"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Application Security

Application Security encompasses measures taken to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, or deployment of the application.
Results 651 - 675 of 715Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Jan 23, 2013
In our hyperconnected world, employees expect to work from anywhere … at any time … with any device. Each of these new access points, however, increases the IT security perimeter.
Tags : 
byod, mobile, remote access, productivity, access control
    
IBM
Webinar Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
White Paper Published By: Rapid7     Published Date: Nov 27, 2012
The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook.
Tags : 
rapid7, technology, security, it management, business technology
    
Rapid7
White Paper Published By: Dell Software     Published Date: Jul 18, 2012
Take the Active Directory management quiz!
Tags : 
quiz, active sirectory, microsoft, directory service, server
    
Dell Software
White Paper Published By: EMC Corporation     Published Date: Mar 08, 2012
This white paper highlights several new features within EMC ®Avamar ® 6.0 that specifically target and greatly advance the capabilities and performance of VMware data protection.
Tags : 
leveraging, emc, deduplication, solutions, backup
    
EMC Corporation
White Paper Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
White Paper Published By: Symantec     Published Date: Jan 04, 2012
Read this white paper and learn how the proper IT security policies can actually drive more sales.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: ScriptLogic     Published Date: Nov 14, 2011
The aim of this document is to highlight ways in which ScriptLogic solutions can be used to bring Microsoft Windows-based IT systems into line with the requirements of the Payment Card Industry (PCI) Data Security Standard.
Tags : 
pci compliance, compliance, scriptlogic, pci, security standard
    
ScriptLogic
White Paper Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
Blue Coat WebFilter helps you easily manage web content by categorizing it into a discrete number of categories. Read about some of the new additions.
Tags : 
blue coat, webfilter, filter, categories, benefits
    
Blue Coat Systems UK
Webinar Published By: ESET, LLC.     Published Date: Oct 27, 2011
Get the information you need to make the right decision through this presentation. Register for the "Finding the Right Antivirus Solution e-Kit" to watch this webcast to get answers to your questions around effectiveness, performance, environmental fit and usage, management efficiency, and more.
Tags : 
eset, technology, security, internet security, anti virus
    
ESET, LLC.
White Paper Published By: ESET, LLC.     Published Date: Oct 27, 2011
If you're looking to evaluate antivirus software based on its price, you're missing the larger picture. You need an antivirus solution that will work with today's complicated infrastructures that include virtualization, you need proactive protection from malware and you need an antivirus solution that won't rob your employees of productivity. Register for the "Finding the Right Antivirus Solution e-Kit" to better understand what goes into the process of evaluating antivirus software.
Tags : 
eset, technology, security, anti virus, internet security
    
ESET, LLC.
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Take a look at this techincal overview to see how Blue Coat's defense systems, powered by WebPulse helps businesses get in front of malware networks
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter helps you easily manage web content by categorizing it into a discrete number of categories. Read about some of the new additions.
Tags : 
blue coat, webfilter, filter, categories, benefits
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 24, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 24, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses
    
Blue Coat Systems
White Paper Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
In this must read white paper, you will learn about cloud computing, new opportunities, new security challenges and how to ensure your data is safe.
Tags : 
cloud, hosting company, security, ssl certificate, verisign inc.
    
VeriSign Authentication Services, now a part of Symantec Corp.
White Paper Published By: NetIQ     Published Date: Jul 21, 2011
Expansion into different markets can be difficult. Read this success story about how NetIQ Directory and Resource Administrator powered NRG Energy and find out what NetIQ can do for you and your business.
Tags : 
netiq, nrg, nrg energy, pci compliance, file integrity monitoring
    
NetIQ
White Paper Published By: Webroot     Published Date: Jul 08, 2011
This paper reviews the business value of IT security, illustrates the business case for SaaS over "do it yourself" premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software
    
Webroot
White Paper Published By: Distributed Management Systems     Published Date: Jul 03, 2011
White Paper describing a new approach to multi-factor authentication for the Cloud
Tags : 
mutual authentication for the cloud, authentication at application level, access control, application security, authentication
    
Distributed Management Systems
Webinar Published By: ESET     Published Date: Jun 20, 2011
Trusted experts in endpoint security solutions. Learn more today!
Tags : 
cloud computing, endpoint security, evolution, google, hype
    
ESET
White Paper Published By: IBM Corporation     Published Date: Jun 09, 2011
This study provides real-world findings from in-depth interviews with 15 enterprises that have implemented database auditing and real-time protection solutions.
Tags : 
ibm, guardium, database auditing, security, real-time protection
    
IBM Corporation
White Paper Published By: Qualys     Published Date: Apr 05, 2011
To help you understand how to minimize these risks, Qualys provides this guide as a primer to web application security.
Tags : 
web application security, qualys, vulnerabilities, sql injection, ssi injection
    
Qualys
White Paper Published By: Qualys     Published Date: Apr 05, 2011
This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
Tags : 
it security, vulnerability management, risk management, qualysguard, risk optimization
    
Qualys
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Special Report

Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory