Finds Develop A SecureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Finds Develop A Secure returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Endpoint Security
 •   Security Monitoring
 •   Vulnerability Assessment
 •   Application Management and Maintenance
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Finds Develop A B2C
 •   Finds Develop A It
 •   Finds Develop Portal
 •   Finds Payment
 •   Info Finds Develop A
 •   Market Finds Develop
 •   Organizational Finds Develop A
 •   Record Finds
 •   Recovery Finds Develop A
 •   Trends Finds Develop
Advertisement

ALL RESULTS
1 - 25 of 443 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

E-Guide: The dangers of application logic attacks by SearchSecurity.com

April 13, 2011 - (Free Research)
Developing a secure and effective Web application can be daunting. And, hackers aren't making this task any easier. In this tip from our Ask the Experts section, Web application security expert Michael Cobb explains how hackers use application logic to solicit an attack and advises how to prevent them. 
(EGUIDE) READ ABSTRACT |

Mobile Data Security Finding the Balance by IBM

April 30, 2013 - (Free Research)
Access this white paper to learn how to develop a secure mobile strategy that not only protects business data, but keeps the user experience simple and efficient. 
(WHITE PAPER) READ ABSTRACT |

How to develop cloud applications based on Web app security lessons by Hewlett-Packard Company

April 25, 2013 - (Free Research)
Read this expert guide to get a walk-through on developing secure applications for the cloud, and what controls need to put in place once cloud-based applications are deployed. Find out more about secure development platforms, input filtering, authentication and more. 
(EGUIDE) READ ABSTRACT |

First Command case study: Secure financial future with converged IT by Dell, Inc.

April 16, 2013 - (Free Research)
This white paper details a company that moved on from its legacy infrastructure to keep up with its customer service demands and IT budget. 
(CASE STUDY) READ ABSTRACT |

Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process by IBM

December 09, 2011 - (Free Research)
In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Secure By Design: Building Identity-based Security into Today’s Information Systems by IBM

March 11, 2013 - (Free Research)
Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource. 
(WHITE PAPER) READ ABSTRACT |

Achieve Security Success in the Creative Cloud by CDW Corporation

February 28, 2014 - (Free Research)
Product, website and application design teams can now use Adobe Creative Cloud services to reduce licensing costs and access secure versions of Adobe's applications on a subscription basis in the cloud. This resource outlines Adobe's strict security measures around Creative Cloud as well and touches on the storage options and collaboration tools. 
(WHITE PAPER) READ ABSTRACT |

IT in Europe Virtual Data Centre Vol. 1, No. 3 Server Hardware and Refresh Cycle Options by SearchVirtualDataCentre.co.UK

September 27, 2011 - (Free Research)
Virtualization has come a long way, and now IT pros are tasked with keeping their virtual machines secure. This expert e-zine follows the evolution of virtualization and offers advice for developing an effective security strategy. Plus, find out what took place at VMworld 2011 within the virtualization and cloud arenas. 
(EZINE)

Securing Data Stored On Tape With Encryption by Quantum Corporation

July 01, 2009 - (Free Research)
With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly. Organizations should develop sound encryption key management processes to minimize administrative overhead and maximize the value of data encryption. 
(WHITE PAPER) READ ABSTRACT |

Assuring Enterprise-Quality Agile Development by HP Software

August 15, 2011 - (Free Research)
This white paper provides an overview of the advantages of hybridizing agile development methods with the QA lessons learned from previous methods. Learn how this strategy provides the best of both worlds for developing flexible, secure software products. 
(WHITE PAPER) READ ABSTRACT |

More Complex = Less Secure: Miss a Test Path and You Could Get Hacked by McCabe Software, Inc.

April 19, 2012 - (Free Research)
<p>The same improvements that increase software performance create new security risks that IT pros must contend with. This white paper takes a closer look at the nature of software complexity and describes tactics you can implement to minimize it.</p> 
(WHITE PAPER) READ ABSTRACT |

Leverage Active Directory with Kerberos to Eliminate HTTP Password by PistolStar, Inc.

April 2008 - (Free Research)
This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use. 
(WHITE PAPER) READ ABSTRACT |

Mobile Security Report 2009 by McAfee, Inc.

December 2009 - (Free Research)
Device manufacturers are balancing control with innovation, a dynamic that often controls the mobile ecosystem. This is why the McAfee Mobile Security Report 2009 is taking a closer look at manufacturers’ security experiences, their concerns and priorities, and their approach to major security challenges that lie ahead of them in the near future. 
(WHITE PAPER) READ ABSTRACT |

BlackBerry 10 Apps: Develop, Deploy, Manage and Secure by BlackBerry

April 2013 - (Free Research)
Dive into this presentation to learn more about BlackBerry® 10 development options, BlackBerry 10 enterprise platform and security, and deploying and managing BlackBerry 10 applications. Find out the exciting new features BlackBerry has to offer your enterprise today. 
(WEBCAST) READ ABSTRACT |

The Right Tool for the Right Job: An Application Security Tools Report Card by IBM

August 2010 - (Free Research)
This white paper examines the most common tools found in the enterprise application security environment. 
(WHITE PAPER) READ ABSTRACT |

McAfee 15 Minutes to a Secure Business: Daily Security Practices by McAfee, Inc.

November 2009 - (Free Research)
This paper explains how McAfee has developed 15 Minutes to a Secure Business. This unique approach to security management gives IT professionals a roadmap for ensuring a safe and secure IT environment, even with limited time. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

CIO Decisions eZine: April 2014 – Prescriptive Analytics – Conquer the Next Business Frontier by SearchCIO.com

April 2014 - (Free Research)
Prescriptive analysis could do some of big data thinking for us -- if only we'd let it. This CIO Decisions e-zine explores the growing analytics field and the strategies at work. 
(EZINE) READ ABSTRACT |

Strengthening Enterprise Security through Notebook Encryption by Intel Corporation

December 2008 - (Free Research)
Implementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner. 
(WHITE PAPER)

5 Cloud Security Concerns You Must Address by Hewlett-Packard Company

May 2012 - (Free Research)
This white paper explains why security is a top deterrent to cloud adoption. Discover threats to consider when evaluating cloud for your organization and learn how to minimize risk by establishing an effective defense strategy. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in PC Grid Computing by Univa UD

February 2008 - (Free Research)
In this white paper, we explore the features, components and benefits of a state-of-the-art PC grid computing solution - and how to choose one that's best for your organization. 
(WHITE PAPER) READ ABSTRACT |

Transitioning to an Information Infrastructure by EMC Corporation

August 2008 - (Free Research)
EMC helps IT focus on the importance of information and effectively manage it in the face of exponential growth, a dynamic regulatory environment and constantly changing business requirements on increasing revenue and profit. 
(WHITE PAPER) READ ABSTRACT |

Expert tips for securing mobile devices in the enterprise by SearchSecurity.com

July 2012 - (Free Research)
This expert e-guide explores the ins and outs of developing a comprehensive mobile device management strategy to enable secure Bring Your Own Device (BYOD). Find out how to plug key security vulernabilities, support devices and craft new policies. 
(EGUIDE) READ ABSTRACT |

The Ten Best Practices for Secure Software Development by ISC2

December 2010 - (Free Research)
Read this white paper to learn the top ten best practices to help fulfill the SSLP’s mission of building hack-resilient software. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Managing Identities and Access Control by CA Technologies

December 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK)

1 - 25 of 443 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts