"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

application assurance

Results 1 - 25 of 27Sort Results By: Published Date | Title | Company Name
Published By: Cybric     Published Date: Oct 30, 2017
Learn how a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Development velocity is accelerating as enterprises adopt DevOps methodologies, yet security is still not integrated into the coding and deployment processes. Security teams are falling further behind as their manual processes and controls can’t scale at the same rate as development. This paper discusses: The impact the current approach to application security has on business How shifting security left in the application development process, seamlessly integrating it “early and often,” can accelerate innovation Questions the Board and C-suite are now asking about security: are you prepared? Read this paper to learn how, by shifting security left in the development process, it’s now no longer an obstacle to velocity, innovation and competitiveness. Instead, it’s an asset.
Tags : 
application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience, application security tools, cio, ciso, appsec
    
Cybric
Published By: Cybric     Published Date: Oct 30, 2017
Committed to advancing brain research, The Dana Foundation needed to transition to the cloud to drive efficiency and more effectively manage risk. With this shift, Dana moved from waterfall development to DevOps but still needed to maintain its strict security posture. In this case study Jim Rutt, CIO of The Dana Foundation, discusses his use of the CYBRIC continuous application security platform to move to DevOps, embedding security earlier in the development process and gaining full security visibility across the SDLC.
Tags : 
cybersecurity, cyber security, cio, application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience, application security tools, cloud security, transformation
    
Cybric
Published By: Entrust Datacard     Published Date: Mar 24, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing, software testing
    
CA Mainframe
Published By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
Six Steps to Secure Your Applications Learn why application security is more critical than ever to your business. Find out more now.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, access control, authentication, disaster recovery, encryption, wireless security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
Seven Steps to Delivering More Secure Software With all the processes that go into making an application more secure. Where do you start? Learn more
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, access control, disaster recovery, encryption, service oriented architecture, service management
    
HP - Enterprise
Published By: FICO     Published Date: Jun 07, 2016
As IT departments’ lists of backlogged application development projects keep growing, so does the speed of new development requests from line-of-business personnel. For many IT departments, the speed of business — the speed of requests for additional developments — can’t be met under current practices. This inability to keep pace with critical development requests, supporting timely strategy modifications, seriously impacts an enterprise’s profitability. The solution FICO advocates — one that accounts for budget constraints, legacy operational realities and quality assurance — is to empower line-of-business personnel as Citizen Developers, giving them the right set of technology assets to quickly, safely and cost effectively participate in application development.
Tags : 
    
FICO
Published By: Applause     Published Date: Jul 14, 2017
Learn tips, techiques and trends for launching great digital experiences that delight your users in our free guide.
Tags : 
mobile app testing, mobile applications, mobile application testing, software testing, functional testing, usability testing, usability studies, security testing, localization testing, device fragmentation, native apps, quality assurance, applause, android app testing, ios app testing
    
Applause
Published By: HP - Enterprise     Published Date: Oct 16, 2008
The hacking community has shifted its effort toward a new frontier:  the application layer.  How are companies responding?  Business Software Assurance – the capability to address the problem of application risk within an enterprise.  This whitepaper provides an overview of the severity of the problem along with everything needed to develop Business Software Assurance in your organization. 
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
    
HP - Enterprise
Published By: Citrix NetScaler     Published Date: May 06, 2013
The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential to ensuring a positive user experience and maintaining the highest levels of employee productivity and customer satisfaction. The challenge of establishing an effective application visibility and control function is only growing, as trends such as mobility, virtualization, and cloud computing fundamentally alter datacenter and application architectures. With NetScaler Insight Center enterprises get: • Unparalleled application visibility and invaluable operational intelligence; • Increased operational efficiency, as troubleshooting and capacity planning efforts are greatly simplified; • An optimized user experience that drives greater employee productivity and customer satisfaction; • Increased assurance that governing SLAs will always be met; and, • Reduced total cost of ownership, based on having a low-cost, low-impact solution—particularly compared to traditional
Tags : 
application visibility, netscaler insight center, optimized user experience, low cost, citrix, knowledge management, enterprise applications
    
Citrix NetScaler
Published By: Keynote     Published Date: Nov 13, 2013
As companies aggressively determine how to monetize their mobile channels, or deploy mobile applications to improve business efficiency, those tasked with quality assurance need to support these efforts for all types of devices—in an efficient and cost-effective manner.
Tags : 
mobile testing, mobile apps, operating systems, best practices, business efficiency, quality assurance, cost effective, mobile data systems
    
Keynote
Published By: HP     Published Date: Sep 14, 2015
The early days of enterprise mobile app development focused on creating a functional experience and getting it out the door quickly, leaving “quality” as a problem for another day. As organizations mature their development and delivery of mobile applications, traditional software quality fundamentals settle back into the life cycle, with some key changes to testing processes and team structure. App performance is an example of how mobile changes quality assurance. Performance is a key pillar of quality that mobile shops often overlook in their race to market. This report dives into the problem areas that impede mobile performance, and provides guidance on this not-so-black-and-white area of quality.
Tags : 
    
HP
Published By: IBM     Published Date: Jun 16, 2009
Are untested Web applications putting your business at risk?
Tags : 
ibm, rational appscan, web application security, risk, threat, compliance, scan, fix, reporting, functionality, mmdg, web application security consortium, wasc, javascript and xml, ajax, sox, hiipa, quality assurance, security
    
IBM
Published By: IBM     Published Date: Jun 16, 2009
Previously known as Watchfire AppScan, Rational® AppScan® Standard Edition V7.8 is a leading testing tool that scans and tests your Web applications for all common vulnerabilities. Download the trial to see how it automates the testing process so you can address problems early.
Tags : 
trial, appscan, watchfire, rational appscan, ibm, mmdg, testing, web application, web application security, risk, threat, compliance, scan, fix, reporting, functionality, mmdg, web application security consortium, wasc, javascript and xml
    
IBM
Published By: VMTurbo     Published Date: Jul 08, 2015
This paper explores the benefits of incorporating network traffic to topology information in VM placement decisions, as well as the integration between VMTrubo and Arista Networks.
Tags : 
application assurance, application quality, integration, application management, virtualization, mobility, storage virtualization, application delivery, network performance, network performance management, business analytics, business intelligence, analytical applications, data quality, data center design and management
    
VMTurbo
Published By: Microsoft Visual Studio Team System     Published Date: Apr 29, 2009
Today’s economic climate presents challenges in achieving business differentiation.  Investing in innovation during an economic downturn may seem counterintuitive at first, but it can help companies pull ahead of the competition by displaying a show of strength in a climate of weakness.  The Microsoft® Application Platform can help organizations do more with less, enabling them to more quickly, efficiently, and cost-effectively deliver custom solutions that provide strong business value.
Tags : 
microsoft, vsts, microsoft vsts, affordable innovation, application platform, custom solutions, application life-cycle management, rich development platform, designer-developer collaboration, application life-cycle management, alm, microsoft visual studio team system, version control, work assignment, tracking, builds, testing, shaw group, microsoft .net framework, ch2m hill
    
Microsoft Visual Studio Team System
Published By: HP Software     Published Date: Jul 13, 2015
The early days of enterprise mobile app development focused on creating a functional experience and getting it out the door quickly, leaving “quality” as a problem for another day. As organizations mature their development and delivery of mobile applications, traditional software quality fundamentals settle back into the life cycle, with some key changes to testing processes and team structure. App performance is an example of how mobile changes quality assurance. Performance is a key pillar of quality that mobile shops often overlook in their race to market. This report dives into the problem areas that impede mobile performance, and provides guidance on this not-so-black-and-white area of quality.
Tags : 
mobile, mobile experience, mobile app development, mobile performance
    
HP Software
Published By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : 
symantec, malware, applications, security, code signing, application security, security policies
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application
Tags : 
security, applications, symantec, code signing, malware, software development
    
Symantec Corporation
Published By: SoftLanding Systems     Published Date: Nov 18, 2006
This no-nonsense primer covers the benefits and basic principles of good testing, offers practical advice for getting the most out of your testing efforts, and pinpoints several areas where automation will help you achieve the most cost-effective results.
Tags : 
software testing, quality assurance, application testing, test and measurement, database development, quality assurance, scripting, software testing, web services, web service security, softlanding, soft landing, software development
    
SoftLanding Systems
Previous   1 2    Next    
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory