RSS feed Get our RSS feed

News by Topic

application software security

Results 51 - 66 of 66Sort Results By: Published Date | Title | Company Name
By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
     Group M_IBM Q418
By: IBM     Published Date: Jun 09, 2010
Secure at the Source: Save money and reduce risks by correcting software vulnerabilities early on in the development lifecycle. Download this free white paper to learn more.
Tags : vulnerabilities, secure application, ibm, source code, software development, it security
     IBM
By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis
     Cisco
By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : symantec, malware, applications, security, code signing
     Symantec Corporation
By: Quocirca     Published Date: Feb 05, 2007
This paper looks at how to get the best out of mobile productivity and how to avoid the six most common mobility pitfalls during the planning and execution of mobile implementations.
Tags : productivity, wireless, mobile workers, wireless application software, wireless communications, wireless hardware, wireless security, return on investment
     Quocirca
By: Quocirca     Published Date: Oct 29, 2008
Outsourcing is a strategy increasingly being used by organizations to reduce costs and increase value. Outsourcing, however, has its risks. As organizations look to push out more of their custom software application development needs to outsourcing partners, careful planning is required in terms of building stringent software security requirements into contracts and creating a process and metrics to ensure that those requirements are met. This report examines outsourcing practices from 200 of the largest organizations in the UK and the US and provides pointers as to how the most experienced outsourcers are putting in place effective processes to drive the risk out of outsourcing.
Tags : quocirca, outsourcing, security
     Quocirca
By: SoftLanding Systems     Published Date: Nov 18, 2006
This no-nonsense primer covers the benefits and basic principles of good testing, offers practical advice for getting the most out of your testing efforts, and pinpoints several areas where automation will help you achieve the most cost-effective results.
Tags : software testing, quality assurance, application testing, test and measurement, database development, quality assurance, scripting, software testing
     SoftLanding Systems
By: Cenzic     Published Date: Nov 21, 2006
Enterprises need to utilize software testing that can automatically review applications for security problems. This document examines the market drivers and technology associated with software security code review products and discusses how Cenzic is addressing this urgent need.
Tags : web applications, application security, web application security, security code, cenzic, security
     Cenzic
By: Provenir     Published Date: Mar 14, 2007
Mobile banking - banking on mobile devices including mobile phones, iPhones, Blackberries, and PDAs is taking off again, and financial institutions around the world are rushing to leverage the technology to gain new customers. This white paper describes the mobile banking "revolution", the state of the technology, the challenges, and the benefits.
Tags : wireless, wireless application software, wireless security, wireless phones, pda, smart phones, mobile computing, banking
     Provenir
By: CopiaTECH     Published Date: Mar 18, 2008
Words like “integrated” and “centralized” have been used to describe application software solutions for some years now, often because of marketing messaging that implies more interoperability than the given technology can actually provide to the business customer. The terms are broad enough to be almost meaningless in some instances. In the field of IT security, the sheer range of tools and techniques in the hacker or virus writer’s armory that one must guard against has driven up the number of solutions required to prevent attacks.
Tags : copiatech, security
     CopiaTECH
By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers
     HP - Enterprise
By: HP - Enterprise     Published Date: Nov 19, 2008
Matt Rose, Senior Software Security Consultant at Fortify Software, shares his findings from a year analyzing millions of lines of code. He unveils his top ten most common vulnerabilities and provides detailed examples of each. These technical examples come from his experience working with fortune 500 companies, government agencies, and major ISVs.
Tags : security, application security, java, vulnerabilities, developer, source code, analysis, fortify software
     HP - Enterprise
By: HP - Enterprise     Published Date: Jun 04, 2013
Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and “bring-your-own” smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps for multiscreen devices; facilitating design, testing, security, performance, management, and compliance to reach new customers and employee expectations.
Tags : mobile apps, lifecycle approach, mobility services, bring-your-own-device, software
     HP - Enterprise
By: BlackBerry     Published Date: Oct 03, 2012
Learn about tools and applications available that make the development platform BlackBerry® WebWorks SDK, the perfect fit for work, home and life.
Tags : tablet, tablet applications, software development, sdk, enterprise management, mobile security
     BlackBerry
By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : veracode, security, devops, application security
     Veracode
By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : veracode, security, supply chain security, web applications, application security
     Veracode
Start   Previous    1 2 3     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics