application security

Results 126 - 150 of 869Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk
    
IBM
By: BlackBerry     Published Date: Oct 03, 2012
Learn about tools and applications available that make the development platform BlackBerry® WebWorks SDK, the perfect fit for work, home and life.
Tags : 
tablet, tablet applications, software development, sdk, enterprise management, mobile security
    
BlackBerry
By: Citrix Systems     Published Date: Jul 17, 2015
Deployment of Citrix XenApp.
Tags : 
application delivery, platform, computing, architecture, security device optimization
    
Citrix Systems
By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : 
it staff, applications, business data, data security, it managers, endpoint data, device, platforms
    
IBM
By: IBM     Published Date: Feb 11, 2015
An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.
Tags : 
application deployment, point security, ibm, ibm security solutions
    
IBM
By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
By: HP - Intel®     Published Date: Oct 19, 2012
This white paper can help you address the security and management of multiple devices being introduced into your network. Read on and learn how to embrace a BYOD.
Tags : 
byod, bring your own device, mobile device, education applications, education, security risk, security compliance
    
HP - Intel®
By: VASCO     Published Date: Jul 12, 2012
Read more of this whitepaper to explore critical elements in which strong authentication solutions can be applied with SaaS applications to help drive adoption and improve user experience.
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security
    
VASCO
By: Iron Speed     Published Date: Aug 21, 2009
See how Iron Speed Designer builds database forms, and reporting applications for .NET without hand-coding. Quickly create feature-complete custom applications that integrate Web pages, controls, data access, validation and security.
Tags : 
.net, software development, reporting, application development, ironspeed, iron speed, report design, custom applications, development, programming, code generation, generate code
    
Iron Speed
By: Citrix Systems     Published Date: Nov 10, 2014
Many organizations are struggling with network infrastructure that is vastly outdated, and with the rise in cloud computing, the time to upgrade is now. Cloud-based network solutions for application delivery are a great way for businesses to ensure high levels of performance, security and flexibility. This guide explores two solutions that organizations use to build a network for today's evolving enterprise and how you can fully address cloud requirements for secure application delivery. Read now for this vital information on cloud networking!
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization, insight, real-time, traffic, native web, application, action analytics, netscaler, solve, control
    
Citrix Systems
By: Cisco     Published Date: Dec 20, 2018
Edison has followed the development and use of Cisco’s Application Centric Infrastructure (ACI) over the past five years. Cisco ACI delivers an intent-based networking framework to enable agility in the datacenter. It captures higher-level business and user intent in the form of a policy and translates this intent into the network constructs necessary to dynamically provision the network, security, and infrastructure services.
Tags : 
    
Cisco
By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
By: CDW     Published Date: Jan 15, 2016
A growing number of organizations are realizing the benefits of mobile devices, including increased productivity, enhanced efficiency and speedier response times. Yet while the use of mobile devices typically leads to lower costs and additional revenue opportunities, it also brings challenges associated with device and application procurement, data connections, service costs, content management and — most important — security.
Tags : 
cdw, effective mobile policy, mobile devices, revenue opportunities, application procurement
    
CDW
By: Google Apigee     Published Date: Mar 06, 2019
Inside the API Product Mindset APIs expose data or functionality for use by applications and developers, which means they allow access to a business’s valuable digital assets—and thus to the heart of the business itself. Vulnerable APIs can expose a business’s core data and services to a variety of threats. Therefore, API security should be of paramount importance to any enterprise that exposes digital assets. Google Cloud’s new eBook, Building and Managing Secure APIs, takes a deeper look at the do’s and don’ts of enterprise API security. Explore how to design secure, easy-to-use APIs with field-tested best practices, real-world use cases and a checklist to help your team get started. What's Inside? ? Field-tested best practices ? Real-world use cases ? API monetization checklist
Tags : 
    
Google Apigee
By: Infosys     Published Date: May 22, 2018
When one of our client's most strategic web applications was hacked, it was something of a wake-up call. Application security is surprisingly often an afterthought, and serious investment is only sometimes made when security breaches are discovered. Effectively, companies try to close the stable door after the horse has bolted. However, preventive security maintenance of apps is far more cost-effective and less damaging than reactive security. Our client therefore asked us to put in place an app security testing program early in the development life cycle to reduce the chances of similar breaches in the future.
Tags : 
security, technology, data, app, device, web
    
Infosys
By: McAfee EMEA     Published Date: Nov 15, 2017
The pressures of speed, efficiency, and cost will push more applications and data outside the trusted network and into a service provider’s clouds, where those benefits can be realized. The growth of cloud services and movement of sensitive data between private and public clouds means that those services will become increasingly valuable as targets of attack. As enterprises cloud-enable their operations, gaps in control, visibility, identity, and security are the most likely paths to data breaches.
Tags : 
cloud, optimization, speed, efficiency, costs, applications, data, services, sensitive data
    
McAfee EMEA
By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
    
McAfee
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
By: Neverfail Group     Published Date: Feb 10, 2012
In today's competitive and budget-sensitive world, any solution that does not provide uninterrupted availability proves an unfit guardian of an organization's most important applications.
Tags : 
database, microsoft, ms windows, windows, application security, cost control, it spending, application performance, high availability, sql server, exchange server, ms exchange, microsoft exchange, neverfail
    
Neverfail Group
By: Cisco     Published Date: Jun 02, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution.
Tags : 
malware protection, network security, it security, application security
    
Cisco
By: IBM     Published Date: May 09, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, mobile, hybrid, buyer's guide, mobile applications, mobile application platforms
    
IBM
By: Good Technology Corporation     Published Date: Oct 23, 2012
The consumerization of IT is coming. It's a given that employees will bring their own devices to work or will want to work on devices away from the office. The adoption of smart devices has set expectations, causing the "I want my iPad" phenomena
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, it implementation
    
Good Technology Corporation
By: CA Technologies EMEA     Published Date: May 23, 2018
CA Live API Creator creates application back-ends exposing enterprise-class REST/JSON APIs, including access to existing data and applications. It enables developers to create new REST endpoints that join data across diverse data sources using a point–and–click approach. API owners can extend the API with declarative business rules, JavaScript event processing, role-based security and interactive testing. The CA Live API Creator Reactive Logic model yields systems that are highly scalable and reliable. Its optimized services run more efficiently and with less fragility than services manually coded by skilled developers and architects.
Tags : 
    
CA Technologies EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.