Security For Vb ApplicationsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security For Vb Applications returned the following results.
RSS What is RSS?
Related Categories

 •   Embedded Application Development
 •   Rapid Application Development (RAD)
 •   Technology Outsourcing
 •   Application Management and Maintenance
 •   Email Archiving
 •   Website Design and Development
 •   Web Servers
 •   Storage Management
 •   Content Filtering
 •   Web Site Optimization

Related Searches
 •   Automated Security For
 •   Codes Security
 •   Professional Security For Vb
 •   Security For Colorado
 •   Security For Device
 •   Security For Vb Part
 •   Security For Vb Training
 •   Security Implementing
 •   Security India
 •   Statistics Security For Vb
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

VB Migration & Modernization Solutions: Convert Your Valuable Software Assets to VB.NET, C# or Even to Java Cost-Effectively and with Minimum Risk by Transoft

November 24, 2009 - (Free Research)
With Microsoft no longer providing support for the VB development environment, now is the time to migrate to VB.NET, C# or Java. Migration requires deep understanding of the legacy as well as extensive knowledge of the target environment. Read this paper to learn how Transoft can help your organization migrate your VB applications. 
(WHITE PAPER) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

Software Internationalization/Translation/Localization Services by Globalization Partners International

Globalization Partners International (GPI) provides Global Translation, Localization (L10N) and Internationalization (I18N) services into over 50 languages helping companies develop global software. 
(SERVICE)

Penn National Insurance: Real-Time Documents Provide Faster Time to Market with a Personal Touch by Exstream Software

April 2008 - (Free Research)
Penn National Insurance wanted to deploy a single, comprehensive infrastructure for its batch and real-time document applications. Exstream Software's Dialogue enterprise personalization solution met this goal, improving time to market ... 
(CASE STUDY) READ ABSTRACT |

Incremental Updates vs. Full Reload Change Data Capture: Minutes vs. Hours by CONNX Solutions

June 2008 - (Free Research)
This white paper discusses the five different ways to move changed data, including a solution that can free up programming resources, save processing time and more. 
(WHITE PAPER) READ ABSTRACT |

Improving Server Performance and Security: An Impact Comparison of Application Control and Traditional Anti-Virus Solutions by Lumension

April 2013 - (Free Research)
This analyst report unveils the impact an application control solution – which promises to reduce server CPU resource consumption – had on servers and reveals the level of protection from malware that it can provide. 
(ANALYST REPORT) READ ABSTRACT |

Improving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV by Lumension

May 2013 - (Free Research)
This Tolly Test report compares the effectiveness of both anti-virus and application control solutions to help you decide which would work best for your enterprise. View now to uncover which approach provides greater performance across diverse workloads and protects against more threats to keep your endpoints safe and secure. 
(WHITE PAPER) READ ABSTRACT |

Developing Best Practices to Application Whitelisting: An In-Depth Technical Webcast by Lumension

May 2013 - (Free Research)
This video covers the important steps involved with laying the groundwork for application whitelisting, how to prevent unwanted or dangerous changes while maintaining flexibility, and maintaining your environment as application, user, and other needs change. Watch and learn more. 
(WEBCAST) READ ABSTRACT |

Analysit Fact Sheet: Who’s Minding your Cloud? by CA Technologies.

August 2014 - (Free Research)
46% of companies have stopped or slowed adoption of cloud services due to security concerns. View this analyst fact sheet to learn more about how companies are handling software, application, and cloud security. 
(ANALYST BRIEF) READ ABSTRACT |

Choosing the Right Services Partner for any Datacenter Transformation by IBM

September 2013 - (Free Research)
This whitepaper focuses on the importance of selecting a datacenter services partner that can support all phases of your datacenter transformation. 
(WHITE PAPER) READ ABSTRACT |

On the Safe Side: Managing Security in Mobile Apps by SearchSoftwareQuality.com

April 2013 - (Free Research)
This expert three-part guide provides you with all you need to know about ensuring the security of your mobile enterprise applications.  Continue on the get advice from the pros on topics such as: 7 most important security measures for enterprise data, advice on securing mobile apps, key security mistakes mobile developers make, and more. 
(EBOOK) READ ABSTRACT |

Cisco: Scaling Application Vulnerability Management Across the Enterprise by IBM

February 2013 - (Free Research)
This case study reveals the solution that one organization chose to help improve application security testing efficiencies at a reduced cost. 
(WHITE PAPER) READ ABSTRACT |

A Foundation for Next-Generation Data Center Security by Citrix

September 2012 - (Free Research)
This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing data center infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Affinity Credit Union chooses HP Fortify on Demand - Cloud-based security assessment service for mobile remote deposit capture application by Hewlett-Packard Limited

November 2013 - (Free Research)
This resource shows the benefits associated with cloud-based security assessment services and how you can apply them to your business. 
(CASE STUDY) READ ABSTRACT |

It’s All About the App: Mobile Security That Helps Enable the Business by CA Technologies.

November 2013 - (Free Research)
With mobility strategies quickly becoming a priority for the majority of organizations, this informative guide provides information on mobile security strategies that every business needs to learn more about. 
(WHITE PAPER) READ ABSTRACT |

NS Security with CSO Online by Citrix

August 2014 - (Free Research)
This webcast looks at threats to web applications and properties and gives tips on how organizations can secure web application properties. 
(WEBCAST) READ ABSTRACT |

Regain Visibility and Control with Cost-effective Next-Generation Security by Palo Alto Networks

August 2013 - (Free Research)
This resource overviews a next-generation security platform that offers clear visibility and improved control over users, applications, and content. Click now to see how 3 businesses fared after deploying this solution, including immense cost and operation reduction benefits. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Delivering Enterprise Mobility by Citrix Systems, Inc. (E-mail this company)

October 2013 - (Free Research)
This exclusive white paper discusses a set of mobile tools from industry titan Citrix that provide a complete, integrated and scalable solution to deliver applications and data to any device with full security and a high-performance user experience. 
(WHITE PAPER) READ ABSTRACT |

Java application development in the cloud by SearchBusinessAnalytics

March 2013 - (Free Research)
In this expert handbook, discover the ways in which cloud computing is changing Java mobile app development. Read on for information on cloud security, what to expect from Java in the cloud, and true cloud-based app development. 
(EBOOK) READ ABSTRACT |

Webcast: Application Architectures for Cloud Computing Environments by SearchDataCenter.com

October 2011 - (Free Research)
In this webcast, Bernard Golden, CEO of cloud consulting firm HyperStratus, describes the key principles of application architectures in a cloud computing environment. He also discusses the limitations of running applications in the cloud, including application integration issues, software licensing and security. 
(VIDEO) READ ABSTRACT |

Web Application Firewalls: Patching, SDLC Key for Security, Compliance by SearchSecurity.com

February 2013 - (Free Research)
In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now. 
(EGUIDE) READ ABSTRACT |

HOW TO USE PCI SSC SUPPLEMENT TO ACHIEVE PCI COMPLIANCE IN THE CLOUD by SearchSecurity.com

September 2013 - (Free Research)
This expert guide from SearchSecurity.com examines highlights of the PCI SSC's guidelines to help your business achieve PCI compliance in the cloud. Read on to learn how you can easily secure your applications and your customers' trust. 
(EGUIDE) READ ABSTRACT |

An Objective Approach to Security by Bytware, Inc.

May 2007 - (Free Research)
i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this... 
(WHITE PAPER) READ ABSTRACT |

Avocent Accelerates Critical Applications over WAN While Ensuring Distributed Web Security at Branch Offices by BlueCoat

September 2011 - (Free Research)
IT infrastructure management solutions provider, Avocent Corporation, needed to accomplish two critical tasks: Improve performance of key business applications and provide decentralized Web security and control for their branch offices. View this case study to learn how they were able to meet both needs with just one solution. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts