Internet Application Security Reports

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

IBM Mashup Center
sponsored by IBM
TRIAL SOFTWARE: IBM Mashup Center is an enterprise mashup platform enabling the rapid creation of reusable application building blocks (widgets, feeds, mashups) that can be easily assembled into new applications or leveraged within existing applications— with the governance and security IT requires—  to address daily business challenges.
Posted: 19 Dec 2011 | Premiered: 19 Dec 2011

IBM

PCI Council issues mobile application rules for software developers
sponsored by TechTarget Security
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Presentation Transcript: Protect Data and Client Trust - An End-to-End Approach to Protecting Your Client Applications and Organizations
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Protect Data and Client Trust: An End-to-End Approach to Protecting Your Client Applications and Organizations” outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

IBM

Imperva’s Web Application Attack Report
sponsored by Imperva
WHITE PAPER: Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 22 Sep 2011 | Published: 01 Jul 2011

Imperva

Protect People, Processes, and Technology From Web Application Threats
sponsored by IBM
WHITE PAPER: This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
Posted: 05 Mar 2014 | Published: 30 Nov 2013

IBM

The Benefits of Next-Generation Virtual ADCs
sponsored by Citrix Systems, Inc.
EGUIDE: Discover why next-generation and virtual application delivery controllers (ADCs) can help you conquer many of the networking and security challenges of enterprise mobility and cloud computing.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

Citrix Systems, Inc.

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR