"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Application Security

Application Security encompasses measures taken to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, or deployment of the application.
Results 126 - 150 of 712Sort Results By: Published Date | Title | Company Name
White Paper Published By: Venafi     Published Date: Aug 07, 2015
Public key infrastructure (PKI) is the foundation of today’s enterprise security. But most PKI lacks central visibility, consistent processes, and refresh progress validation.
Tags : 
pki refresh, public key infrastructure, system errors, system updates, automated key securit
    
Venafi
White Paper Published By: Venafi     Published Date: Aug 07, 2015
It was recently found that most Global 2000 organisations have failed to completely remediate Heartbleed. This leaves these organisations vulnerable to cyberattacks, future brand damage, and intellectual property loss.
Tags : 
cyberattacks, security, cybercriminals, security application, access control
    
Venafi
White Paper Published By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals
    
Venafi
White Paper Published By: Viavi Solutions     Published Date: Aug 05, 2015
With increasingly creative exploits, it is important to stay ahead of the curve when it comes to data protection. Performance monitoring tools that do not keep pace can leave your information vulnerable.
Tags : 
apm, security, hacking, performance monitoring, application security
    
Viavi Solutions
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Learn how to manage automated threats
Tags : 
automated threat management, signature management, data breach investigation, threat detection, threat prevention
    
Vectra Networks
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Learn how Vectra empowers IT and security analysts with insights to stop attacks, even while they’re happening.
Tags : 
network security management, it security, intrusion prevention, security analysis, cyberattacks
    
Vectra Networks
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.
Tags : 
post intrusion report, metadata, network threats, network security management, it security
    
Vectra Networks
Case Study Published By: Vectra Networks     Published Date: Aug 03, 2015
Learn how Vectra protects Tri-State’s corporate and subscriber data and prevents cyberattacks to the power grid.
Tags : 
utilities provider, cyberattack detection, vulnerability management, security management, it security
    
Vectra Networks
White Paper Published By: IBM     Published Date: Jul 31, 2015
Danger of the web.
Tags : 
application security, productivity
    
IBM
White Paper Published By: IBM     Published Date: Jul 31, 2015
Security management for mainframe clouds.
Tags : 
application security, security management
    
IBM
White Paper Published By: IBM     Published Date: Jul 31, 2015
Guide to security intelligence.
Tags : 
security, data, application security, business continuity, infrastructure
    
IBM
White Paper Published By: IBM     Published Date: Jul 31, 2015
Prevent credential theft.
Tags : 
threats, corporate, protection, security, application security
    
IBM
Case Study Published By: Venafi     Published Date: Jul 27, 2015
Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.
Tags : 
cybersecurity, keys, certificates, cyber attacks, server certificate misuse
    
Venafi
White Paper Published By: Venafi     Published Date: Jul 27, 2015
See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.
Tags : 
security controls, key misuse, certificate misuse, security management, breach prevention
    
Venafi
White Paper Published By: Venafi     Published Date: Jul 27, 2015
To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.
Tags : 
cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks
    
Venafi
Free Offer Published By: Venafi     Published Date: Jul 27, 2015
Read this important brief to learn how to maintain your cybersecurity and reduce risk.
Tags : 
sans, security controls, control requirements, cybersecurity, risk reduction
    
Venafi
Free Offer Published By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : 
ssh security gaps, business protection, cybersecurity, cryptographic security, data protection
    
Venafi
Free Offer Published By: Venafi     Published Date: Jul 27, 2015
Read this solution brief to learn how Security Operations teams can eliminate outages.
Tags : 
outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks
    
Venafi
White Paper Published By: Entrust Datacard     Published Date: Jul 21, 2015
Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems.
Tags : 
internet of things, authentication, security, identity, safety
    
Entrust Datacard
White Paper Published By: Citrix Systems     Published Date: Jul 17, 2015
Citrix XenApp helps people be productive.
Tags : 
productivity, business applications, security, mobile platforms, development
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jul 17, 2015
Why app and desktop virtualization should be the foundation for your layered approach.
Tags : 
information security, layered approach, mobility, application, desktop virtualization
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jul 17, 2015
Adoption of mobile devices continues to expand.
Tags : 
windows, applications, platform, security, performance
    
Citrix Systems
White Paper Published By: IBM     Published Date: Jul 15, 2015
How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.
Tags : 
database vulnerability, proactive strategies, data protection, compliance, data breach
    
IBM
Webinar Published By: CDW     Published Date: Jul 08, 2015
It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.
Tags : 
security, vulnerability management, analytics, mobile security, byod
    
CDW
White Paper Published By: IBM     Published Date: Jul 07, 2015
This infographic succinctly explains the value of our Mobile Platform for key stakeholders -- developers, IT managers, app owners and users, and CISOs. It also charts our four capabilities and the modular services aligned to them.
Tags : 
ibm, developer, app, platform, it manager
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory