Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Application Security

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Application Security

Application Security encompasses measures taken to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, or deployment of the application.
Results 301 - 325 of 719Sort Results By: Published Date | Title | Company Name
White Paper Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Oferecido por um Tempo Limitado. Obtenha Sua Cópia Hoje. Tome uma decisão informada sobre o firewall correto para sua empresa com O Guia do Comprador para Firewall. Esse guia oferece: - Os fundamentos da tecnologia de firewall moderno - Os dez requisitos críticos de negócios que seu próximo firewall precisa atender - Informações sobre como criar uma solicitação para proposta (SPP) de vendedor - Um plano de teste funcional para auxiliar no processo de seleção de firewall
Tags : 
firewalls, tecnologia, palo alto, application security
    
Palo Alto Networks
White Paper Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Ofrecida durante un tiempo limitado. Consiga su copia hoy.Tome la decisión correcta sobre qué firewall es necesario para su negocio con La Guía para compradores de firewalls. Esta guía le da: - Los fundamentos de la tecnología moderna del firewall - Los 10 requisitos de negocios críticos que su nuevo firewall debería tener en cuenta - Información sobre cómo crear un (RFP) - Un plan de pruebas funcional para ayudar en su proceso de selección de firewall
Tags : 
firewall, palo alto, tecnologia, application security, firewalls
    
Palo Alto Networks
White Paper Published By: Imprivata     Published Date: Dec 06, 2013
A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions
    
Imprivata
White Paper Published By: Imprivata     Published Date: Dec 06, 2013
This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions
    
Imprivata
White Paper Published By: Norse     Published Date: Nov 19, 2013
Learn how your current defenses against cyber-attacks are outdated and how intelligence-based strategies will protect your organization from advanced attacks.
Tags : 
cyber criminal, cyber-attacks, advanced attacks, hackers, network
    
Norse
White Paper Published By: McAfee     Published Date: Nov 19, 2013
This white paper discusses three common approaches to email encryption and explains their distinct advantages to help you determine which approach best fits the needs of your organization.
Tags : 
email encryption, email security, tls encryption, transport layer security, on premises
    
McAfee
White Paper Published By: SunGard Availability Services     Published Date: Nov 13, 2013
Learn the six key cost considerations when evaluating cloud services and the best practices on selecting a suitable provider.
Tags : 
sungard, sungard availability services, cloud, cloud computing, cloud service
    
SunGard Availability Services
White Paper Published By: Microsoft     Published Date: Nov 08, 2013
Find out why developers increasingly choose .NET to create new applications faster and more efficiently and why it offers the clearest path from the client/server world to the emerging device/cloud world.
Tags : 
microsoft, develop better applications, technology guide, business applications, application patterns
    
Microsoft
White Paper Published By: Oracle     Published Date: Nov 05, 2013
This Oracle FSN white paper provides CFOs with a strategic playbook on how to leverage the Cloud to drive greater agility in response to economic and competitive change, and more flexibility and choice in how you deploy and manage enterprise applications.
Tags : 
zenithoptimedia, oracle, fsn, strategic cfo, embrace the cloud
    
Oracle
White Paper Published By: Qualys     Published Date: Nov 05, 2013
Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.
Tags : 
qualys, security, cloud, internet ecosystem, cloud computing
    
Qualys
White Paper Published By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : 
qualys, securosis, vulnerability, vulnerability management, scanning
    
Qualys
White Paper Published By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : 
qualys, qualysguard was, vulnerability, vulnerability management, web applications
    
Qualys
White Paper Published By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability
    
Qualys
White Paper Published By: Qualys     Published Date: Nov 05, 2013
Web applications have recently emerged as a top cybercriminal attack vector, and organizations that don’t take a proactive approach to app security may be setting themselves up for disaster. More than one-third of organizations still don’t have an application security program in place – what can you do to make sure you’re protected? Consult this informative survey today to discover your peers’ proven practices for app security success, and learn what you can do to stay protected – read on to get started.
Tags : 
qualys, sans, sans survery, application, application security
    
Qualys
White Paper Published By: F5 Networks Inc     Published Date: Oct 31, 2013
Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.
Tags : 
distributed denial of service, ddos, mitigation, f5 technology, taxonomy
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
Tags : 
distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.
Tags : 
denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks
    
F5 Networks Inc
White Paper Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn the six key cost considerations when evaluating cloud services and the best practices on selecting a suitable provider.
Tags : 
sungard, sungard availability services, cloud, cloud computing, cloud service
    
SunGard Availability Services
White Paper Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn a four-pronged approach to create a disaster recovery plan for your hybrid IT environments to help ensure successful recoveries of your data and applications.
Tags : 
sungard, sungard availability service, disaster recovery, complex it environment, hybrid it environment
    
SunGard Availability Services
White Paper Published By: ServiceNow     Published Date: Oct 18, 2013
Three IT transformations can help IT get its own house in order to become the proactive partner of the business. By applying these concepts, IT departments at major enterprises are changing the way they engage with their business peers.
Tags : 
technology, service automation, it workload, it infrastructure, service consolidation
    
ServiceNow
White Paper Published By: IBM     Published Date: Oct 10, 2013
Our services can help you create a robust mobile environment where you can deploy and manage devices and applications more easily.
Tags : 
manage mobiles, mobile services, managing mobile services, global enterprise, services globally
    
IBM
White Paper Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile
    
CDW
Case Study Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Banca Intesa prepared themselves for future cyber attacks by teaming with HP and using their ArcSight security information and event management (SIEM) solution
Tags : 
banca intesa, threats, hp arcsight, cyber attacks, arcsight
    
HP - Enterprise
White Paper Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn about the three biggest threats to mobile applications and the recommendations on how to mitigate the risk from mobile computing security vulnerabilities
Tags : 
mobile application threats, mobile application, mobile, risk, api
    
HP - Enterprise
Case Study Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Kuoni Travel teamed up with HP and used their TippingPoint to help customers handle threat landscape effectively, protecting both agents and customers
Tags : 
kuoni travel, hp tippingpoint, threat landscape, threats, travel
    
HP - Enterprise
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search