Research About Applications LayerWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Research About Applications Layer returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Network Security
 •   Data Security
 •   Network Management
 •   Application Management and Maintenance
 •   Networks
 •   Security Monitoring
 •   Endpoint Security
 •   Security Policies
 •   Wireless Security

Related Searches
 •   Build Research About
 •   Buy Research
 •   Research About Applications Asset
 •   Research About Applications Pricing
 •   Research About Applications Procedures
 •   Research About Applications Summary
 •   Research About Specialists
 •   Research About White Papers
 •   Research Organization
 •   Rfp Research About
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

E-Guide: The New Virtualization: What You Should Know For Today and Tomorrow by SearchSecurity.com

August 27, 2012 - (Free Research)
This E-Guide from SearchNetworking.com describes why virtualization requires a unified IT organization and unveils the steps you should take to get your organization on its way to a truly unified environment. 
(EGUIDE) READ ABSTRACT |

When Availability Matters: Change Control for SaaS Providers by Tenzing Managed IT Services

December 01, 2010 - (Free Research)
This paper examines that to build an effective change management framework and achieve high availability numbers for an SaaS application requires maturing IT processes along established best practices and investing in quality change management tools. 
(WHITE PAPER) READ ABSTRACT |

Application-Aware Firewalls by Juniper Networks, Inc.

March 02, 2012 - (Free Research)
This IT Checklist outlines the capabilities application-aware firewalls can and should have. It also can guide you to discover the criteria your firewall should have to meet your security needs. 
(EGUIDE) READ ABSTRACT |

Securing the enterprise application layer: Expert Guidelines by IBM

August 24, 2011 - (Free Research)
If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust. 
(EGUIDE) READ ABSTRACT |

Stopping application layer DDoS attacks: What you need to know by SearchSecurity.com

March 27, 2012 - (Free Research)
While a DDoS attack can be damaging to any organization, DDoS attacks specifically at the application-layer can be more ominous. Understanding these attacks are the first step to keeping your organization protected. In this e-guide, explore how DDoS is being used, what you can do to stop them, the future of the web threat landscape and more. 
(EGUIDE) READ ABSTRACT |

Information Security - IT Decision Checklist: Application Security by Ounce Labs, an IBM Company

December 31, 2009 - (Free Research)
Standards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer. 
(EGUIDE) READ ABSTRACT |

Identity-Aware Networking by Extreme Networks (E-mail this company)

December 02, 2010 - (Free Research)
When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications. 
(WHITE PAPER) READ ABSTRACT |

2010 Application Delivery Networking Challenge: Accelerating, Securing, Optimizing & Monitoring Applications by BlueCoat

November 18, 2010 - (Free Research)
Application delivery is one of the few technologies that both improves the end-user experience and lowers the cost of enterprise networks. It improves response time, reduces bandwidth, optimizes server performance, provides enhanced security and gives visibility into what is happening at the application layer. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Laying the IT Security Foundation by Lumension

April 06, 2009 - (Free Research)
Learn how in today's evolving threat landscape you need to lay the proper IT security foundation that proactively addresses the root cause of attacks such as Conficker. 
(WHITE PAPER) READ ABSTRACT |

BIG-IP Application Security Manager™ by F5 Networks

The BIG-IP Application Security Manager delivers the industry’s foremost comprehensive application delivery security solution with the option to deliver both application delivery and security together. The ASM provides application layer protection from targeted and generalized application attacks to ensure that applications are always available. 
(HARDWARE PRODUCT)

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution by F5 Networks

August 06, 2013 - (Free Research)
This informative resource discusses a solution that can control access, implement challenge/response and anomaly detection engines, and apply the ability to understand application behavior to defend against malicious connections to keep attackers from overwhelming applications. 
(WHITE PAPER) READ ABSTRACT |

OMEGAMON Extended Insight- Analysis: Where is your application spending time? by IBM

December 31, 2011 - (Free Research)
The limited amount of infomation provided by traditional DB2 for z/OS monitoring makes it difficult and time-consuming to isolate problems within the multiple layers of today's Java, CLI (SAP), and .NET applications. Read this paper to discover a monitoring alternative that provides the detailed information needed for modern applications. 
(WHITE PAPER) READ ABSTRACT |

Juniper Networks Mobile Security Solution by Juniper Networks, Inc.

January 18, 2012 - (Free Research)
This resource explores an innovative, market leading mobile security solution that mitigates the risks associated with deploying IP-based services. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

February 10, 2009 - (Free Research)
Application security has risen to the top of the agenda for security professionals striving to control their overall risk profile. According to US Computer Emergency Response Team (US-CERT) and Gartner, 75% of new attacks target the application layer and software vulnerabilities have reached... 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Bringing Value to Application Monitoring Through SIM by SearchSecurity.com

December 05, 2012 - (Free Research)
This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now. 
(EGUIDE) READ ABSTRACT |

Software Defined Application Services by F5 Networks

October 31, 2013 - (Free Research)
In this white paper, discover an elastic, fabric-based, next-generation model for delivering critical application services. Learn how you can effectively create and provision application services across the data center and into the cloud, based on the needs of your users. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Cost of SOA Integration: The Message-Driven ESB Effect by Fiorano Software, Inc.

August 2008 - (Free Research)
Fiorano has developed the only Message-Driven Service Orientated Architecture platform deployed on a peer-to-peer Enterprise Service Bus. Learn how it can help CIO's solve their highly constrained and demanding SOA Integration problems. 
(WHITE PAPER) READ ABSTRACT |

Patch Management 2.0: Evolving Your Patch Management Technology to Proactively Combat Security Challenges by Lumension

June 2008 - (Free Research)
Read this white paper to get up-to-date technology alternatives to help better manage your patch management environment. 
(WHITE PAPER) READ ABSTRACT |

Overcoming Five Key Challenges to Successful Virtualization by Dell Software

March 2011 - (Free Research)
In this new Quest Software white paper, learn about the five common challenges to a successful virtualization project – and how to solve each one. See how to ensure your company’s virtualization project is successful before AND after implementation. Read this white paper today. 
(WHITE PAPER) READ ABSTRACT |

Death and Taxes...and Hackers by Imperva

April 2011 - (Free Research)
View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it. 
(VIDEO) READ ABSTRACT |

XML Threat Model for REST, SOA and Web 2.0 by Intel

September 2011 - (Free Research)
This technical document intended for Architects and Developers describes a comprehensive threat model for a new breed of threats based on XML content, including XML languages used in the Service Oriented Architecture (SOA) paradigm such as SOAP and the Web Services Description Language [WSDL]. 
(WHITE PAPER) READ ABSTRACT |

How SSL and TLS Secure Network Transactions by GeoTrust, Inc.

December 2012 - (Free Research)
This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Colocation Versus Managed Hosting by Internap

April 2011 - (Free Research)
Access this resource guide to determine the differences between colocation and managed hosting when it comes to outsourcing for your organization. 
(WHITE PAPER) READ ABSTRACT |

Can your network infrastructure handle it all? 7 Steps for a unified IT organization by Dell, Inc. and Microsoft

December 2011 - (Free Research)
This expert E-Guide explores the best practices to adjust to and the top demands that come along with virtualization. 
(EGUIDE) READ ABSTRACT |

Study commissioned by Webroot: Web Threats Expose Businesses to Data Loss by Webroot

May 2013 - (Free Research)
Eight in 10 companies experienced web-borne attacks in 2012. Don't be part of the statistic! Read this research paper to learn about the current state of web layer security in organizations today and learn what you should do to stay protected. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts