Vendor Backups Application SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Vendor Backups Application Security returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Security Monitoring
 •   Data Security
 •   Vulnerability Assessment
 •   Application Management and Maintenance
 •   Application Lifecycle Management(ALM)
 •   Content Delivery Networks/ Web Application Acceleration
 •   Security Policies
 •   Automated Security Auditing/ Source Code Analysis
 •   Network Security

Related Searches
 •   Conference Vendor
 •   Patent Vendor Backups Application
 •   Vendor Advantages
 •   Vendor Backups Application Expert
 •   Vendor Backups Application Marketing
 •   Vendor Backups Application Oklahoma
 •   Vendor Backups Controls
 •   Vendor Backups Decision
 •   Vendor Backups Guide
Advertisement

ALL RESULTS
1 - 25 of 455 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Buyer’s Guide for Access Management by Oracle Corporation

April 26, 2011 - (Free Research)
Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution. 
(WHITE PAPER) READ ABSTRACT |

Managing data and application security risks cost effectively by IBM

October 01, 2009 - (Free Research)
This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Focusing on What's Important with Your Web Application Security: Scanning and Testing by IBM

January 14, 2011 - (Free Research)
Web application security affects every business in some capacity. Regardless of the industry, there are certain Web security weaknesses you can’t afford to overlook and steps you must take to find them. In this presentation transcrip, expert Kevin Beaver shares what you need to know in order to find Web security vulnerabilities in your environment. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Guide: Best Practices for Developing Secure Applications by IBM

November 10, 2010 - (Free Research)
This expert e-guide brought to you by SearchSecurity.com, explains the importance of integrating application security throughout the entire software development lifecycle and provides 4 tips that must be kept in mind on the application security forefront. Read on to uncover these tips and review an assessment of Web application security. 
(EGUIDE) READ ABSTRACT |

The Right Tool for the Right Job: An Application Security Tools Report Card by IBM

August 26, 2010 - (Free Research)
This white paper examines the most common tools found in the enterprise application security environment. 
(WHITE PAPER) READ ABSTRACT |

Smart Techniques for Application Security: Whitebox + Blackbox Security Testing by IBM

March 10, 2010 - (Free Research)
Join us for a one-hour Web seminar where members of our security research team will discuss whitebox and blackbox application security testing techniques, highlight how their approaches to vulnerability detection compliment one another and share best practices for embedding application security testing across the software development lifecycle. 
(WEBCAST) READ ABSTRACT |

IBM Application Security Solutions Demo by IBM

December 2008 - (Free Research)
IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture. 
(DEMO)

Move Web Application Security Testing into Your Development Cycle by IBM

October 2008 - (Free Research)
This paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so. 
(WHITE PAPER)

E-Guide: Avoiding Application Security Pitfalls by IBM

January 2011 - (Free Research)
This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: What’s New with Rational Application Security? by IBM

December 2010 - (Free Research)
Every day, more and more business is conducted online creating new challenges for meeting web application security and compliance.  This presentation transcript explores an approach that will help your organization address today’s biggest threats. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Secure Development by IBM

December 2010 - (Free Research)
When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization. 
(EBOOK)

Understanding Web Application Security Challenges by IBM

February 2009 - (Free Research)
This paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security. 
(WHITE PAPER) READ ABSTRACT |

Strengthening Web Application Security: Charting a Robust Strategy That Starts at Development. by IBM

October 2008 - (Free Research)
This paper examines the current dilemma that security auditors face with the bottleneck for Web application deployment. 
(WHITE PAPER)

Managing a Growing Threat: An Executive’s Guide to Web Application Security by IBM

December 2007 - (Free Research)
Cyber-criminals are leveraging relatively simple application exploits to gain access to sensitive information for fun and profit. It’s more important than ever to implement secure application strategies to effectively protect your business. Read this guide to learn more. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Securing Naming and Directory Services for Application Defense-in-Depth by IBM

May 2011 - (Free Research)
Application security professionals depend on infrastructure teams to build a secure foundation; and naming and directory services are a prime example of where this holds true. This tips explains how Lightweight Directory Access Protocol (LDAP), helps assemble a solid platform that applications can trust. 
(EGUIDE) READ ABSTRACT |

Web Application Security for a Smarter Planet by IBM

July 2009 - (Free Research)
As threats to Web applications continue to grow, IBM offers Web application security for a smarter planet—integrated, end-to-end security to build secure Web applications, run secure Web applications and protect SOA environments. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by IBM

February 2009 - (Free Research)
This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Scanning Production Applications by IBM

December 2010 - (Free Research)
This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications. 
(EBOOK) READ ABSTRACT |

Presentation Transcript: Protect Data and Client Trust - An End-to-End Approach to Protecting Your Client Applications and Organizations by IBM

January 2011 - (Free Research)
This presentation transcript of the webcast “Protect Data and Client Trust: An End-to-End Approach to Protecting Your Client Applications and Organizations” outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Protect data & client trust: an end to end approach to protecting your applications & organization by IBM

December 2010 - (Free Research)
This presentation outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization. 
(WEBCAST) READ ABSTRACT |

Staying a Step Ahead of the Hackers: The Importance of Identifying Critical Web Application Vulnerabilities by IBM

September 2008 - (Free Research)
Security managers worldwide working for midsize or large organizations share a common goal: to better manage the risks associated with their business infrastructure. This session discusses new and emerging network and application security attacks and ways organizations can protect themselves against Web application and network security threats. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: The dangers of application logic attacks by IBM

April 2011 - (Free Research)
Developing a secure and effective Web application can be daunting. And, hackers aren't making this task any easier. In this tip from our Ask the Experts section, Web application security expert Michael Cobb explains how hackers use application logic to solicit an attack and advises how to prevent them. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Client-Side Security Issues - The Twilight Zone of Web Security by IBM

April 2011 - (Free Research)
This presentation transcript discusses the various types of JavaScript client-side issues that exist in today’s Web applications, their prevalence on the internet and how to locate and fix them. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Staying aloft in tough times - Why smart innovative businesses are turning to cloud computing by IBM

May 2011 - (Free Research)
Explore how cloud computing from IBM can answer these needs with a highly automated, dynamic alternative for the acquisition and delivery of IT services. 
(WHITE PAPER) READ ABSTRACT |

Podcast: How Security is well suited for Agile development by IBM

June 2011 - (Free Research)
Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle. 
(PODCAST) READ ABSTRACT |

1 - 25 of 455 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts