Measures Application SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Measures Application Security returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Data Security
 •   Network Security
 •   Security Policies
 •   Endpoint Security
 •   Security Monitoring
 •   Wireless Security
 •   Access Control
 •   Mobile Device Management
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Calendar Measures Application
 •   Compare Measures Application Security
 •   Construction Measures
 •   Facts Measures
 •   Guide Measures
 •   Measurement Measures Application
 •   Measures Information
 •   Measures Webcast
 •   Study Measures
Advertisement

ALL RESULTS
1 - 25 of 460 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

An introduction to load testing for Web applications by Hewlett-Packard Company

May 27, 2011 - (Free Research)
This white paper discusses the importance of measuring application performance and provides best practices for load and performance testing. Inside, discover the components of a successful testing process and suggestions for testing software designed to provider quick, accurate and thorough performance validation. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

January 19, 2011 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

June 11, 2010 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Securing SharePoint: SharePoint Security Best Practices by Thawte Inc.

May 16, 2013 - (Free Research)
This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more. 
(EGUIDE) READ ABSTRACT |

Advanced Virtualization E-book - Chapter 5: Avoid Security Holes in the Virtual Data Center by SearchServerVirtualization

April 29, 2010 - (Free Research)
In Chapter 5 of the Advanced Virtualization e-book, security experts Danielle Ruest and Nelson Ruest explain how to identify, map out and prevent some of the most common resource pool threats. The authors also debunk five common security misconceptions of server virtualization. 
(EBOOK) READ ABSTRACT |

Application Security Advice: Stop Threats before They Start by SearchSoftwareQuality.com

May 20, 2014 - (Free Research)
Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle. 
(EBOOK) READ ABSTRACT |

Beating Web Application Security Threats by Thawte Inc.

March 18, 2010 - (Free Research)
The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats. 
(EBOOK) READ ABSTRACT |

A Foundation for Next-Generation Data Center Security by Citrix

September 28, 2012 - (Free Research)
This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing datacenter infrastructure. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Web Application Firewalls by SearchSecurity.com

November 04, 2010 - (Free Research)
Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues. 
(EBOOK) READ ABSTRACT |

Enterprise Application Delivery: No User Left Behind by BlueCoat

January 2007 - (Free Research)
Blue Coat ProxyClient extends Blue Coat's visionary application delivery infrastructure to include all of these use cases - from any network, any device, and to any application - keeping users productive wherever the business takes them. 
(WHITE PAPER) READ ABSTRACT |

Evaluate: IBM Rational AppScan by IBM

June 2011 - (Free Research)
With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle. 
(TRIAL SOFTWARE) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Thawte Inc.

July 2013 - (Free Research)
This e-guide from SearchSecurity.com outlines how to address web app design flaws and fight these weaknesses once and for all. 
(EGUIDE) READ ABSTRACT |

Threat Containment for Facebook by BlueCoat

October 2010 - (Free Research)
This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook. 
(WHITE PAPER) READ ABSTRACT |

10 Best Practices for Microsoft SharePoint Security by Thawte Inc.

September 2013 - (Free Research)
In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Hosting Applications in the Cloud by SAVVIS

August 2010 - (Free Research)
Whether it's public cloud, private cloud or a hybrid of the two, IT can be delivered as a service to today’s businesses faster, cheaper and more efficiently than ever before. Read this E-Book to learn more. 
(EBOOK) READ ABSTRACT |

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones by Citrix

August 2012 - (Free Research)
A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption. 
(WHITE PAPER) READ ABSTRACT |

Taking Your Enterprise Mobile: The Executive Checklist by Citrix Systems, Inc. (E-mail this company)

February 2013 - (Free Research)
Businesses can't afford not to make mobile governance and security a top priority. Read this mobility whitepaper to learn the critical facts about mobile security and management, and what you can do to keep your organization secure. 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix

April 2012 - (Free Research)
This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

WebPulse Collaborative Defense by BlueCoat

November 2011 - (Free Research)
Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide. 
(WHITE PAPER) READ ABSTRACT |

Business-Driven Identity and Access Management: Why This New Approach Matters by Aveksa

August 2012 - (Free Research)
This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource. 
(WHITE PAPER) READ ABSTRACT |

SharePoint Security Should Not Be an Afterthought by Thawte Inc.

May 2013 - (Free Research)
This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

A holistic approach to your BYOD challenge by Insight

May 2013 - (Free Research)
Ensuring security of business applications on personal devices and maintaining unified wired and wireless visibility and management is key for BYOD. This white paper discusses the most critical requirements for effective BYOD management and offers advice on how IT can successfully manage this trend. 
(WHITE PAPER) READ ABSTRACT |

Applying the Four Standards of Security-Based CIA by Global Knowledge

October 2013 - (Free Research)
High levels of optimization help to ensure that an organization's information security approach is both well-rounded and flexible enough to meet current and future threats. 
(WHITE PAPER) READ ABSTRACT |

SSL Certificate Management: Common Mistakes and How to Avoid Them by Thawte Inc.

February 2013 - (Free Research)
This expert E-Guide explores the most common SSL certificate management mistakes that can set the stage for a Web application exploit, and offers key advice for avoiding these errors – read on to learn more now. 
(EGUIDE) READ ABSTRACT |

Topographies for the Simply Connected Campus: Juniper's Simply Connected Campus Network Platform Architectures by Juniper Networks, Inc.

May 2012 - (Free Research)
Uncover a set of solutions that can help you satisfy all the requirements of a campus network, conquer the environment's inherent challenges, and provide a wired-like experience to your end users, no matter what device they are using. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 460 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts