Define Application Security IncWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Define Application Security Inc returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Data Security
 •   Network Security
 •   Security Policies
 •   Virtualization
 •   Security Monitoring
 •   Wireless Security
 •   Application Management and Maintenance
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Advanced Define Application
 •   Computerized Define Application Security
 •   Concerns Define Application Security
 •   Define Application Security Graphs
 •   Define Application Security Usa
 •   Define Application Size
 •   Define Production
 •   Define Terms
 •   Delivery Define Application
 •   Policies Define
Advertisement

ALL RESULTS
1 - 25 of 460 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Beating Web Application Security Threats by Thawte Inc.

March 18, 2010 - (Free Research)
The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats. 
(EBOOK) READ ABSTRACT |

Mobile Application Security Best Practices to Protect Corporate Data by Thawte Inc.

July 11, 2013 - (Free Research)
This expert guide from SearchConsumerization.com explains the risks associated with mobile devices and discusses native security measures built into mobile operating systems and best practices for mitigating common mobile application security risks. 
(EGUIDE) READ ABSTRACT |

10 Best Practices for Microsoft SharePoint Security by Thawte Inc.

September 27, 2013 - (Free Research)
In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Hosting Applications in the Cloud by SAVVIS

August 13, 2010 - (Free Research)
Whether it's public cloud, private cloud or a hybrid of the two, IT can be delivered as a service to today’s businesses faster, cheaper and more efficiently than ever before. Read this E-Book to learn more. 
(EBOOK) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Thawte Inc.

July 16, 2013 - (Free Research)
This e-guide from SearchSecurity.com outlines how to address web app design flaws and fight these weaknesses once and for all. 
(EGUIDE) READ ABSTRACT |

SharePoint Security Should Not Be an Afterthought by Thawte Inc.

May 20, 2013 - (Free Research)
This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones by Citrix

August 07, 2012 - (Free Research)
A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption. 
(WHITE PAPER) READ ABSTRACT |

SSL Certificate Management: Common Mistakes and How to Avoid Them by Thawte Inc.

February 12, 2013 - (Free Research)
This expert E-Guide explores the most common SSL certificate management mistakes that can set the stage for a Web application exploit, and offers key advice for avoiding these errors – read on to learn more now. 
(EGUIDE) READ ABSTRACT |

Securing your Online Data Transfer with SSL by Thawte Inc.

July 05, 2012 - (Free Research)
This white paper provides an introduction to SSL security highlighting how it operates. Also included, is a discussion of the various applications of SSL certificates as well as their appropriate deployment. Additionally, uncover details regarding how to test SSL certificates on your web server. 
(WHITE PAPER) READ ABSTRACT |

Thawte in Education by Thawte Inc.

September 30, 2013 - (Free Research)
Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks. 
(WHITE PAPER) READ ABSTRACT |

Server-Gated Cryptography: Providing Better Security for More Users by Thawte Inc.

May 10, 2013 - (Free Research)
Discover how Server-Gated Cryptography (SGC)-enabled SSL certificates are crucial to protecting your organization and your end-users in the threat-filled vastness of cyberspace. 
(WHITE PAPER) READ ABSTRACT |

The CISO's Guide to Virtualization Security by Rapid7

January 12, 2012 - (Free Research)
Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Automating Access Certification in Just 17 Days by Aveksa

August 10, 2012 - (Free Research)
This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Podcast: Automating Access Certification in Just 17 Days by Aveksa

August 10, 2012 - (Free Research)
This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program. 
(PODCAST) READ ABSTRACT |

E-Guide: Enterprise UTM Security: The Best Threat Management Solution? by NETGEAR Inc.

December 10, 2010 - (Free Research)
If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise. 
(EGUIDE) READ ABSTRACT |

Securing SharePoint: SharePoint Security Best Practices by Thawte Inc.

May 16, 2013 - (Free Research)
This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more. 
(EGUIDE) READ ABSTRACT |

Securing microsoft exchange 2010 With Thawte SSL Certificates by Thawte Inc.

July 12, 2011 - (Free Research)
Security continues to be a facet of Exchange technology that must be managed, and your secure sockets layer (SSL) certificates are the key to managing security for Exchange servers. Access this expert white paper now to get an overview of SSL certificates for Exchange 2010. 
(WHITE PAPER) READ ABSTRACT |

Business-Driven Identity and Access Management: Why This New Approach Matters by Aveksa

August 03, 2012 - (Free Research)
This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource. 
(WHITE PAPER) READ ABSTRACT |

SSL Certificate Management: Common Mistakes and How to Avoid Them by Thawte Inc.

February 04, 2013 - (Free Research)
Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes. 
(EGUIDE) READ ABSTRACT |

Implementing a Secure Wireless Network in an Educational Setting by NETGEAR Inc.

October 11, 2010 - (Free Research)
Wireless connectivity has become a necessity in educational institutions of all levels. Students require Internet connectivity to conduct research, download assignments and communicate with their instructors. Likewise, educators utilize web portals to post assignments, and update class materials. Read this white paper to learn more.  
(WHITE PAPER) READ ABSTRACT |

NETGEAR Prosecure Security Threat Management by NETGEAR Inc.

October 20, 2010 - (Free Research)
An end-point solution for each threat was not a cost-effective solution, and paying for security on a per-user license basis was clearly out of the question. What’s more, a number of appliances only protected either web or email, but not both at the same time. Read this case study to learn more about an effective solution to these problems. 
(CASE STUDY) READ ABSTRACT |

Hackers Open Malware Backdoor in Apache Webservers by Thawte Inc.

July 17, 2013 - (Free Research)
A new threat is targeting Apache webservers, which are among the most widely used webservers in the world. Read this expert E-Guide to discover how to fight back against these hackers and secure your webserver. 
(EGUIDE) READ ABSTRACT |

Mobile Threat Report 2014 by Webroot

April 21, 2014 - (Free Research)
The Webroot® Mobile Threat Report provides an overview of the risks and trends of the mobile space, based on research and analysis conducted by the Webroot Mobile Threat Research team. 
(WHITE PAPER) READ ABSTRACT |

Advanced Virtualization E-Book - Chapter 6: Recognizing the Benefits of Desktop Virtualization by SearchServerVirtualization

May 05, 2010 - (Free Research)
In Chapter 6 of the Advanced Virtualization e-book, Mike Laverick outlines some of the benefits that desktop virtualization has over server-based computing models. He also details a few drawbacks of VDI and makes predictions on how the market will respond to further improve desktop virtualization. 
(EBOOK) READ ABSTRACT |

Advanced Virtualization E-book - Chapter 5: Avoid Security Holes in the Virtual Data Center by SearchServerVirtualization

April 29, 2010 - (Free Research)
In Chapter 5 of the Advanced Virtualization e-book, security experts Danielle Ruest and Nelson Ruest explain how to identify, map out and prevent some of the most common resource pool threats. The authors also debunk five common security misconceptions of server virtualization. 
(EBOOK) READ ABSTRACT |

1 - 25 of 460 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts