Application Security White Papers

Application Security encompasses measures taken to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, or deployment of the application.
Results 1 - 25 of 565Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jun 29, 2015

Ron the CIO challenges IT operations to cut 70% off of the application deployment schedule. Are his application, security, and network teams up to the task? How can SDN in the data center provide a powerful answer?

Tags : cisco, cisco aci, technology, security, data center, apic, security data, cio
    
By: Cisco     Published Date: Jun 24, 2015

This paper explores the main benefits of Cisco ACI Security.

Tags : cisco aci security, csico, virtualization, integration, security, application integration, data center, ynified
    
By: Mimecast     Published Date: Jun 22, 2015

Download this whitepaper today and take a good hard look at one of the biggest threats companies are facing – without preparation your company could be next.

Tags : spear-phising, cyber attacks, cyber threats, network security, company security, application security, business continuity, disaster recovery
    
By: Aerohive     Published Date: Jun 15, 2015

Lernen Sie, wie man einfach und sicher eine Palette von Benutzern und Geräten aktivieren kann, indem man jedem einen einmaligen Schlüssel zuweist.

Tags : wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
By: AlienVault     Published Date: Jun 05, 2015

Practical security controls that won't break the bank

Tags : threat management, security, network, web application, network, application security, application integration, data protection
    
By: Aerohive     Published Date: Jun 01, 2015

Learn how organisations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.

Tags : wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
By: Kaseya     Published Date: May 13, 2015

To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
By: Citrix Systems     Published Date: Apr 15, 2015

This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, migration, network architecture
    
By: Kaseya     Published Date: Mar 12, 2015

As an IT professional, you know that when you have many users to support, every second counts! Slow remote desktop connection times and poor, unreliable connection performance can add up to significant time wasted when extended over days, weeks and months of remote control sessions.

Tags : desktop management, virtual system administrator, storage virtualization, application security, application integration, application performance management, business integration, software compliance
    
By: CDW     Published Date: Jun 26, 2015

Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.

Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management
    
By: Aerohive     Published Date: Jun 15, 2015

Découvrez comment les organisations peuvent intégrer facilement et de manière sûre une gamme d’utilisateurs et de terminaux en fournissant des clés pré-partagées individuelles sur le même SSID.

Tags : wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
By: Lumension     Published Date: Jun 03, 2015

Microsoft withdraws support for Windows Server 2003 on July 14, 2015. Here’s how you need to respond to protect your organization’s information assets. Just after enterprises have finished migrating their desktops from Microsoft Windows XP, they now have to turn around and move away from Windows Server 2003. The venerable (and now vulnerable) operating system reaches end of support on July 14, 2015. But many companies will continue to use the software after that deadline, and that has serious security implications.

Tags : security, patch, data, regulatory compliance, application security, compliance, intrusion prevention, database development
    
By: Lumension     Published Date: Jun 03, 2015

The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.

Tags : anti-virus, security, application, management, patch, anti virus, application security, patch management
    
By: Acronis EMEA     Published Date: May 21, 2015

This Case Study reveals how companies are addressing today's Disaster Recovery challenges across physical, virtual and cloud environments.

Tags : data protection, cloud, cloud computing, disaster recovery, technologies, recovery, infrastructure, data security
    
By: Acronis EMEA     Published Date: May 19, 2015

This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.

Tags : security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance
    
By: Acronis EMEA     Published Date: May 19, 2015

The Morse Group is now comprised of a strong network of member companies with more than $150 million in annual sales that deliver services in the electrical, energy and construction markets.

Tags : mobility, acronis access solution, increase your competitiveness, mobilised workforce, improving productivity, acronis access, secure competitive, mobile device
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this case study to learn about the backup product they chose and how it gave them with a unified data and application database backup solution that simplified the procuring, learning and integrating of additional products, while saving time, lowering costs, and more.

Tags : backup, data protection, database backup application solution, data security, unified data, recovery, backup data, application security
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this case study now to find out about choosing Acronis backup solution and the benefits it came with.

Tags : acronis backup solution, backup solution, backup, recovery, protection, recovery services, benefits of acronis backup solution, remote recovery services
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this datasheet to discover the main benefits of Acronis Access Advanced.

Tags : acronis, acronis access advanced, secure mobile access, security, content security, devices, secure access, share content
    
By: Box     Published Date: May 11, 2015

This white paper focuses on four considerations for a mature mobile strategy to reduce the risk of falling behind other key competitors.

Tags : mature mobile strategy, mobile devices, workflow, security, secure collaboration, it strategy, integration, mobility
    
By: Box     Published Date: May 11, 2015

This paper reveals the 6 essential elements of a mobile strategy.

Tags : mobility, modern mobility strategy, mobility strategy, box, mobile, mobile advantage, security, strategy for mobility
    
By: Forrester Research     Published Date: Apr 27, 2015

Download the report to learn how to prepare an Incident Response Plan that ensures your business recovers quickly and effectively.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network architecture, network management, network performance
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.

Tags : fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.

Tags : mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

.NET
51 Documents
Access Control
702 Documents
Anti Spam
583 Documents
Anti Spyware
626 Documents
Anti Virus
671 Documents
Application Integration
471 Documents
Application Integration
853 Documents
Application Performance Management
813 Documents
Authentication
369 Documents
Biometrics
116 Documents
Business Continuity
400 Documents
Business Integration
464 Documents
C++
40 Documents
Content Management System
316 Documents
Data Integration
414 Documents
Data Protection
871 Documents
Database Development
120 Documents
Database Development
313 Documents
Database Security
431 Documents
DDoS
191 Documents
Disaster Recovery
543 Documents
EDI
65 Documents
Email Security
591 Documents
Encryption
461 Documents
Firewalls
417 Documents
Hacker Detection
490 Documents
Identity Management
523 Documents
Internet Security
950 Documents
Intrusion Detection
610 Documents
Intrusion Prevention
678 Documents
IPSec
156 Documents
Java
62 Documents
Linux
86 Documents
Load Balancing
180 Documents
Microsoft Exchange
134 Documents
Middleware
51 Documents
Network Security
568 Documents
Network Security Appliance
366 Documents
Oracle
101 Documents
Password Management
213 Documents
PCI Compliance
240 Documents
PKI
120 Documents
Risk Management
332 Documents
Search And Retrieval
96 Documents
Secure Content Management
190 Documents
Security Management
1080 Documents
Security Policies
433 Documents
Service Oriented Architecture
287 Documents
SOAP
31 Documents
SOAP
68 Documents
Solaris
10 Documents
SSL
230 Documents
Storage Area Networks
290 Documents
TCP/IP Protocol
178 Documents
Visual Basic
29 Documents
Vulnerability Management
583 Documents
Web Development
108 Documents
Web Service Management
253 Documents
Web Service Security
387 Documents
Web Service Security
78 Documents
Web Services
135 Documents
Web Sphere
40 Documents
Wireless Security
291 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.