Cycle SecureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Cycle Secure returned the following results.
RSS What is RSS?
Related Categories

 •   Application Lifecycle Management(ALM)
 •   Data Security
 •   Application Security
 •   Product Life Cycle Management (PLM)
 •   Virtualization
 •   Business Intelligence Solutions
 •   Product Data Management/ Product Information Management
 •   Embedded Application Development
 •   Networks
 •   Network Security

Related Searches
 •   Cycle Applications
 •   Cycle Review
 •   Cycle Secure Analysis
 •   Cycle Secure Louisiana
 •   Cycle Secure New Mexico
 •   Cycle Secure Order
 •   Cycle Secure Version
 •   Cycle Secure Wireless
 •   Repair Cycle
 •   Technologies Cycle Secure
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: Path to a Secure Application by IBM

December 01, 2010 - (Free Research)
This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Safe & Secure: An Overview of Security Features In JBoss Application Platforms by Red Hat

July 08, 2010 - (Free Research)
Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle. 
(WEBCAST) READ ABSTRACT |

A Secure Cloud for Development and Testing Environments by HP & Intel®

July 30, 2013 - (Free Research)
For application development and testing projects, savvy companies look to the cloud due to benefits such as cost savings, flexibility, and scalability. In this brief video, discover a flexible, scalable, managed cloud that delivers the performance and uptime you need to develop and test critical enterprise applications. 
(VIDEO) READ ABSTRACT |

IT in Europe Virtual Data Centre Vol. 1, No. 3 Server Hardware and Refresh Cycle Options by SearchVirtualDataCentre.co.UK

September 27, 2011 - (Free Research)
Virtualization has come a long way, and now IT pros are tasked with keeping their virtual machines secure. This expert e-zine follows the evolution of virtualization and offers advice for developing an effective security strategy. Plus, find out what took place at VMworld 2011 within the virtualization and cloud arenas. 
(EZINE)

The Ten Best Practices for Secure Software Development by ISC2

December 15, 2010 - (Free Research)
Read this white paper to learn the top ten best practices to help fulfill the SSLP’s mission of building hack-resilient software. 
(WHITE PAPER) READ ABSTRACT |

BlueLock Underpins its Cloud Computing Hosting Services with Best-in-Class Security by IBM

October 01, 2009 - (Free Research)
Read this case study to learn how a dynamic, virtualized security solution built around IBM Internet Security Systems helped BlueLock bolster security efforts with a more versatile solution, shorten the deployment cycle for new customers, and reduce hardware costs and energy use. 
(CASE STUDY) READ ABSTRACT |

Practical Approaches for Securing Web Applications across the Software Delivery Lifecycle by IBM

July 08, 2009 - (Free Research)
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don’t understand, is how to implement a robust process for integrating security and risk management throughout the web application software development lifecycle. 
(WHITE PAPER) READ ABSTRACT |

crystalreports.com for Salesforce.com: Exception and Sales Reporting by Business Objects

crystalreports.com is a Web-based report-sharing service that allows you to share Crystal Reports with the right people - simply and securely. Create advanced reports from your Salesforce.com data. Dig deeper for answers using graphs with drill down capabilities. View, schedule, refresh, and distribute reports online - inside Salesforce.com. 
(SOFTWARE PRODUCT)

Data Warehousing and Business Intelligence for IBM System z by IBM

June 01, 2008 - (Free Research)
Today, data warehousing and business intelligence are mission-critical functions for organizations of all types and sizes. IBM System z supports the entire data warehousing cycle, along with business intelligence software to deliver a total solution infrastruc­ture. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

An Introduction to Quantum Lifecycle Management by ComputerWeekly.com

November 05, 2012 - (Free Research)
This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Integrating Security into Development, No Pain Required by IBM

April 24, 2012 - (Free Research)
There are substantial security benefits to developers and security personnel working together, yet they are often viewed as being like oil and water. In this paper, discover how to integrate software development and security effectively and pain-free by using the right tools and techniques. 
(WHITE PAPER) READ ABSTRACT |

How to upgrade to HP Application Lifecycle Management by Hewlett-Packard Company

May 31, 2012 - (Free Research)
Read this white paper to discover how a comprehensive approach to application lifecycle management (ALM) can help you accelerate the reliable, secure delivery of software applications and services. 
(WHITE PAPER) READ ABSTRACT |

SANS Report: Security Web Applications Made Simple and Scalable by Hewlett-Packard Company

September 30, 2013 - (Free Research)
This SANS report features an automated application security testing solution that identifies known vulnerabilities across multiple sources to keep your networks fully protected. 
(ANALYST REPORT) READ ABSTRACT |

Managing User Identities and Access in the Cloud by IBM

December 31, 2011 - (Free Research)
This white paper features an automated identity and access management (IAM) solution that accommodates physical and cloud environment users to ensure that the right people have the right access to virtualized resources and applications. 
(WHITE PAPER) READ ABSTRACT |

Why Runtime Governance Is Critical to SOA by Progress

October 01, 2006 - (Free Research)
Learn how runtime governance can protect production environments from undocumented "rogue" services and violation of company policies, thereby eliminating associated operational and regulatory risks. 
(WHITE PAPER)

Business Rule Management: Automating Policy Management by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper discusses how business rules management systems can be used to meet the diverse range of stakeholder requirements associated with an automated policy management system. 
(WHITE PAPER) READ ABSTRACT |

Barclays Bank by Lumension

August 2008 - (Free Research)
Barclays chose Lumension Security's Sanctuary Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices. 
(CASE STUDY) READ ABSTRACT |

Evaluate: IBM Rational AppScan by IBM

June 2011 - (Free Research)
With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle. 
(TRIAL SOFTWARE) READ ABSTRACT |

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

Webinar: Create Secure Test and Dev Environments in the Cloud by RightScale

February 2010 - (Free Research)
In this webinar, you will lean how to operate your entire application testing infrastructure in the cloud to save time and money – enabling you to test more extensively and quickly hand off projects from development to operations. 
(WEBCAST) READ ABSTRACT |

Boost Cloud Security with Intel® AES-NI by Intel

March 2011 - (Free Research)
Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance. 
(VIDEO) READ ABSTRACT |

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Identify and Leverage Your Existing Service Life Cycles by IBM

December 2010 - (Free Research)
This executive brief will illustrate the progression of service management since the 1990s, illuminate the hidden service life cycles and discuss how, once they are visible, we can start to make them work — to improve services and better align IT with business objectives. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts