protection from targeted and generalized application attacks to ensure that applications are always available. 
(HARDWARE PRODUCT)

CISCO PIX 515E SECURITY APPLIANCE by Cisco Systems, Inc.

The Cisco® PIX® 515E Security Appliance delivers a wealth of advanced security and networking services for small-to-medium business and enterprise networks, in a modular, purpose-built appliance. 
(HARDWARE PRODUCT)

Enabling Enterprise Mobility: Transform the Mobile Computing Environment by Hewlett-Packard Company

September 2011 - (Free Research)
Read this paper to uncover best practices for a three-step mobile management strategy that looks at: foundational enterprise-wide policies around security, privacy, and end-user computing; the collaboration infrastructure that  needs to be established; and the required end-to-end architectural decisions, application, and infrastructure models. 
(WHITE PAPER) READ ABSTRACT |

IAM Systems Now Leverage Intelligence to Address Cloud and Mobile Apps by IntraLinks, Inc

May 2014 - (Free Research)
This resource highlights the 4 newest roles for identity and access management (IAM) systems that enhance security for an expanding business environment. 
(WHITE PAPER) READ ABSTRACT |

The Right Tool for the Right Job: An Application Security Tools Report Card by IBM

August 2010 - (Free Research)
This white paper examines the most common tools found in the enterprise application security environment. 
(WHITE PAPER) READ ABSTRACT |

Podcast: How Security is well suited for Agile development by IBM

June 2011 - (Free Research)
Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle. 
(PODCAST) READ ABSTRACT |

Cisco PIX 501 Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 501 Security Appliance delivers enterprise-class security for small office and teleworker environments, in a reliable, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Agile tools: True support for ALM by IBM

June 2012 - (Free Research)
This expert e-guide offers tips and tricks for putting yourself in the agile frame of mind when using ALM tools. Read this now and learn about the qualities and attributes that make development, testing, QA, requirements management, version control, security and other ALM process tools agile. 
(EGUIDE) READ ABSTRACT |

Support PCI Security Compliance with Enhanced Solutions from IBM by IBM

February 2009 - (Free Research)
This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Hosting Applications in the Cloud by SAVVIS

August 2010 - (Free Research)
Whether it's public cloud, private cloud or a hybrid of the two, IT can be delivered as a service to today’s businesses faster, cheaper and more efficiently than ever before. Read this E-Book to learn more. 
(EBOOK) READ ABSTRACT |

IT Best Practices: To Support or Not Support Consumer-Owned Smartphones by Zenprise

October 2011 - (Free Research)
This white paper outlines current and future implications of consumer and enterprise mobile devices (especially when it comes to messaging), and how they can and will impact your organization. In addition, learn what you can do to prepare your business to ensure high service levels for smartphone users. 
(WHITE PAPER) READ ABSTRACT |

Applications and best practices to keep your mobile devices secure by SearchSecurity.com

March 2012 - (Free Research)
Uncover best practices for keeping your mobile devices and applications secure. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: How Security is Well Suited for Agile Development by IBM

June 2011 - (Free Research)
View this presentation transcript as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and learn how security is linked to the software development lifecycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Webcast: How Security is well suited for Agile development by IBM

June 2011 - (Free Research)
View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle. 
(WEBCAST) READ ABSTRACT |

The Benefits of Next-Generation Virtual ADCs by Citrix Systems, Inc. (E-mail this company)

November 2012 - (Free Research)
Discover why next-generation and virtual application delivery controllers (ADCs) can help you conquer many of the networking and security challenges of enterprise mobility and cloud computing. 
(EGUIDE) READ ABSTRACT |

EMA Analyst Report on the Mobile Device Management Marketspace by IBM

August 2012 - (Free Research)
Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges. 
(WHITE PAPER) READ ABSTRACT |

Windows 7 and Desktop Lockdown with Privilege Management by Viewfinity

November 2010 - (Free Research)
With the Windows XP sunset date fast approaching, plans for Windows 7 migrations are in full swing. This has prompted most organizations to re-assess their approach to PC lockdown.  Viewfinity Privilege Management allows IT professionals to provide granular, multi-level user permission control for least privilege environments. 
(WHITE PAPER) READ ABSTRACT |

Business-Driven Identity and Access Management: Why This New Approach Matters by Aveksa

August 2012 - (Free Research)
This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts