Applications Security FindingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Applications Security Finding returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Data Security
 •   Network Security
 •   Application Management and Maintenance
 •   Security Monitoring
 •   Endpoint Security
 •   Content Delivery Networks/ Web Application Acceleration
 •   Security Policies
 •   Managed Security Services
 •   Mobile Device Management

Related Searches
 •   Applications Security Finding Mac
 •   Applications Security Finding Repairs
 •   Applications Security Knowledge
 •   Applications Security Making
 •   Applications Security Tracking
 •   Construction Applications
 •   Improvement Applications
 •   Reports Applications
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Wild World of Malware: Keeping Your Company Safe Inside by Dell Software

August 01, 2012 - (Free Research)
As the level of cyber-crimes continues to grow, it’s important for IT to understand the latest types of malware and how they work. This is especially true for small- and medium-sized businesses that don’t have the resources to concentrate on network security. Find out how to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

Endpoint Protection Cheat Sheet by Webroot

August 28, 2012 - (Free Research)
Consult this cheat sheet to discover a revolutionary approach to cloud security. Find out more about some of the key advantages and fast facts regarding, deployment and performance, threat detection and remediation and more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Focusing on What's Important with Your Web Application Security: Scanning and Testing by IBM

January 14, 2011 - (Free Research)
Web application security affects every business in some capacity. Regardless of the industry, there are certain Web security weaknesses you can’t afford to overlook and steps you must take to find them. In this presentation transcrip, expert Kevin Beaver shares what you need to know in order to find Web security vulnerabilities in your environment. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business by IBM

March 11, 2013 - (Free Research)
View this webcast to find out how you can create effective application security in the enterprise. Learn more about eliminating some of the most prevalent threats to your businesses by tuning in to this video now. 
(WEBCAST) READ ABSTRACT |

2013 Magic Quadrant for Application Security Testing by IBM

July 23, 2013 - (Free Research)
This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process by IBM

December 09, 2011 - (Free Research)
In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Right Tool for the Right Job: An Application Security Tools Report Card by IBM

August 26, 2010 - (Free Research)
This white paper examines the most common tools found in the enterprise application security environment. 
(WHITE PAPER) READ ABSTRACT |

2013 Magic Quadrant for Application Security Testing by Hewlett-Packard Limited

July 23, 2013 - (Free Research)
This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market. 
(ANALYST REPORT) READ ABSTRACT |

Tablets & Smartphones in the Enterprise by SearchSecurity.com

January 01, 2013 - (Free Research)
Frantic IT departments are being forced to manage BYOD on the fly. Read this white paper to get strategic, practical advice on how to manage this consumer-driven trend. 
(EGUIDE) READ ABSTRACT |

Expert Tips on Getting Mobile Securely with Virtual Desktops by SearchSecurity.com

September 30, 2011 - (Free Research)
In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 29, 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Key Considerations for Adopting Infrastructure as a Service (IaaS) by Dell Software

April 04, 2011 - (Free Research)
In this expert e-guide, find answers to four key Web application security questions. Also discover best practices for application-level firewall selection and deployment. 
(EGUIDE) READ ABSTRACT |

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business by IBM

July 19, 2013 - (Free Research)
This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security. 
(WEBCAST) READ ABSTRACT |

Securing the enterprise application layer: Expert Guidelines by IBM

August 24, 2011 - (Free Research)
If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust. 
(EGUIDE) READ ABSTRACT |

Web Application Security for a Smarter Planet by IBM

July 09, 2009 - (Free Research)
As threats to Web applications continue to grow, IBM offers Web application security for a smarter planet—integrated, end-to-end security to build secure Web applications, run secure Web applications and protect SOA environments. 
(WHITE PAPER) READ ABSTRACT |

Move Web Application Security Testing into Your Development Cycle by IBM

October 2008 - (Free Research)
This paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so. 
(WHITE PAPER)

How to develop cloud applications based on Web app security lessons by Hewlett-Packard Company

April 2013 - (Free Research)
Read this expert guide to get a walk-through on developing secure applications for the cloud, and what controls need to put in place once cloud-based applications are deployed. Find out more about secure development platforms, input filtering, authentication and more. 
(EGUIDE) READ ABSTRACT |

Take Back Control: Increase Security, Empower Employees, Protect the Business by WatchGuard Technologies, Inc.

October 2010 - (Free Research)
Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: How to Minimize the Risk of Attacks by Qualys

July 2012 - (Free Research)
This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Management Associates Report-- The Power of AppScan: A Hands-On Review of IBM Rational AppScan Standard Edition by IBM

October 2010 - (Free Research)
In a hands-on look at IBM Rational AppScan Standard Edition, the Enterprise Management Associates® (EMA™) team finds in the product an easily implemented, highly configurable utility that addresses multiple application security pain points. 
(WHITE PAPER) READ ABSTRACT |

Application Delivery and Optimization Solutions Spotlight- Checklist #2 by SearchNetworking.com

February 2013 - (Free Research)
In the second of SearchEnterpriseWAN.com's three-part guide on application delivery optimization, we explore the application delivery optimization technologies you need to know about, the questions to ask potential vendors and/or service providers, and a list of products that may fulfill your needs. 
(EGUIDE) READ ABSTRACT |

Quest Software Finds Increased Security, Disaster Preparedness, and Cost Savings through Virtual Desktop Infrastructure by Dell Software

June 2009 - (Free Research)
After evaluating a number of VDI solutions, Quest was most impressed with vWorkspace, one of its own applications that had been integrated into its product portfolio from its 2007 acquisition of Provision Networks. This case study will show how using VDI resulted in significant time and cost savings for Quest. 
(CASE STUDY) READ ABSTRACT |

The Anatomy of a Cross-Site Scripting Campaign by Imperva

August 2010 - (Free Research)
XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Application Delivery: No User Left Behind by BlueCoat

January 2007 - (Free Research)
Blue Coat ProxyClient extends Blue Coat's visionary application delivery infrastructure to include all of these use cases - from any network, any device, and to any application - keeping users productive wherever the business takes them. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Management Systems Help Mitigate BYOD Risks by SearchSecurity.com

March 2013 - (Free Research)
This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts