Web Service Security White Papers

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 1 - 25 of 45Sort Results By: Published Date | Title | Company Name
By: Webroot Inc     Published Date: Mar 05, 2014

Learn the top 5 malware trends for 2014 and how your organization can best protect against hackers and cyber thieves.

Tags : malware, security, cyber thieves, malware trends, security systems, webroot, networking, wireless
    
By: Qualys     Published Date: Nov 05, 2013

Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-used applications, which has drawn the attention of cyber criminals – making it a potential Achilles heel for security.

Tags : qualys, qualys browsercheck, security, web security, application security, web browser, cyber criminals, vulnerability
    
By: ProfitBricks     Published Date: Jan 01, 2013

Performance testing and benchmarking of cloud computing platforms is a complex task, compounded by the differences between providers and the use cases of cloud computing users. IaaS services are utilized by a large variety of industries and, performance metrics cannot be understood by simply representing cloud performance with a single value. When selecting a cloud computing provider, IT professionals consider many factors: compatibility, performance, cost, security and more. Performance is a key factor that drives many others including cost. In many cases, 3 primary bottlenecks affect server performance: central processing unit (CPU) performance, disk performance, and internal network performance.

Tags : cloud computing, iaas, profitbricks, amazon ec2, rackspace cloud, central processing unit, disk performance, internal network performance
    
By: Symantec     Published Date: Sep 19, 2012

Symantec vulnerability assessments help to reduce the cost and complexity of vulnerability management with automated scans, actionable reports, and a cloud-based architecture that requires no software installation or maintenance.

Tags : hackers, information technology, symantec, verisign, web applications, security, network security, web service security
    
By: Symantec     Published Date: Sep 19, 2012

This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.

Tags : applications, information technology, symantec, verisign, web security, security, network security, web service security
    
By: Symantec     Published Date: Sep 19, 2012

The solutions to problems of computing security are varied and must be explored individually, but one technology shows up often: TLS or Transport Layer Security, often known by the name of the predecessor technology, SSL or Secure Sockets Layer.

Tags : business computing, information technology, symantec, verisign, web security, security, network security, web service security
    
By: Symantec     Published Date: Sep 19, 2012

This guide discusses the combined risk of data loss and customer trust, planning, deploying and maintaining SSL certificates and how SSL certificates can protect your business.

Tags : information security, information technology, web applications, security, web service security
    
By: CollabNet     Published Date: Dec 20, 2011

Why the Cloud Is Advantageous for Agile, and for Accelerating its Enterprise-wide Adoption

Tags : cloud, development, alm, agile, software development, collaboration, dev team, production
    
By: Aberdeen - youSENDit     Published Date: Sep 14, 2011

This white paper discusses the drivers for migrating to Exchange 2010 and why decision makers should consider adopting cloud-based MST/AM during the planning phase of the overall migration.

Tags : yousendit, exchange, cloud-based, cloud computing, web services, sending files, clustering, web service security
    
By: Aberdeen - youSENDit     Published Date: Sep 14, 2011

Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.

Tags : yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage
    
By: Aberdeen - youSENDit     Published Date: Sep 14, 2011

YouSendIt is a Web-based secure digital file delivery company, which lets users securely send, receive and track files on demand. It is an alternative to sending large e-mail attachments, using FTP, and sending CDs or DVDs or tape or USB flash drive via Sneakernet. The sender can enter the recipients' e-mail addresses, attach the file and send it; the recipients receive an e-mail notification with a URL that lets them download the file.

Tags : yousendit, dortch, large content, file sending, marketing, technology, data management, email security
    
By: Globalsign Inc.     Published Date: Apr 01, 2011

This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.

Tags : globalsign, hackalert, blacklisting, malware, drive by downloads, malware distribution, hacked websites, malware injection
    
By: M86 Security     Published Date: Feb 08, 2011

This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.

Tags : m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm
    
By: Coverity, Inc.     Published Date: Nov 01, 2010

This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.

Tags : coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety
    
By: Coverity, Inc.     Published Date: Aug 16, 2010

voke Names Coverity as a Transformational Company in the Testing Market Coverity has been rated as a Transformational company in the voke, inc. Market Mover Array Report for Testing Platforms. Coverity's rating is recognition of the impact that Coverity's software integrity strategy is making in shaping the future of the testing market.

Tags : coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety
    
By: IBM Software     Published Date: Aug 04, 2010

Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.

Tags : ibm ouncelab, secure web application, software development lifecycle, security integration, risk management, testing, application security, security management
    
By: IBM Software     Published Date: Aug 04, 2010

Learn how to you ensure that security standards are met as part of your quality measures.

Tags : ibm ouncelab, podcast, security software, secure software delivery, security, application security, internet security, security management
    
By: Coverity, Inc.     Published Date: Feb 26, 2010

Find out how Coverity has helped Frequentis ensure a high level of software integrity to support its product mission of freedom from failure, while continually improving the productivity of its developers.

Tags : coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety
    
By: Mimecast     Published Date: Mar 31, 2009

The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, idc
    
By: HP - Enterprise     Published Date: Oct 16, 2008

If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.

Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
By: MessageLabs     Published Date: Sep 17, 2008

Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.

Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs
    
By: thawte     Published Date: Aug 27, 2008

This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.

Tags : ssl, thawte, certified, certification, secure socket, encryption, web development, web service security
    
By: IBM     Published Date: Oct 10, 2013

The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.

Tags : cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability
    
By: Qualys     Published Date: Apr 05, 2011

This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.

Tags : it security, vulnerability management, risk management, qualysguard, risk optimization, countermeasure, threat, value
    
Previous   1 2    Next