Applications Security AbstractWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Applications Security Abstract returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Security Monitoring
 •   Data Security
 •   Application Management and Maintenance
 •   Vulnerability Assessment
 •   Network Security
 •   Application Lifecycle Management(ALM)
 •   Content Delivery Networks/ Web Application Acceleration
 •   Security Policies
 •   Testing and Analysis

Related Searches
 •   Applications Method
 •   Applications Security Abstract Small
 •   Building Applications Security Abstract
 •   Ecommerce Applications
 •   Graphs Applications Security Abstract
 •   Info Applications Security Abstract
 •   Media Applications
 •   Support Applications Security
 •   Us Applications Security
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Dynamic Virtual Clients by Intel

November 05, 2009 - (Free Research)
In this video, Dave Buchholz and Clyde Hedrick explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs. 
(VIDEO)

Presentation Transcript: Managing IT Complexity-- A CIO Roundtable Discussion by ASG Software Solutions

August 19, 2010 - (Free Research)
Join JP Garbani, Vice President and Principal Analyst at Forrester Research and Alan Bolt, CIO at ASG, for a roundtable discussion of complexity issues facing CIOs today. Find out how they are addressing these growing problems within their own IT organizations. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Managing IT Complexity: A CIO Roundtable Discussion by ASG Software Solutions

August 12, 2010 - (Free Research)
Join JP Garbani, Vice President and Principal Analyst at Forrester Research and Alan Bolt, CIO at ASG, for a roundtable discussion of complexity issues facing CIOs today. Find out how they are addressing these growing problems within their own IT organizations. 
(WEBCAST) READ ABSTRACT |

Virtualizing the Client PC: A Proof of Concept by Intel Corporation

November 2008 - (Free Research)
In this paper Intel IT explores a proof of concept study that examined the viability of abstracting the client operating system from the hardware platform using virtualization. 
(WHITE PAPER)

MegaCryption v6.2 by Advanced Software Products Group, Inc. (ASPG, Inc.)

March 2009 - (Free Research)
ASPG's latest enterprise encryption is designed for the prevention of data security breaches and securing data exchanged between business partners for z/OS, Windows, UNIX & Linux. 
(TRIAL SOFTWARE)

IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4 by Symantec Corporation

March 2009 - (Free Research)
With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security. 
(DOWNLOAD)

OpenBench Labs Analysis: Maximize Storage Utilization and Network Bandwidth Automating Virtual System Backup by CommVault Systems, Inc.

February 2010 - (Free Research)
Simpana® from CommVault® enables IT to leverage a single solution that integrates backup, archive, replication and storage resource management across physical and virtual servers. Simpana helps IT deal with the challenges associated with critical backup recovery issues within a virtual infrastructure. 
(WHITE PAPER)

Computer Weekly – 27 November 2012: Announcing the most influential people in UK IT by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we reveal our annual UKtech50 list of the 50 most influential people in UK IT, and interview the winner, Warren East, CEO of chip design firm ARM. Also in this issue, we conclude our buyer's guide to infrastructure as a service with an in-depth analysis of Microsoft's Azure cloud platform. Read the issue now. 
(EZINE) READ ABSTRACT |

Closing the Storage Virtualization Gap with EMC Isilon by EMC Isilon

May 2011 - (Free Research)
Storage in virtual environments can get tricky - with traditional backup methods unable to keep up with the demands of virtualization, new strategies are essential. This white paper from ESG introduces a new virtual storage solution designed to maintain efficiency and meet the growing demands of server virtualization. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

eBook: IT Pros Are From Venus, Facilities Pros Are From Mars by SearchDataCenter.com

August 2010 - (Free Research)
It's no secret that there is discord between IT staff and facilities managers in organizations with large data centers. This e-book serves as a guide for IT pros looking for information to ensure that their physical infrastructures support the data center. It also provides insight into some of the challenges facing data center facilities teams. 
(EBOOK) READ ABSTRACT |

Transitioning to the software defined data center (SDDC) by Hewlett-Packard Company

November 2013 - (Free Research)
There is a significant investment in the monitoring tools that support your current physical and virtualized infrastructure. This webcast will help you develop tactical and strategic plans for transitioning to the new challenges of managing and optimizing the abstracted infrastructure elements of the SDDC. 
(WEBCAST) READ ABSTRACT |

Symantec Protection Suite Enterprise Edition by Symantec Corporation

June 2009 - (Free Research)
Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure. 
(TRIAL SOFTWARE)

CW Buyer's Guide: Software-defined networking by SearchSecurity.com

April 2013 - (Free Research)
Computer Weekly looks at how SDN can give IT administrators greater control over the network infrastructure and make it more flexible and agile part of the business. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Presentation Transcript - Improving Data Center Relations: IT Versus Facilities by Viridity Software

November 2010 - (Free Research)
Today, IT resources can be provisioned quickly and cheaply—some would say too quickly and cheaply. But those IT resources rely on brick and mortar as well as megawatts, which are abstracted from the IT department. This Webcast will identify pitfalls data center teams should avoid. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Web Application Security: Protect Your Critical Web Applications by Imperva

August 2010 - (Free Research)
To combat complex and distributed attacks, organizations need to protect their Web sites from new and emerging threats without affecting application performance or uptime. Read this paper to find out so much more. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security Insider's Edition by SearchSecurity.com

September 2013 - (Free Research)
This Insider Edition will help you understand threats against Web applications, how you can help developers with security tools and training and how to deploy technologies such as Web application firewalls to keep your organization's Web presence safe. 
(EZINE) READ ABSTRACT |

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business by IBM

March 2013 - (Free Research)
View this webcast to find out how you can create effective application security in the enterprise. Learn more about eliminating some of the most prevalent threats to your businesses by tuning in to this video now. 
(WEBCAST) READ ABSTRACT |

Web-facing applications: Security assessment tools and strategies by SearchSecurity.com

October 2012 - (Free Research)
Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected. 
(WHITE PAPER) READ ABSTRACT |

Beating web application security threats by SearchSecurity.com

October 2011 - (Free Research)
Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability. 
(EGUIDE) READ ABSTRACT |

Mobile Application Security Best Practices to Protect Corporate Data by SearchSecurity.com

July 2013 - (Free Research)
This expert guide from SearchConsumerization.com explains the risks associated with mobile devices and discusses native security measures built into mobile operating systems and best practices for mitigating common mobile application security risks. 
(EGUIDE) READ ABSTRACT |

Managing Mobile Application Security in the BYO Device Era by SearchSecurity.com

January 2013 - (Free Research)
Smartphone success can be greatly attributed to mobile applications. Unfortunately, just as mobile app usage increases, so does the prevalence of malware. Is your organization ready to manage mobile app security in a BYOD world? If not, read this expert E-Guide now! 
(EGUIDE) READ ABSTRACT |

Technical Guide on Application Security by SearchSecurity.com

December 2012 - (Free Research)
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools. 
(EZINE) READ ABSTRACT |

Application Security Advice: Stop Threats before They Start by SearchSoftwareQuality.com

May 2014 - (Free Research)
Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle. 
(EBOOK) READ ABSTRACT |

Beating Web Application Security Threats by Thawte Inc.

March 2010 - (Free Research)
The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats. 
(EBOOK) READ ABSTRACT |

Service Orientation and Its Role in Your Connected Systems Strategy: Building Distributed Applications by Microsoft Corporation India Pvt Ltd

October 2008 - (Free Research)
This white paper presents the Microsoft Corporation vision for service orientation and service-oriented architecture in enterprise computing. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts