Application Security White Papers

Application Security encompasses measures taken to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, or deployment of the application.
Results 1 - 25 of 553Sort Results By: Published Date | Title | Company Name
By: Citrix Systems     Published Date: Apr 15, 2015

This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, migration, network architecture
    
By: IBM     Published Date: Apr 09, 2015

Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

Tags : ibm, integrated security, security weakness, risk management, infrastructure security, application security, firewalls, network security appliance
    
By: IBM     Published Date: Apr 09, 2015

Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.

Tags : ibm, optimization, security, cyber crime, network security, it security, access control, anti spyware
    
By: IBM     Published Date: Apr 09, 2015

This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction’s lifecycle—pre-login, during login and post-login—and offers strategies to help financial organizations combat malware-driven attacks.

Tags : ibm, it security, password security, malware prevention, security infrastructure, anti spyware, anti virus, application security
    
By: Kaseya     Published Date: Mar 12, 2015

Fighting Cyber Crime with Automated, Centralized Management

Tags : cyber crime, automation management systems, network security, software applications, network infrastructure, infrastructure, network management, network performance
    
By: Kaseya     Published Date: Mar 12, 2015

As an IT professional, you know that when you have many users to support, every second counts! Slow remote desktop connection times and poor, unreliable connection performance can add up to significant time wasted when extended over days, weeks and months of remote control sessions.

Tags : desktop management, virtual system administrator, storage virtualization, application security, application integration, application performance management, business integration, software compliance
    
By: Kaspersky     Published Date: Feb 05, 2015

This Kaspersky guide shows the benefits that only and Integrated Platform Security Solution can bring.

Tags : integrated platform security, security solution, integrated security technologies, endpoint protection platforms, epps, application security, encryption, internet security
    
By: Kaspersky     Published Date: Feb 05, 2015

This White Paper provides information on how to ensure protection from both regular malware and sophisticated targeted attacks.

Tags : cyberthreats to ics systems, protect from malware, protect from targeted attacks, ics, it security, ensure ics security, protection measures, anti spyware
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper reveals how important is effective security software for banking threats.

Tags : online and mobile banking threats, online e-payments, security of online payments, cybercriminals, protection mechanisms used by banks, access control, anti spyware, application security
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.

Tags : security, virtualization, security approaches, kaspersky, anti spam, anti spyware, anti virus, application security
    
By: Kaspersky     Published Date: Feb 05, 2015

The Security Technologies for Mobile and BYOD guide reveals the essential security technology options for protecting enterprise networks, systems and data.

Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.

Tags : benefits to enterprise it security, exploit prevention, protection from exploits, software attacks, anti spam, anti spyware, anti virus, application security
    
By: Forrester Research     Published Date: Apr 27, 2015

Download the report to learn how to prepare an Incident Response Plan that ensures your business recovers quickly and effectively.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network architecture, network management, network performance
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.

Tags : fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.

Tags : mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: Bit9     Published Date: Apr 16, 2015

You can’t open a newspaper or visit an online news site these days without some mention of a cyber-attack or data breach. These activities are becoming more prevalent, and as a result, the reporting of these activities is also on the rise.

Tags : data breach, breach preparation, cyber attack, data security, threat detection, security, application security, hacker detection
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, application security, mobile computing
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

IT is set to be the great enabler of the lightweight application revolution, first though they need to learn how the new paradigm of multiple operating systems across all devices requires a new more open management mindset.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, application security, mobile computing
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Volume III: Four Components of a Solid Mobile App Strategy! Successfully becoming mobile first and app enabled is a simple exercise of discovery, scalability, sustainability and security.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, application security, mobile computing
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock.?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.??

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

.NET
51 Documents
Access Control
691 Documents
Anti Spam
575 Documents
Anti Spyware
617 Documents
Anti Virus
665 Documents
Application Integration
437 Documents
Application Integration
787 Documents
Application Performance Management
766 Documents
Authentication
365 Documents
Biometrics
114 Documents
Business Continuity
390 Documents
Business Integration
442 Documents
C++
40 Documents
Content Management System
299 Documents
Data Integration
394 Documents
Data Protection
832 Documents
Database Development
108 Documents
Database Development
298 Documents
Database Security
409 Documents
DDoS
191 Documents
Disaster Recovery
525 Documents
EDI
64 Documents
Email Security
579 Documents
Encryption
458 Documents
Firewalls
407 Documents
Hacker Detection
479 Documents
Identity Management
519 Documents
Internet Security
935 Documents
Intrusion Detection
602 Documents
Intrusion Prevention
668 Documents
IPSec
156 Documents
Java
62 Documents
Linux
86 Documents
Load Balancing
177 Documents
Microsoft Exchange
131 Documents
Middleware
51 Documents
Network Security
551 Documents
Network Security Appliance
364 Documents
Oracle
100 Documents
Password Management
213 Documents
PCI Compliance
239 Documents
PKI
120 Documents
Risk Management
319 Documents
Search And Retrieval
96 Documents
Secure Content Management
182 Documents
Security Management
1049 Documents
Security Policies
422 Documents
Service Oriented Architecture
285 Documents
SOAP
31 Documents
SOAP
67 Documents
Solaris
10 Documents
SSL
230 Documents
Storage Area Networks
290 Documents
TCP/IP Protocol
178 Documents
Visual Basic
29 Documents
Vulnerability Management
573 Documents
Web Development
104 Documents
Web Service Management
250 Documents
Web Service Security
382 Documents
Web Service Security
78 Documents
Web Services
134 Documents
Web Sphere
39 Documents
Wireless Security
272 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.