Coding Emc Security WhitepaperWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Coding Emc Security Whitepaper returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Source Code Control
 •   Backup Systems and Services
 •   Storage Management
 •   Testing and Analysis
 •   Network Security
 •   Storage Security

Related Searches
 •   Audit Coding
 •   Build Coding Emc
 •   Charts Coding Emc
 •   Coding Emc Security Comparisons
 •   Coding Emc Security Crm
 •   Frameworks Coding Emc
 •   Measure Coding Emc Security
 •   Questions Coding
 •   Screen Coding Emc Security
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Software Integrity for Agile Environments by Coverity

January 27, 2011 - (Free Research)
While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Forrester Report: Development Testing: A New Era In Software by Coverity

November 23, 2011 - (Free Research)
In August 2011, Forrester Consulting surveyed over 200 leading IT firms in North America and Europe to answer the question, “What are the implications of expanding testing in development, and what does it mean to development quality?”. Read this report to see the results. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

IBM Storwize V7000 vs. EMC VNX5500: Which Storage Solution Reigns Supreme? by IBM

April 30, 2012 - (Free Research)
This whitepaper details the results of a study that compared the IBM Storwize V7000 and EMC VNX5500 in terms of block-based storage and operational expenses. 
(WHITE PAPER) READ ABSTRACT |

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine

September 10, 2010 - (Free Research)
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold. 
(EGUIDE) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

September 14, 2010 - (Free Research)
This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time. 
(WHITE PAPER) READ ABSTRACT |

McAfee Application Control by McAfee, Inc.

December 31, 2012 - (Free Research)
This whitepaper will help you learn more about a security offering that can provide complete protection from unwanted applications and code, as well as block advanced threats without requiring signature updates. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Brainshark Customer Video by EMC Corporation

June 28, 2013 - (Free Research)
In this exclusive video, you will gain insight into how Brainshark is leveraging EMC infrastructure to confidently deliver software-as-a-service. Understand how EMC is helping to address increasing data growth challenges and increasing customer requirements for higher availability, performance and scalability. 
(WEBCAST) READ ABSTRACT |

IT Audit Report - EMC IT: Leading the Transformation by EMC Corporation

March 01, 2013 - (Free Research)
A case study of EMCs adoption of cloud computing over the last ten years, this whitepaper documents EMC's advances in cloud computing and the resulting dramatic benefits in company-wide productivity. 
(WHITE PAPER) READ ABSTRACT |

Unraveling Web Malware by FireEye

September 2008 - (Free Research)
There's no denying the rapid rise in the use of Web-based blended threats to compromise client browsers and operating systems. Increasing use of Web 2.0 technologies, syndicated, iframes, third-party widgets - all of these proliferate malicious software. 
(WHITE PAPER) READ ABSTRACT |

SAP System Build and Landscape Management Activities by Cisco Systems, Inc.

June 2010 - (Free Research)
Read this white paper to learn how to simplify the often cumbersome, critical change management activities needed to simplify SAP solution deployments, increase operational performance, and decrease total cost of ownership (TCO) with a single, cohesive system that includes compute, network, and storage access components. 
(WHITE PAPER) READ ABSTRACT |

6 Best Practices for Preventing Enterprise Data Loss by RSA, The Security Division of EMC

February 2009 - (Free Research)
Nearly 220 million electronic records have been breached since January 2005, according to Privacy Rights Clearinghouse. This paper outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements. 
(WHITE PAPER) READ ABSTRACT |

Best Practices White Paper: How to Plan and Design for Case Management Projects with Documentum xCP by EMC Corporation

May 2011 - (Free Research)
This white paper outlines best practice design phases for organizations planning case-based application development. Learn about the EMC Documentum xCelerated Composition Platform and its value to organizations that want to increase process efficiency with automated solutions that employ composition rather than custom coding. 
(WHITE PAPER) READ ABSTRACT |

Addressing Compliance Initiatives with Center for Internet Security Benchmarks by Tripwire, Inc.

January 2009 - (Free Research)
This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative. 
(WHITE PAPER) READ ABSTRACT |

The Mandate for Converged Infrastructure Management by EMC

June 2011 - (Free Research)
This whitepaper discusses how effective management of the Vblock Infrastructure Platform using EMC Ionix Unified Infrastructure Manager can provide greater value in the form of faster and more efficient infrastructure service delivery and more robust infrastructure operational management for the purpose of meeting or exceeding service levels. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by Lumension

October 2009 - (Free Research)
This whitepaper will examine PCI DSS and explain how Lumension® Compliance and IT Risk Management can help organizations reduce the cost of addressing compliance. 
(WHITE PAPER) READ ABSTRACT |

Giving Your Oracle Hardware Performance a Shot in the Arm by SearchOracle

March 2013 - (Free Research)
This expert resource details how to pick the best server hardware for your Oracle environment. Also included is a report on how to determine where the database bottlenecks are and then find the right tools to help open then up. And finally, examine the increasing role that RAM is playing in database and application environments. 
(EBOOK) READ ABSTRACT |

EMC Scaleio: For Development and Testing by EMC Corporation

December 2013 - (Free Research)
This whitepaper discusses a storage solution that can help eliminate dependence on complex, expensive external SAN storage and fabric by leveraging a robust, high-performance shared virtual SAN. 
(WHITE PAPER) READ ABSTRACT |

The Security for Business Innovation Council (SBIC) report, 'Getting Ahead of Advanced Threats' by EMC Corporation

May 2012 - (Free Research)
In an era of advanced threats, having greater situational awareness is vital for detecting and mitigating attacks. Unfortunately, most organizations lack the capability for intelligence gathering and analysis. In this comprehensive report, gain guidance from top security leaders on how to get ahead with intelligence-driven information security. 
(WHITE PAPER) READ ABSTRACT |

CodePro AnalytiX, A Powerful Approach to Developing High Quality Code Using Eclipse by Instantiations

February 2008 - (Free Research)
This white paper highlights how to attain high quality Java code using Eclipse by eliminating code quality, code review and code dependency issues typically faced in software development. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity by Information Security Magazine

July 2010 - (Free Research)
The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Your Guide to Smarter Backup—Transform Your Future by EMC Corporation

October 2013 - (Free Research)
A 15-minute guide to implementing smarter backup processes in order to ensure recovery, increase business efficiency and accelerate IT and business transformation. 
(WHITE PAPER) READ ABSTRACT |

Test Data Management for Security and Compliance by EMC Corporation

December 2013 - (Free Research)
As big data continuously gets bigger, your IT organization must develop scalable new strategies to mitigate the increased risk of losing control of it. This white paper examines how test data management can play a vital role in safeguarding data privacy and ensuring regulatory compliance. 
(WHITE PAPER) READ ABSTRACT |

Empower your Developers by Coverity

May 2011 - (Free Research)
The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts