application security

Results 301 - 325 of 810Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: May 14, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
    
Cisco
By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis
    
Cisco
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Internally developed software applications support the most sensitive and strategically important business processes of most enterprises. Yet application security is one of the most neglected fields of cybersecurity.
Tags : 
risk-based application security, security management, application security, software applications
    
Group M_IBM Q1'18
By: Cybric     Published Date: Oct 30, 2017
How a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Whether you’ve over-invested in security tools, under-invested, don’t know the extent of your security capabilities or you’re facing new regulations that require you to demonstrate and continually maintain compliance — there is a path forward. To understand and optimize what you have in place, as well as gaps you may have, develop a security rationalization process to calculate the return on your security investments. Read this paper to learn the five steps needed to get started.
Tags : 
cybersecurity, cyber security, ciso, security visibility, security assurance, security resilience, application security tools, appsec, security audit
    
Cybric
By: Boardwalktech     Published Date: Jun 05, 2018
Blockchain is reimagining the way enterprises operate. It’s a powerful new enterprise technology that can be used across vertical and application domains to realize greater efficiency, support new business models and revenue sources, and enhance the security and elevate the trust of enterprise transactions.
Tags : 
    
Boardwalktech
By: Dell     Published Date: Feb 04, 2015
More than 23 million servers in the world are still running on the Microsoft Windows Server 2003 operating system, making it the most popular engine for serving information and applications globally for over a decade. But, starting in July 2015, Microsoft will no longer provide basic support for it.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
    
Dell
By: Entrust Datacard     Published Date: Sep 14, 2018
Digital is changing the face of business, and your security needs are evolving along with it. The widespread adoption of technologies and applications like mobile, VPN and Office 365 have enabled your users a more frictionless work experience. But how can you ensure those experiences are also secure? Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out the 2018 Forrester Opportunity Snapshot — Modern Authentication Methods Protect and Enable study to learn what authentication methods other companies are using and which of these methods are most effective.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
By: OneLogin     Published Date: Oct 24, 2017
From the information provided in the interviews, Forrester has constructed a Total Economic Impact (TEI) framework for those organizations considering investing in OneLogin. The objective of the framework is to identify the benefits, costs, flexibility, and risk factors that affect the investment decision. Forrester employed four fundamental elements of TEI in modeling OneLogin: benefits, costs, flexibility options, and risks. Forrester took a multistep approach to evaluate the impact that OneLogin can have on the Organization (see Figure 2). Specifically, we: › Interviewed OneLogin marketing, sales, and product management personnel, along with Forrester analysts, to better understand the value proposition for OneLogin. › Conducted an in-depth interview with the Organization’s senior application engineer and its supervisor of IT security to obtain data with respect to costs, benefits, and risks. › Constructed a financial model representative of the interviews using the TEI metho
Tags : 
    
OneLogin
By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : 
prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration
    
Prodiance Corp.
By: Acronis Inc.     Published Date: Jul 14, 2009
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 Advanced Server is the next generation of the Acronis True Image disaster recovery family for physical and virtual environments. Register below to receive access for a free trial version.
Tags : 
acronis, backup, recovery, server, windows, disaster recovery, stand-alone, data protection, system recovery, application security, backup, data management, windows server, free trial, demo software, bare metal, virtual backup, data deduplication
    
Acronis Inc.
By: Acronis Inc.     Published Date: Jul 14, 2009
Acronis® Backup & Recovery™ 10 Server for Windows is the next-generation disaster recovery product, designed to back up and protect stand-alone Windows Servers. Download this demo software to learn how Acronis Backup Recovery™ 10 Server for Windows can help you recover the operating system, applications and all data in minutes after any unforeseen event.
Tags : 
acronis, backup, recovery, windows servers, disaster recovery, stand-alone, data protection, system recovery, application security, backup, data management, trial download, software trial, free trial
    
Acronis Inc.
By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : 
anti spam, anti spyware, anti virus, application security, security, network security, data protection, malware, secure computing, securecomputing
    
Secure Computing
By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : 
unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
    
McAfee
By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware AirWatch
By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware
By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
    
CA Technologies EMEA
By: Forcepoint     Published Date: May 16, 2016
Die finanziellen und rechtlichen Konsequenzen der während des vergangenen Jahres verzeichneten öffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverständliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen Überblick über das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prüfstand zu stellen.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
By: Forcepoint     Published Date: Apr 20, 2016
Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.
Tags : 
cyber security, security application, security, cybersecurity, data prevention
    
Forcepoint
By: IBM     Published Date: Feb 11, 2015
IBM has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for Application Security.
Tags : 
application security testing, application security, ibm, iast, binary code
    
IBM
By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security, application security
    
Veracode
By: Citrix Systems     Published Date: Feb 10, 2016
Learn why Citrix was named a leader in the 2015 Gartner Magic Quadrant for Application Delivery Controllers, for the ninth consecutive year. With more than 25 years experience providing secure access to enterprise applications, it’s clear you can rely on Citrix to drive new levels of security and productivity in your organization. Register to download the 2015 Gartner Magic Quadrant for Application Delivery Controllers, plus receive a bonus white paper, Citrix NetScaler - A Foundation for Next-Generation Datacenter and Cloud-Based Security.
Tags : 
    
Citrix Systems
By: Trend Micro     Published Date: May 03, 2018
Since the early days of the Gartner Magic Quadrant for this category, there have been successive waves of innovation. Back in 2002, integrated firewalls captured the market’s (and Gartner’s) attention. Over the years, we’ve seen technologies, such as full disk encryption, data loss prevention (DLP), behavioral detection, application control, and more recently, machine learning, as effective new ways to protect endpoints, detect threats and give security teams peace of mind. Trend Micro has consistently been part of these innovation waves. It’s clear that the market is excited about Endpoint Detection & Response (EDR). There are two drivers for this, and we are committed to delivering effective solutions in both areas.
Tags : 
    
Trend Micro
By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
    
McAfee
By: F5     Published Date: Feb 07, 2013
Load balancers are officially dead; refocus on application delivery. Read this report and you’ll learn about enterprises that are still focused on load balancing, improving application performance and security, increasing efficiency and more.
Tags : 
application delivery, load balancer, officially dead, gartner report, adc
    
F5
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.