Application Security White Papers

Application Security encompasses measures taken to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, or deployment of the application.
Results 1 - 25 of 564Sort Results By: Published Date | Title | Company Name
By: Kaseya     Published Date: May 13, 2015

To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
By: Box     Published Date: May 11, 2015

This white paper focuses on four considerations for a mature mobile strategy to reduce the risk of falling behind other key competitors.

Tags : mature mobile strategy, mobile devices, workflow, security, secure collaboration, it strategy, integration, mobility
    
By: Box     Published Date: May 11, 2015

This paper reveals the 6 essential elements of a mobile strategy.

Tags : mobility, modern mobility strategy, mobility strategy, box, mobile, mobile advantage, security, strategy for mobility
    
By: Forrester Research     Published Date: Apr 27, 2015

Download the report to learn how to prepare an Incident Response Plan that ensures your business recovers quickly and effectively.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network architecture, network management, network performance
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.

Tags : fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management
    
By: Citrix Systems     Published Date: Apr 15, 2015

This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, migration, network architecture
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, application security, mobile computing
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

IT is set to be the great enabler of the lightweight application revolution, first though they need to learn how the new paradigm of multiple operating systems across all devices requires a new more open management mindset.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, application security, mobile computing
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Volume III: Four Components of a Solid Mobile App Strategy! Successfully becoming mobile first and app enabled is a simple exercise of discovery, scalability, sustainability and security.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, application security, mobile computing
    
By: IBM     Published Date: Apr 09, 2015

This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction’s lifecycle—pre-login, during login and post-login—and offers strategies to help financial organizations combat malware-driven attacks.

Tags : ibm, it security, password security, malware prevention, security infrastructure, anti spyware, anti virus, application security
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This guide will help you understand what a disaster recovery plan is and how to effectively implement one for your business.

Tags : disaster recovery, risk reduction, disaster recovery plan, drp, how to create an effective drp, application security, security management, business management
    
By: Kaspersky     Published Date: Feb 05, 2015

This Kaspersky guide shows the benefits that only and Integrated Platform Security Solution can bring.

Tags : integrated platform security, security solution, integrated security technologies, endpoint protection platforms, epps, application security, encryption, internet security
    
By: Kaspersky     Published Date: Feb 05, 2015

This White Paper provides information on how to ensure protection from both regular malware and sophisticated targeted attacks.

Tags : cyberthreats to ics systems, protect from malware, protect from targeted attacks, ics, it security, ensure ics security, protection measures, anti spyware
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper reveals how important is effective security software for banking threats.

Tags : online and mobile banking threats, online e-payments, security of online payments, cybercriminals, protection mechanisms used by banks, access control, anti spyware, application security
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.

Tags : security, virtualization, security approaches, kaspersky, anti spam, anti spyware, anti virus, application security
    
By: Kaspersky     Published Date: Feb 05, 2015

The Security Technologies for Mobile and BYOD guide reveals the essential security technology options for protecting enterprise networks, systems and data.

Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.

Tags : benefits to enterprise it security, exploit prevention, protection from exploits, software attacks, anti spam, anti spyware, anti virus, application security
    
By: Acronis EMEA     Published Date: May 21, 2015

This Case Study reveals how companies are addressing today's Disaster Recovery challenges across physical, virtual and cloud environments.

Tags : data protection, cloud, cloud computing, disaster recovery, technologies, recovery, infrastructure, data security
    
By: Acronis EMEA     Published Date: May 19, 2015

This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.

Tags : security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance
    
By: Acronis EMEA     Published Date: May 19, 2015

The Morse Group is now comprised of a strong network of member companies with more than $150 million in annual sales that deliver services in the electrical, energy and construction markets.

Tags : mobility, acronis access solution, increase your competitiveness, mobilised workforce, improving productivity, acronis access, secure competitive, mobile device
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this case study to learn about the backup product they chose and how it gave them with a unified data and application database backup solution that simplified the procuring, learning and integrating of additional products, while saving time, lowering costs, and more.

Tags : backup, data protection, database backup application solution, data security, unified data, recovery, backup data, application security
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this case study now to find out about choosing Acronis backup solution and the benefits it came with.

Tags : acronis backup solution, backup solution, backup, recovery, protection, recovery services, benefits of acronis backup solution, remote recovery services
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this datasheet to discover the main benefits of Acronis Access Advanced.

Tags : acronis, acronis access advanced, secure mobile access, security, content security, devices, secure access, share content
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

.NET
51 Documents
Access Control
697 Documents
Anti Spam
578 Documents
Anti Spyware
621 Documents
Anti Virus
668 Documents
Application Integration
449 Documents
Application Integration
820 Documents
Application Performance Management
788 Documents
Authentication
368 Documents
Biometrics
116 Documents
Business Continuity
393 Documents
Business Integration
456 Documents
C++
40 Documents
Content Management System
309 Documents
Data Integration
402 Documents
Data Protection
847 Documents
Database Development
111 Documents
Database Development
304 Documents
Database Security
419 Documents
DDoS
191 Documents
Disaster Recovery
533 Documents
EDI
64 Documents
Email Security
583 Documents
Encryption
461 Documents
Firewalls
413 Documents
Hacker Detection
485 Documents
Identity Management
522 Documents
Internet Security
942 Documents
Intrusion Detection
607 Documents
Intrusion Prevention
674 Documents
IPSec
156 Documents
Java
62 Documents
Linux
86 Documents
Load Balancing
180 Documents
Microsoft Exchange
131 Documents
Middleware
51 Documents
Network Security
563 Documents
Network Security Appliance
365 Documents
Oracle
101 Documents
Password Management
213 Documents
PCI Compliance
240 Documents
PKI
120 Documents
Risk Management
325 Documents
Search And Retrieval
96 Documents
Secure Content Management
184 Documents
Security Management
1068 Documents
Security Policies
427 Documents
Service Oriented Architecture
285 Documents
SOAP
31 Documents
SOAP
67 Documents
Solaris
10 Documents
SSL
230 Documents
Storage Area Networks
290 Documents
TCP/IP Protocol
178 Documents
Visual Basic
29 Documents
Vulnerability Management
579 Documents
Web Development
108 Documents
Web Service Management
252 Documents
Web Service Security
78 Documents
Web Service Security
386 Documents
Web Services
134 Documents
Web Sphere
40 Documents
Wireless Security
281 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.