Application Security Tools ReportsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Application Security Tools Reports returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Data Security
 •   Network Security
 •   Wireless Security
 •   Security Policies
 •   Security Monitoring
 •   Managed Security Services
 •   Endpoint Security
 •   Vulnerability Assessment
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Application Audit
 •   Application Formats
 •   Application Security Printable
 •   Application Security Tools Evaluation
 •   Application Security Tools List
 •   Guideline Application Security Tools
 •   Implement Application Security
 •   Integrated Application
 •   Offices Application Security
 •   Service Application
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Right Tool for the Right Job: An Application Security Tools Report Card by IBM

August 26, 2010 - (Free Research)
This white paper examines the most common tools found in the enterprise application security environment. 
(WHITE PAPER) READ ABSTRACT |

10 Best Practices for Microsoft SharePoint Security by Thawte Inc.

September 27, 2013 - (Free Research)
In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization. 
(WHITE PAPER) READ ABSTRACT |

2012 Security Outlook by ComputerWeekly.com

February 24, 2012 - (Free Research)
This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012. 
(ESSENTIAL GUIDE) READ ABSTRACT |

EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager by IBM

July 03, 2013 - (Free Research)
Many security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data. 
(WHITE PAPER) READ ABSTRACT |

Secure The Enterprise With Confidence Using A Mainframe Infrastructure by IBM

March 31, 2013 - (Free Research)
Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security. 
(WHITE PAPER) READ ABSTRACT |

Using Free Web Application Security Scanning Tools to Secure Web Apps by Imperva

April 07, 2014 - (Free Research)
Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool. 
(EGUIDE) READ ABSTRACT |

Securing the Foundation of Information Technology (IT) Systems by Trusted Computer Solutions

January 12, 2010 - (Free Research)
This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security Insider's Edition by SearchSecurity.com

July 07, 1967 - (Free Research)
This Insider Edition will help you understand threats against Web applications, how you can help developers with security tools and training and how to deploy technologies such as Web application firewalls to keep your organization's Web presence safe. 
(EZINE) READ ABSTRACT |

E-Guide: How to build a toolset to avoid Web 2.0 security issues by M86 Security

September 17, 2010 - (Free Research)
Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network. 
(EGUIDE) READ ABSTRACT |

College Board Case Study: Quality Software is Secure Software by IBM

July 22, 2013 - (Free Research)
In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe. 
(WEBCAST) READ ABSTRACT |

Common Mistakes in Cloud Application Deployment by IBM

December 18, 2012 - (Free Research)
But there are many typical mistakes organizations may be surprised to come across while deploying apps in the cloud. In this Tip Guide, learn the common mistakes in cloud application deployment and how to avoid them. 
(EGUIDE) READ ABSTRACT |

Chapter 3: Patching Security Holes in Private Clouds by Dell and VMware

June 06, 2013 - (Free Research)
Download part 3 in this 4 part private cloud series for expert advice on patching the security holes in private clouds. Learn more about storage provisioning, perimeter security, data portability and much more. 
(EBOOK) READ ABSTRACT |

Manage data security and application threats with a muli-tiered approach by IBM

January 31, 2014 - (Free Research)
This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Hosting Applications in the Cloud by SAVVIS

August 13, 2010 - (Free Research)
Whether it's public cloud, private cloud or a hybrid of the two, IT can be delivered as a service to today’s businesses faster, cheaper and more efficiently than ever before. Read this E-Book to learn more. 
(EBOOK) READ ABSTRACT |

Network Security Essential Guide by SearchSecurity.com

February 06, 2013 - (Free Research)
The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy. 
(WHITE PAPER) READ ABSTRACT |

Get to know APTs Before Developing a Security Strategy by Dell SecureWorks UK

July 16, 2012 - (Free Research)
Advanced persistent threats (APT) are a concern for businesses across all industries, as they can pose a threat to an organisation's data, systems, financial assets, and reputation. This analysis explains how to develop an effective and efficient defence strategy that will help you prevent, identify and resolve APTs. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – June 2010: Laptop Lockdown by Information Security Magazine

June 16, 2010 - (Free Research)
This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue. 
(EZINE)

Security-In-Depth Using Integrated Risk-Conscious Controls by Tripwire, Inc.

December 30, 2011 - (Free Research)
This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Survey Results: Security – An Essential Prerequisite for Successful Virtualization by CA Technologies

December 10, 2010 - (Free Research)
During September and October 2010 KuppingerCole conducted an independent survey of the status and plans for Virtualization Security amongst organizations. This survey shows that security is a key success factor to virtualization. Continue reading to learn more about the results. 
(ANALYST REPORT) READ ABSTRACT |

Identity Access Management for Windows Environments by Centrify Corporation

February 22, 2013 - (Free Research)
In this e-guide learn about new tools that are expanding identity access management beyond the corporate firewall to help you better manage mobile device and cloud apps as well as some Windows networking identity basics to integrate Windows desktops and Linux servers into Active Directory. 
(EGUIDE) READ ABSTRACT |

Securing SharePoint: SharePoint Security Best Practices by Thawte Inc.

May 16, 2013 - (Free Research)
This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more. 
(EGUIDE) READ ABSTRACT |

Faster Application Development via Improved Database Change Management by Embarcadero Technologies, Inc.

March 27, 2009 - (Free Research)
Embarcadero® Change Manager™ puts the power of change tracking, schema comparison, software-generated synchronization scripts, and flexible reporting into the hands of the development team. 
(WHITE PAPER) READ ABSTRACT |

Security for a Faster World: Issue 3 by Hewlett-Packard Limited

October 21, 2013 - (Free Research)
Experts discuss the most pressing security trends and the methods needed to keep critical assets safe today. 
(WHITE PAPER) READ ABSTRACT |

Thawte in Education by Thawte Inc.

September 30, 2013 - (Free Research)
Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks. 
(WHITE PAPER) READ ABSTRACT |

Secure and Effective Data Extraction from the SAP® ERP System by Winshuttle, LLC

December 2008 - (Free Research)
This white paper describes the variety of tools available for such ad-hoc reporting applications and compares and contrasts these tools in terms of their ease-of-use and security. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts