Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 1 - 25 of 54Sort Results By: Published Date | Title | Company Name
By: Workday     Published Date: Aug 27, 2014

This paper provides a clear insight into the real SaaS manifesto

Tags : saas manifesto, in the cloud, saas security, saas definition, networking, knowledge management, enterprise applications, storage
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, web service security, mobile computing
    
By: Cisco     Published Date: Aug 18, 2014

The latest Gartner Magic Quadrant Reports are available, covering Secure Web Gateway (SWG) and Secure Email Gateway vendors. Published in May and July 2013, you’ll get insights on the current state of security threats and solutions. Find out why Gartner says, “The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention, capability encryption, and better protection from targeted phishing attacks.

Tags : email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
By: Cisco     Published Date: Aug 18, 2014

Cisco offers an approach to network security that protects against new and emerging threats while enhancing network visibility and control. Cisco’s proven email and web security products protect 50 percent of Fortune 1000 companies, more than 20 percent of the world's largest enterprises, and eight of the 10 largest Internet service providers.

Tags : email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
By: Cisco     Published Date: Aug 18, 2014

You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the revival of distributed denial-of-service (DDoS) attacks.

Tags : security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network
    
By: Cisco     Published Date: Aug 18, 2014

Optimize benefits from your Cisco ASA 5500-X Series Next-Generation Firewall, and better secure your network from malicious activity, with a proven firewall and IPS design guide. Use this guide for faster, more reliable, and more predictable deployment.

Tags : security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network
    
By: Symantec     Published Date: Jul 30, 2014

This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.

Tags : vulnerability assessment, website security, protecting against vulnerabilities, web service security, vulnerability management
    
By: Webroot Inc     Published Date: Mar 05, 2014

Learn the top 5 malware trends for 2014 and how your organization can best protect against hackers and cyber thieves.

Tags : malware, security, cyber thieves, malware trends, security systems, webroot, networking, wireless
    
By: Symantec     Published Date: Jan 15, 2014

This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.

Tags : symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection
    
By: Qualys     Published Date: Nov 05, 2013

Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-used applications, which has drawn the attention of cyber criminals – making it a potential Achilles heel for security.

Tags : qualys, qualys browsercheck, security, web security, application security, web browser, cyber criminals, vulnerability
    
By: ProfitBricks     Published Date: Jan 01, 2013

Performance testing and benchmarking of cloud computing platforms is a complex task, compounded by the differences between providers and the use cases of cloud computing users. IaaS services are utilized by a large variety of industries and, performance metrics cannot be understood by simply representing cloud performance with a single value. When selecting a cloud computing provider, IT professionals consider many factors: compatibility, performance, cost, security and more. Performance is a key factor that drives many others including cost. In many cases, 3 primary bottlenecks affect server performance: central processing unit (CPU) performance, disk performance, and internal network performance.

Tags : cloud computing, iaas, profitbricks, amazon ec2, rackspace cloud, central processing unit, disk performance, internal network performance
    
By: Symantec     Published Date: Sep 19, 2012

Symantec vulnerability assessments help to reduce the cost and complexity of vulnerability management with automated scans, actionable reports, and a cloud-based architecture that requires no software installation or maintenance.

Tags : hackers, information technology, symantec, verisign, web applications, security, network security, web service security
    
By: Symantec     Published Date: Sep 19, 2012

This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.

Tags : applications, information technology, symantec, verisign, web security, security, network security, web service security
    
By: Symantec     Published Date: Sep 19, 2012

The solutions to problems of computing security are varied and must be explored individually, but one technology shows up often: TLS or Transport Layer Security, often known by the name of the predecessor technology, SSL or Secure Sockets Layer.

Tags : business computing, information technology, symantec, verisign, web security, security, network security, web service security
    
By: Symantec     Published Date: Sep 19, 2012

This guide discusses the combined risk of data loss and customer trust, planning, deploying and maintaining SSL certificates and how SSL certificates can protect your business.

Tags : information security, information technology, web applications, security, web service security
    
By: CollabNet     Published Date: Dec 20, 2011

Why the Cloud Is Advantageous for Agile, and for Accelerating its Enterprise-wide Adoption

Tags : cloud, development, alm, agile, software development, collaboration, dev team, production
    
By: Aberdeen - youSENDit     Published Date: Sep 14, 2011

This white paper discusses the drivers for migrating to Exchange 2010 and why decision makers should consider adopting cloud-based MST/AM during the planning phase of the overall migration.

Tags : yousendit, exchange, cloud-based, cloud computing, web services, sending files, clustering, web service security
    
By: Aberdeen - youSENDit     Published Date: Sep 14, 2011

Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.

Tags : yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage
    
By: Aberdeen - youSENDit     Published Date: Sep 14, 2011

YouSendIt is a Web-based secure digital file delivery company, which lets users securely send, receive and track files on demand. It is an alternative to sending large e-mail attachments, using FTP, and sending CDs or DVDs or tape or USB flash drive via Sneakernet. The sender can enter the recipients' e-mail addresses, attach the file and send it; the recipients receive an e-mail notification with a URL that lets them download the file.

Tags : yousendit, dortch, large content, file sending, marketing, technology, data management, email security
    
By: Globalsign Inc.     Published Date: Apr 01, 2011

This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.

Tags : globalsign, hackalert, blacklisting, malware, drive by downloads, malware distribution, hacked websites, malware injection
    
By: M86 Security     Published Date: Feb 08, 2011

This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.

Tags : m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm
    
By: Coverity, Inc.     Published Date: Nov 01, 2010

This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.

Tags : coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety
    
By: Coverity, Inc.     Published Date: Aug 16, 2010

voke Names Coverity as a Transformational Company in the Testing Market Coverity has been rated as a Transformational company in the voke, inc. Market Mover Array Report for Testing Platforms. Coverity's rating is recognition of the impact that Coverity's software integrity strategy is making in shaping the future of the testing market.

Tags : coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety
    
By: IBM Software     Published Date: Aug 04, 2010

Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.

Tags : ibm ouncelab, secure web application, software development lifecycle, security integration, risk management, testing, application security, security management
    
Start   Previous   1 2 3    Next    End