application security

Results 226 - 250 of 878Sort Results By: Published Date | Title | Company Name
By: Okta     Published Date: Aug 03, 2016
Within 6 months of purchasing Okta, the average customer connects 10 applications, and once up and running, the number increases quickly. But, the average customer could be using twice as many provisioning integrations than they are. Using Okta for single sign-on and a centralized view of your cloud apps isn’t nearly enough. Watch this webinar for a live demo of Okta’s new Access Request Workflow and Access Discovery Report features and learn how Okta Provisioning can bring sanity to your IT processes. Learn about: • Provisioning Workflows • Role & Rule-based Access Control • Security-focused Compliance Reporting
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe, qos, security
    
Rohde & Schwarz Cybersecurity
By: Citrix Systems     Published Date: Nov 10, 2014
We’ve all come to expect the same security, performance and reliability from our mobile applications as we do with native applications. But these apps don’t just run on our mobile devices. They are powered by a variety of backend infrastructure – a hidden but important layer of application components and network devices. NetScaler helps this invisible layer of infrastructure to perform and communicate, improving security as well as quality of service. And by integrating with XenMobile, you can offer greater support and a better experience for mobile users. Learn more about delivering improved security, reliability and performance through mobile environments by reading our full report, Defend Hidden Mobile Web Properties (link).
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler
    
Citrix Systems
By: Citrix Systems     Published Date: Nov 10, 2014
Today, defending your organization’s web properties means more than just protecting a handful of enterprise web applications from advanced malware. Learn more on the complexity and challenges of defending against today’s modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution.
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler
    
Citrix Systems
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler gives you the visibility and control to manage, accelerate, and secure all your web properties, so you can deliver both the service and security your users demand. To learn more about web security and NetScaler, read the full report: Defend Web Properties from Modern Threats with Citrix NetScaler
Tags : 
citrix, security, netscaler, web
    
Citrix Systems, Inc.
By: Citrix Systems     Published Date: Nov 10, 2014
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler
    
Citrix Systems
By: IBM     Published Date: Apr 09, 2015
Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection.
Tags : 
malware protection, ibm, network security, it security, application security
    
IBM
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
Tags : 
alert logic, rackspace, pci, pci dss, payment security, compliance, vulnerability life cycle
    
Alert Logic and Rackspace
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, vulnerability life cycle
    
Alert Logic and Sungard Availability Services
By: HP - Enterprise     Published Date: Jun 04, 2013
Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and “bring-your-own” smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps for multiscreen devices; facilitating design, testing, security, performance, management, and compliance to reach new customers and employee expectations.
Tags : 
mobile apps, lifecycle approach, mobility services, bring-your-own-device, software
    
HP - Enterprise
By: CheckMarx     Published Date: Apr 03, 2019
We live in an era of digital transformation. Software is the backbone of this digital transformation. Mobile, cloud, open source, Internet of Things, microservices and AI have made software more complex. Over 80% of the code in today’s software applications is open source. Estimates show that there will be 30 billion connected IOT devices by 2020. Furthermore, 85% of customer interactions will be computer managed by 2020. Software is everywhere. While software has gotten more complex, timeto-market is the new name of the game and enterprises can’t risk security slowing this down.
Tags : 
    
CheckMarx
By: Citrix Systems     Published Date: Jul 17, 2015
Simplify adoption of the Google Chrome computing platform.
Tags : 
application delivery, platform, computing, architecture, security device optimization
    
Citrix Systems
By: Network Engines     Published Date: Sep 21, 2007
Enterprise customers want software applications delivered as server appliances because they help to reduce IT costs and complexity. Appliances provide better performance, security and manageability. Learn from experts, about factors to consider and things to avoid with the appliance delivery model.
Tags : 
software as an appliance, hardware, server hardware, software appliance, software delivery, software management, enterprise software, software installation, network performance, network engine, network engines
    
Network Engines
By: F5 Networks Inc     Published Date: Aug 16, 2016
Together, VMware and F5 enable global IT leaders to empower the Anywhere Enterprise to deliver enterprise applications across all devices and clouds built on SDDC principles. Today VMware and F5 offer the most sophisticated, end-to-end solutions for mobility, application delivery and network security to help CTOs and CIOs: - Ensure unprecedented application agility with a software-defined infrastructure and application services platform; - Automate application delivery while ensuring performance, availability, scalability, efficiency and security; - Achieve simplified end-to-end networking through an application-centric approach.
Tags : 
anywhere enterprise, vmware, enterprise it, application agility, software-defined infrastructure, it infrastructure, networking
    
F5 Networks Inc
By: Symantec     Published Date: Dec 13, 2017
This paper explores in more detail how you can use complementary application isolation and antimalware capabilities, delivered by Symantec Endpoint Protection, to achieve a more holistic, layered approach to your security, without sacrificing productivity.
Tags : 
defenses, symantec, endpoint, protection, application, holistic, security, antimalware, isolation
    
Symantec
By: OpenText     Published Date: Apr 13, 2012
SharePoint is now an important element of the information management infrastructure in many of the world's largest organizations. In many cases, these organizations must now consider how SharePoint, and the massive (and growing) amount of content it creates, will be managed as well as how it will integrate within the broader information infrastructure.
Tags : 
opentext, technology, sharepoint, application integration, user security, technology security
    
OpenText
By: StrikeIron     Published Date: Aug 01, 2013
For internal and external applications, Web API’s provide flexibility and unlock the value of your data and software. However, ongoing API development, deployment and delivery require extensive domain knowledge in operating an enterprise-class infrastructure. Without this expertise, scalability, reliability, and security are compromised.
Tags : 
cloud computing, colocation and web hosting, web service security, soap web development, web services, web service security, xml, mobile computing, mobile data system, wireless application software, content integration, application integration, content delivery, edi
    
StrikeIron
By: ZSL Inc.     Published Date: Sep 25, 2008
The hotspot in the current IT world is optimized Web Services. Now the enterprises have started their vision towards next generation Web Services. This white paper gives information for the business managers and engineers in developing and deploying Web Services using Rational Application Developer (RAD) and WebSphere Application Server (WAS), respectively. This paper explains the process to:* create a Web Service and Web Server client* build security to that web service* deploy the web service in WebSphere application server
Tags : 
zsl, soap, java, wsdl, uddi, web service security, risk exposure
    
ZSL Inc.
By: HP - Enterprise     Published Date: Nov 19, 2008
This webinar explores 12 of the most common security traps in Java by examining the causes of security failures in modern Java–based applications. Approaching security with an “outside in” style, we look at vulnerabilities from a developer’s perspective, focusing on the source code.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify
    
HP - Enterprise
By: IBM APAC     Published Date: Sep 25, 2017
Industry convergence is collapsing the barriers between formerly distinct industries. According to “Redefining Connections: Insights from the Global C-suite Study – The CIO Perspective,” produced by the IBM Institute for Business Value, CIOs believe this is the biggest trend transforming the business arena.
Tags : 
organizational security, site security, communication security, application security, database security, software licensing, installation
    
IBM APAC
By: Epicor     Published Date: Dec 06, 2018
Over the last several years, manufacturers have embraced cloud applications. However, some manufacturers remain reluctant to migrate ERP systems and other business-critical applications to the cloud. Read on to discover four areas where manufacturers can benefit from a more complete understanding of how and why Epicor Cloud ERP offers unique advantages compared to on-premises deployment, including: • Increased data security • Greater financial visibility and control • Better long-term reliability • Easier access to cutting-edge tech innovation Moving an ERP environment to the cloud enables IT leaders to free up the resources they need to partner with the business and to focus on more strategic technology initiatives. Download the white paper to learn more.
Tags : 
epicor erp, erp system, cloud erp
    
Epicor
By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera
By: Qualys     Published Date: Nov 16, 2012
This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization's overall vulnerability management program.
Tags : 
web applications, web application security, security and compliance
    
Qualys
By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : 
qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime, hacking breaches, security, application security, web application security, risk management, robustness, scanning, cloud platform
    
Qualys
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.