Retail Application SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Retail Application Security returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Data Security
 •   Network Security
 •   Security Policies
 •   Security Monitoring
 •   Endpoint Security
 •   Wireless Security
 •   Virtualization
 •   Authentication / Password Management
 •   Access Control

Related Searches
 •   Data Retail
 •   Monitor Retail
 •   Retail Application Screen
 •   Retail Layout
 •   Retail Notes
 •   Retail Package
 •   Retail Sheets
 •   Retail Vendor
 •   Storage Retail
Advertisement

ALL RESULTS
1 - 25 of 492 | Next Page

CW+: Quocirca report: Web retailing - keeping the orders flowing by ComputerWeekly.com

August 12, 2010 - (Free Research)
Whether it is selling books, groceries, gadgets or tickets, the volume of orders being taken online continues to grow. Ensuring that customers receive a prompt and personal experience, whilst remaining assured about security, is essential to the ongoing success of online retail. 
(WHITE PAPER) READ ABSTRACT |

Application Security Advice: Stop Threats before They Start by SearchSoftwareQuality.com

May 20, 2014 - (Free Research)
Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle. 
(EBOOK) READ ABSTRACT |

Beating Web Application Security Threats by Thawte Inc.

March 18, 2010 - (Free Research)
The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats. 
(EBOOK) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Thawte Inc.

July 16, 2013 - (Free Research)
This e-guide from SearchSecurity.com outlines how to address web app design flaws and fight these weaknesses once and for all. 
(EGUIDE) READ ABSTRACT |

10 Best Practices for Microsoft SharePoint Security by Thawte Inc.

September 27, 2013 - (Free Research)
In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Hosting Applications in the Cloud by SAVVIS

August 13, 2010 - (Free Research)
Whether it's public cloud, private cloud or a hybrid of the two, IT can be delivered as a service to today’s businesses faster, cheaper and more efficiently than ever before. Read this E-Book to learn more. 
(EBOOK) READ ABSTRACT |

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

Business-Driven Identity and Access Management: Why This New Approach Matters by Aveksa

August 2012 - (Free Research)
This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource. 
(WHITE PAPER) READ ABSTRACT |

Ethical Hacking and Risk Assessments by Global Knowledge

December 2008 - (Free Research)
Attend this webcast to learn about risk assessment process and tools used by ethical hackers. 
(WEBCAST) READ ABSTRACT |

SharePoint Security Should Not Be an Afterthought by Thawte Inc.

May 2013 - (Free Research)
This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

A holistic approach to your BYOD challenge by Insight

May 2013 - (Free Research)
Ensuring security of business applications on personal devices and maintaining unified wired and wireless visibility and management is key for BYOD. This white paper discusses the most critical requirements for effective BYOD management and offers advice on how IT can successfully manage this trend. 
(WHITE PAPER) READ ABSTRACT |

Applying the Four Standards of Security-Based CIA by Global Knowledge

October 2013 - (Free Research)
High levels of optimization help to ensure that an organization's information security approach is both well-rounded and flexible enough to meet current and future threats. 
(WHITE PAPER) READ ABSTRACT |

SSL Certificate Management: Common Mistakes and How to Avoid Them by Thawte Inc.

February 2013 - (Free Research)
This expert E-Guide explores the most common SSL certificate management mistakes that can set the stage for a Web application exploit, and offers key advice for avoiding these errors – read on to learn more now. 
(EGUIDE) READ ABSTRACT |

10 Security Concerns for Cloud Computing by Global Knowledge

March 2010 - (Free Research)
Read this paper to learn the many benefits of cloud computing as well as the 10 security concerns that need to be addressed when considering moving critical applications and sensitive data to public and shared cloud environments. 
(WHITE PAPER) READ ABSTRACT |

PGP Encryption Platform - Delivering cost-effective, comprehensive encryption for enterprise data protection by PGP Corporation

February 2010 - (Free Research)
The PGP Encryption Platform reduces the complexities of protecting business data by enabling organizations to deploy and manage multiple encryption applications cost-effectively. The PGP Encryption Platform makes installing additional systems unnecessary when organizational needs for encryption expand. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Automating Access Certification in Just 17 Days by Aveksa

August 2012 - (Free Research)
This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program. 
(PODCAST) READ ABSTRACT |

The CISO's Guide to Virtualization Security by Rapid7

January 2012 - (Free Research)
Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority. 
(WHITE PAPER) READ ABSTRACT |

SSL Certificate Management: Common Mistakes and How to Avoid Them by Thawte Inc.

February 2013 - (Free Research)
Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes. 
(EGUIDE) READ ABSTRACT |

Securing your Online Data Transfer with SSL by Thawte Inc.

July 2012 - (Free Research)
This white paper provides an introduction to SSL security highlighting how it operates. Also included, is a discussion of the various applications of SSL certificates as well as their appropriate deployment. Additionally, uncover details regarding how to test SSL certificates on your web server. 
(WHITE PAPER) READ ABSTRACT |

CORE IMPACT Pro V10 by Core Security Technologies

December 2009 - (Free Research)
Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications. 
(PRODUCT DEMO) READ ABSTRACT |

Antivirus Protection for Virtual Desktops by Dell, Inc. and Intel®

December 2011 - (Free Research)
With more and more organizations implementing VDI, enterprises have to find new ways of addressing current security challenges. Discover how to secure your VDI implementation and endpoints in this white paper. 
(WHITE PAPER) READ ABSTRACT |

KVM Security in the Cloud: A Choice That Matters by Global Knowledge

May 2013 - (Free Research)
The resource overviews KVM security and its use in virtualized, multi-tenant cloud scenarios. Examine how open source virtualization leverages SE Linux and its tight integration with Linux kernel to provide a secure computing environment for both end-users and service providers. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Automating Access Certification in Just 17 Days by Aveksa

August 2012 - (Free Research)
This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

January 2011 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Security Whitepaper: Google Apps Messaging and Collaboration Products by Google Apps

January 2011 - (Free Research)
Google Apps provide familiar, easy to use products and services for business settings. These services enable customers to access their data virtually anytime and anywhere from Internet-capable devices. This computing environment is called "the cloud." Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 492 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts