"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Web Service Security

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 26 - 50 of 63Sort Results By: Published Date | Title | Company Name
White Paper Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
This white paper discusses the drivers for migrating to Exchange 2010 and why decision makers should consider adopting cloud-based MST/AM during the planning phase of the overall migration.
Tags : 
yousendit, exchange, cloud-based, cloud computing, web services
    
Aberdeen - youSENDit
White Paper Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.
Tags : 
yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files
    
Aberdeen - youSENDit
White Paper Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
YouSendIt is a Web-based secure digital file delivery company, which lets users securely send, receive and track files on demand. It is an alternative to sending large e-mail attachments, using FTP, and sending CDs or DVDs or tape or USB flash drive via Sneakernet. The sender can enter the recipients' e-mail addresses, attach the file and send it; the recipients receive an e-mail notification with a URL that lets them download the file.
Tags : 
yousendit, dortch, large content, file sending, marketing
    
Aberdeen - youSENDit
White Paper Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.
Tags : 
globalsign, hackalert, blacklisting, malware, drive by downloads
    
Globalsign Inc.
White Paper Published By: M86 Security     Published Date: Feb 08, 2011
This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.
Tags : 
m86 security, productivity, web repair, malware protection, social networking
    
M86 Security
White Paper Published By: Coverity, Inc.     Published Date: Nov 01, 2010
This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects
    
Coverity, Inc.
White Paper Published By: Coverity, Inc.     Published Date: Aug 16, 2010
voke Names Coverity as a Transformational Company in the Testing Market Coverity has been rated as a Transformational company in the voke, inc. Market Mover Array Report for Testing Platforms. Coverity's rating is recognition of the impact that Coverity's software integrity strategy is making in shaping the future of the testing market.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects
    
Coverity, Inc.
White Paper Published By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : 
ibm ouncelab, secure web application, software development lifecycle, security integration, risk management
    
IBM Software
Webinar Published By: IBM Software     Published Date: Aug 04, 2010
Learn how to you ensure that security standards are met as part of your quality measures.
Tags : 
ibm ouncelab, podcast, security software, secure software delivery, security
    
IBM Software
White Paper Published By: Coverity, Inc.     Published Date: Feb 26, 2010
Find out how Coverity has helped Frequentis ensure a high level of software integrity to support its product mission of freedom from failure, while continually improving the productivity of its developers.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects
    
Coverity, Inc.
White Paper Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk
    
HP - Enterprise
White Paper Published By: MessageLabs     Published Date: Sep 17, 2008
Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.
Tags : 
web security, internet security, social networking, facebook, myspace
    
MessageLabs
White Paper Published By: thawte     Published Date: Aug 27, 2008
This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
Tags : 
ssl, thawte, certified, certification, secure socket
    
thawte
White Paper Published By: Cisco     Published Date: Aug 18, 2014
The latest Gartner Magic Quadrant Reports are available, covering Secure Web Gateway (SWG) and Secure Email Gateway vendors. Published in May and July 2013, you’ll get insights on the current state of security threats and solutions. Find out why Gartner says, “The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention, capability encryption, and better protection from targeted phishing attacks.
Tags : 
email, web security, quadrant, solutions, threats
    
Cisco
White Paper Published By: Cisco     Published Date: Aug 18, 2014
You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the revival of distributed denial-of-service (DDoS) attacks.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service
    
Cisco
White Paper Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
cloud, mobility, social business, big data, external threats
    
IBM
White Paper Published By: Dell Software     Published Date: Jul 18, 2012
Implement PCI Compliance
Tags : 
pci, payment card industry, data security, scriptlogic, mocrosoft windows
    
Dell Software
White Paper Published By: Qualys     Published Date: Apr 05, 2011
This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
Tags : 
it security, vulnerability management, risk management, qualysguard, risk optimization
    
Qualys
White Paper Published By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : 
virtualization, memory overcommitment, memory performance, memory reclamation, vmware
    
Kingston
White Paper Published By: M3 Consulting, Inc.     Published Date: Feb 03, 2011
Offshoring Is a Cost Effective Solution to Your IT Needs
Tags : 
software design, application development, web design, offshoring, it solutions
    
M3 Consulting, Inc.
White Paper Published By: GlobalSign     Published Date: Jan 11, 2011
White Paper explaining the growing need for Digitally Signing Adobe AIR applications, and expanding the market reach of your application by distributing trusted code.
Tags : 
code signing, digital certificate, pki, adobe air, digital signatures
    
GlobalSign
White Paper Published By: Gartner, Inc     Published Date: Oct 28, 2010
New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.
Tags : 
emerging trends, emerging technologies, hype cycle, new technologies, it trends
    
Gartner, Inc
White Paper Published By: xmannnnn     Published Date: Aug 06, 2010
Ultra High Speed Internet, TV and local/long distance phone services combined into 1 superior service.
Tags : 
active directory, bandwidth management, convergence, distributed computing, ethernet networking
    
xmannnnn
White Paper Published By: OpSource     Published Date: Aug 21, 2009
SaaS is vastly different from traditional client-server software. Learn how to adapt a single instance, multi instance, or multi tenant application for effective SaaS delivery.
Tags : 
saas, software as a service, saas delivery, software development, service management
    
OpSource
White Paper Published By: Reactivity     Published Date: Aug 21, 2009
Businesses are rapidly adopting Web services to provide new levels of integration between applications. By comparison with earlier data communications techniques, Web services are faster and cheaper to develop, quicker to deploy, and easier to adapt to emerging business needs. This paper discusses the special security challenges posed by the use of Web services, and how to secure networks against them.
Tags : 
web services, web service management, web service deployment, web service, web service security
    
Reactivity
Start   Previous    1 2 3    Next    End
Search      

Special Report

What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory