Sox Software Security DistributionsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Sox Software Security Distributions returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Data Security
 •   Security Monitoring
 •   Vulnerability Assessment
 •   Network Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Application Management and Maintenance
 •   Endpoint Security
 •   Managed Security Services
 •   Security Policies

Related Searches
 •   Collection Sox
 •   Flowchart Sox Software
 •   Internet-Based Sox Software
 •   Methods Sox Software
 •   Questions About Sox Software Security
 •   Rfq Sox Software Security
 •   Sox Software Security Resources
 •   Sox Software Security Standard
 •   Sox Software Seminars
 •   Types Sox
Advertisement

ALL RESULTS
1 - 25 of 492 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

zCisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular) by Cisco Systems, Inc.

The Cisco 1841 router offers embedded hardware-based encryption enabled by an optional Cisco IOS Software security image. 
(HARDWARE PRODUCT)

State of Software Security Report by Veracode, Inc.

February 28, 2011 - (Free Research)
The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications. 
(WHITE PAPER) READ ABSTRACT |

State of Software Security Report Volume 4 by Veracode, Inc.

December 07, 2011 - (Free Research)
Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors. 
(WHITE PAPER) READ ABSTRACT |

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets by McCabe Software, Inc.

April 19, 2012 - (Free Research)
<p>Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.</p> 
(WHITE PAPER) READ ABSTRACT |

Disclosures 2012 - The Vulnerability of Publicly Traded Companies by Veracode, Inc.

May 23, 2012 - (Free Research)
In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software. 
(WEBCAST) READ ABSTRACT |

Assuring Software Security Through Testing by (ISC)2 UK Ltd

February 25, 2014 - (Free Research)
This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market. 
(WHITE PAPER) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Improving software with the building security in maturity model by IBM

May 2011 - (Free Research)
This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time. 
(EGUIDE) READ ABSTRACT |

Software Security for Web Developers: Providing a Helping Hand by Imperva

April 2014 - (Free Research)
This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on. 
(EGUIDE) READ ABSTRACT |

Software Security Analysis: Control Flow Security Analysis with McCabe IQ

by McCabe Software, Inc.

April 2012 - (Free Research)
<p>Read this white paper to learn how comprehensive security analysis equips you with the proper insight into the structure of your software code to identify and resolve possible security holes</p> 
(WHITE PAPER) READ ABSTRACT |

Software Security Delivered in the Cloud by Hewlett-Packard Company

October 2011 - (Free Research)
HP Fortify on Demand is a Security-as-a Service (SaaS) testing solution that allows organizations to quickly, accurately and affordably test the security of their applications without the need to manage or install any software. View now to learn more about this cloud-based, automated service. 
(PRODUCT OVERVIEW) READ ABSTRACT |

HP Fortify on Demand - Enterprise Software Security in the Cloud by Hewlett-Packard Company

May 2012 - (Free Research)
HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization. 
(WHITE PAPER) READ ABSTRACT |

HP Fortify Software Security Center- Proactively Eliminate Risk in Software by Hewlett-Packard Company

August 2012 - (Free Research)
Learn how HP can transform your enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research, you can ensure unparalleled visibility across security assets. With over 90 percent of vulnerabilities in software, this is a resource you certainly don't want to overlook. 
(WHITE PAPER) READ ABSTRACT |

Outsourcing the problem of software security by ComputerWeekly.com

July 2012 - (Free Research)
This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle. 
(ANALYST REPORT) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by Tripwire, Inc.

August 2009 - (Free Research)
SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements. 
(WEBCAST) READ ABSTRACT |

Best Practices for Public Folders to SharePoint Migration by Dell Software

March 2008 - (Free Research)
Public Folder Migrator enables you to perform migration of public folders' structure and contents into SharePoint Services and Portal Server sites. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: How Security is Well Suited for Agile Development by IBM

June 2011 - (Free Research)
View this presentation transcript as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and learn how security is linked to the software development lifecycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Webcast: How Security is well suited for Agile development by IBM

June 2011 - (Free Research)
View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle. 
(WEBCAST) READ ABSTRACT |

Podcast: How Security is well suited for Agile development by IBM

June 2011 - (Free Research)
Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle. 
(PODCAST) READ ABSTRACT |

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning by Security Weaver

September 2008 - (Free Research)
For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions. 
(WHITE PAPER) READ ABSTRACT |

The 2004 Oversight Systems Financial Executive Report on Sarbanes-Oxley by Oversight Systems

August 2008 - (Free Research)
Through a combination of an invitation-only online survey and survey intercepts, 222 corporate financial leaders from across the U.S. participated in this study on corporate attitudes toward Sarbanes-Oxley compliance. 
(WHITE PAPER) READ ABSTRACT |

CIO Decisions Ezine Volume 3 by CIO Decisions

October 2008 - (Free Research)
In this issue we tackle service-oriented architecture and dive into how Software as a Service can drive flexibility and meet business needs. Also in this issue: MDM's strongest business case and how to navigate the compliance minefield. 
(EZINE)

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity by Information Security Magazine

July 2010 - (Free Research)
The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more. 
(WHITE PAPER) READ ABSTRACT |

More Complex = Less Secure: Miss a Test Path and You Could Get Hacked by McCabe Software, Inc.

April 2012 - (Free Research)
<p>The same improvements that increase software performance create new security risks that IT pros must contend with. This white paper takes a closer look at the nature of software complexity and describes tactics you can implement to minimize it.</p> 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 492 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts