application security

Results 726 - 750 of 774Sort Results By: Published Date | Title | Company Name
By: HP - Enterprise     Published Date: Jun 05, 2013
In today’s mobile world, the user is at the center of the application experience. This is true whether the user is a customer, a partner, or an employee. Yet meeting the needs for the enterprise user poses particular challenges. Apps must work seamlessly across devices and screen sizes, enabling real-time collaboration, without sacrificing data security. This balance requires a mobile app development platform built for the unique demands of the enterprise.
Tags : 
applications, apps, mobile applications, mobile, user-driven, data security
    
HP - Enterprise
By: HP - Enterprise     Published Date: Jun 05, 2013
There is no question that mobile computing is growing at an exponential rate. This rapid transformation has seen security concerns outpaced by the ease of use, flexibility, and productivity of mobile devices. When vulnerabilities are exploited, the security of mission-critical data becomes a serious concern. Here we take a look at three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Tags : 
mobile apps, applications, security threats, mobile computing, security vulnerabilities
    
HP - Enterprise
By: F5 Networks Inc     Published Date: Apr 17, 2012
Overcome Citrix VDI implementations challenges to deliver the highest end-user quality, most secure access to virtual desktop, while simplifying your IT infrastructure. Learn how global companies maximize their Citrix investment to increase availability, security, and performance.
Tags : 
citrix, xenapp, xen desktop, vdi, virtual desktop, application virtualization, desktop virtualization, vdi performance, vdi security, vdi management
    
F5 Networks Inc
By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : 
prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration
    
Prodiance Corp.
By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
By: TraceSecurity     Published Date: Sep 15, 2010
This paper defines the different types of penetration tests, explains why the tests should be performed, details their benefits and even provides guidance for choosing the right vendor.
Tags : 
penetration, test, pen, tracesecurity, risk, assessment, social, engineering, internal, external, web application, network, security, secure, vulnerability, threat, identify, glba, compliance, testing
    
TraceSecurity
By: Okta     Published Date: Apr 29, 2015
Distributed workforces and mobile devices are disrupting business as usual. End-users are frequently accessing applications and data from outside the corporate network. This presents new security challenges for IT. Read this eGuide to learn ways to secure your mobile workforce.
Tags : 
mobile, mobile workforce, okta, security
    
Okta
By: Qualys     Published Date: Apr 05, 2011
To help you understand how to minimize these risks, Qualys provides this guide as a primer to web application security.
Tags : 
web application security, qualys, vulnerabilities, sql injection, ssi injection, xpath injection, attacks, qualysguard was 2.0, scanning, saas
    
Qualys
By: Symantec     Published Date: Oct 02, 2012
The Shortcut Guide to Protecting Against Web Application Threats Using SSL
Tags : 
web application, threats, ssl, cybersecurity
    
Symantec
By: Riverbed     Published Date: Nov 08, 2012
Payment Card Industry Data Security Standard is a set of best practices and security measures that any organization must follow if they accept and handle cardholder data online. Read on to learn about securing your applications for security standard.
Tags : 
riverbed, stingray, pci dss compliance, stingray traffic
    
Riverbed
By: BlackBerry     Published Date: Oct 03, 2012
In this Yankee Group whitepaper, find out why creating an enterprise-class tablet environment should be at the top of the list for every security-conscious organization.
Tags : 
tablet environments, security, application security, corporate tablet use
    
BlackBerry
By: BlackBerry     Published Date: Oct 03, 2012
Learn about tools and applications available that make the development platform BlackBerry® WebWorks SDK, the perfect fit for work, home and life.
Tags : 
tablet, tablet applications, software development, sdk, enterprise management, mobile security
    
BlackBerry
By: Blackberry     Published Date: Oct 03, 2012
In this Yankee Group whitepaper, find out why creating an enterprise-class tablet environment should be at the top of the list for every security-conscious organization.
Tags : 
tablet environments, security, application security, corporate tablet use
    
Blackberry
By: HP - Intel®     Published Date: Oct 19, 2012
This white paper can help you address the security and management of multiple devices being introduced into your network. Read on and learn how to embrace a BYOD.
Tags : 
byod, bring your own device, mobile device, education applications, education, security risk, security compliance
    
HP - Intel®
By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance, ddos mitigation
    
Arbor
By: SafeNet     Published Date: Mar 29, 2013
The move to the cloud and virtualized environments along with an increasingly mobile workforce, emerging employee BYOD trends and the adoption of cloud based applications is blurring the boundaries of the traditional network security perimeter.
Tags : 
authentication, byod, mobile workforce, it security, key management
    
SafeNet
By: IBM     Published Date: Jan 09, 2014
This management brief discusses the value proposition for the Case for IBM PureFlex System for Cloud-Enabled SAP Enterprise Environments.
Tags : 
sap, international technology, application serving, system manager, vmware, nodes chassis, netweaver landscape, integrated systems, pureflex system, platform infrastructure, system security, ibm pureflex
    
IBM
By: Cisco     Published Date: Jun 02, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution.
Tags : 
malware protection, network security, it security, application security
    
Cisco
By: HP     Published Date: Apr 13, 2014
The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. As part of that objective, the document defines an application performance testing framework and discusses a performance test evolution path and the relationship between a successful approach to performance testing and related IT elements such as monitoring, security, ALM, and project and portfolio management (PPM).
Tags : 
agile performance testing, continuous performance test, load testing, loadrunner, mobile performance testing, mobile testing, performance center, performance testing, idc
    
HP
By: Ayla Networks     Published Date: Jul 24, 2015
Winning Market Share.
Tags : 
market share, data intelligence, platforms, applications, security
    
Ayla Networks
By: VMware AirWatch     Published Date: May 19, 2016
The economy isn’t standing still. For your business to succeed, your employees shouldn’t either. That’s why companies of all types are moving to empower their mobile workforce and engage with customers in innovative ways. To realize their potential, enterprises need to find ways to make a mobile workforce as productive when they’re away from the office and on their mobile devices as they are in the office. This means mobility systems must give users a seamless experience across the ever-expanding types of mobile devices employees use, for easy access to business-critical applications. At the same time, it must deliver a secure workspace that complies with security regulations, protects devices, plus guards business and customer data, from expanding security threats.
Tags : 
innovation, best practices, mobile device, security, mobile workforce
    
VMware AirWatch
By: VMware AirWatch     Published Date: May 24, 2016
La movilidad sigue siendo una de las principales oportunidades estratégicas para cualquier tipo de empresa gracias al potencial para que sea más competitiva, ya sea incrementando la productividad de los empleados o captando clientes con métodos innovadores. Para aprovechar dicho potencial, la movilidad empresarial debe brindar a los usuarios una experiencia fluida entre dispositivos de distinto tipo y habilitar un área de trabajo segura para las aplicaciones empresariales clave. Para satisfacer las necesidades móviles de los empleados y la cartera de clientes, las empresas deben disponer de soluciones de autogestión y BYOD (Bring Your Own Device) fiables con una plataforma establecida cuya capacidad de ampliación permita la incorporación de nuevos procesos.
Tags : 
data management, business practices, data center. data application, enterprise applications, security
    
VMware AirWatch
By: VMware AirWatch     Published Date: Dec 13, 2016
As enterprises embrace adoption of Microsoft Office 365 to drive productivity by using the latest mobile applications and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how VMware AirWatch® Enterprise Mobility Management (EMM) easily integrates with both Office 365 and VMware Identity Manager to optimize user experience and ensure data is secure across all devices and platforms. An AirWatch expert will give an in-depth demonstration of the advantages of deploying Office 365 with AirWatch by VMware, as well as conduct a Q&A session.
Tags : 
    
VMware AirWatch
By: IBM     Published Date: Oct 08, 2015
The Ponemon institute recently interviewed Fortune 500 companies down to the mid-market to find "The State of Mobile Application Insecurity." Sponsored by IBM, the paper explores why security is being left behind or completely out of app development.
Tags : 
    
IBM
By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.