RSS feed Get our RSS feed

News by Topic

security application

Results 226 - 250 of 800Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Apr 09, 2015
Fighting malware doesnít have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection.
Tags : malware protection, ibm, network security, it security, application security
     IBM
By: Alert Logic     Published Date: Jun 12, 2014
New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!
Tags : cloud security, vulnerability management, vulnerabilities, patching, patch management, security
     Alert Logic
By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: F5 Networks Inc     Published Date: Aug 16, 2016
Together, VMware and F5 enable global IT leaders to empower the Anywhere Enterprise to deliver enterprise applications across all devices and clouds built on SDDC principles. Today VMware and F5 offer the most sophisticated, end-to-end solutions for mobility, application delivery and network security to help CTOs and CIOs: - Ensure unprecedented application agility with a software-defined infrastructure and application services platform; - Automate application delivery while ensuring performance, availability, scalability, efficiency and security; - Achieve simplified end-to-end networking through an application-centric approach.
Tags : anywhere enterprise, vmware, enterprise it, application agility, software-defined infrastructure, it infrastructure, networking
     F5 Networks Inc
By: iDirect     Published Date: Oct 13, 2011
In an insightful report from iDirect, find out why satellite is the best option for delivering cost-effective, reliable, broadband connectivity to any location. Today's satellite networks are enterprise-class platforms built on IP; offering seamless integration with existing communications technology. In addition, satellite now delivers up to 99.99 percent network availability and meets new security regulations, such as AES encryption. Get the facts on satellite for the smart grid and learn how satellite services can deliver the security, latency, and reliability required for all core utility applications. Download the report.
Tags : idirect, satellite communications, technology, smart grid, utility companies
     iDirect
By: StrikeIron     Published Date: Aug 01, 2013
For internal and external applications, Web APIís provide flexibility and unlock the value of your data and software. However, ongoing API development, deployment and delivery require extensive domain knowledge in operating an enterprise-class infrastructure. Without this expertise, scalability, reliability, and security are compromised.
Tags : cloud computing, colocation and web hosting, web service security, soap web development, web services, web service security, xml, mobile computing
     StrikeIron
By: ZSL Inc.     Published Date: Sep 25, 2008
The hotspot in the current IT world is optimized Web Services. Now the enterprises have started their vision towards next generation Web Services. This white paper gives information for the business managers and engineers in developing and deploying Web Services using Rational Application Developer (RAD) and WebSphere Application Server (WAS), respectively. This paper explains the process to:* create a Web Service and Web Server client* build security to that web service* deploy the web service in WebSphere application server
Tags : zsl, soap, java, wsdl, uddi, web service security, risk exposure, security
     ZSL Inc.
By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
     Entrust Datacard
By: HP - Enterprise     Published Date: Nov 19, 2008
This webinar explores 12 of the most common security traps in Java by examining the causes of security failures in modern Java–based applications. Approaching security with an “outside in” style, we look at vulnerabilities from a developer’s perspective, focusing on the source code.
Tags : security, application security, java, vulnerabilities, developer, source code, analysis, fortify software
     HP - Enterprise
By: IBM APAC     Published Date: Sep 25, 2017
Industry convergence is collapsing the barriers between formerly distinct industries. According to ďRedefining Connections: Insights from the Global C-suite Study Ė The CIO Perspective,Ē produced by the IBM Institute for Business Value, CIOs believe this is the biggest trend transforming the business arena.
Tags : organizational security, site security, communication security, application security, database security, software licensing, installation
     IBM APAC
By: Akamai Technologies     Published Date: Dec 07, 2016
Digital Transformation in Financial Services: Progress, Priorities, and Obstacles across North America
Tags : online banking service, online banking services, online banking application, online banking applications, online banking app, online banking apps, financial services it, online banking solutions
     Akamai Technologies
By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organizationís overall vulnerability management program.
Tags : qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime
     Qualys
By: Akamai Technologies     Published Date: May 07, 2018
Learn about Akamai Cloud Security Solutions Akamaiís web application firewall and DDoS solutions include easy-to-deploy, low-maintenance solutions for enterprises.
Tags : identity, theft, revenue, technical, support, data, confidential
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 17, 2017
Why Cloud-Based Security is Crucial for Enterprise Web Applications
Tags : web application, security, cloud-based security
     Akamai Technologies
By: MobileIron     Published Date: Apr 05, 2017
Now is the time to switch from BlackBerryís new and unproven mobile device management (MDM) offering to a modern, comprehensive EMM solution like MobileIron. In todayís highly competitive and fast-paced global economy, the last thing companies need is an MDM vendor who is always playing catch up through technology acquisitions that cost too much and offer too little. MobileIron is a recognized industry leader that has always been 100% focused on mobile security. Our unified, multi-OS EMM platform was built from the ground up to meet the needs of the modern mobile enterprise by reducing IT complexity, delivering a secure user experience, and protecting mobile apps and data on any device, in any cloud service, anywhere in the world.
Tags : mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
     MobileIron
By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in EMM innovation and mobile security for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers arenít tied to proprietary technologies that donít meet their needs. Our goal is to ensure organizations can choose the best technologies that fit their environment.
Tags : cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data
     MobileIron
By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : ddos attacks, it security, application layer attacks
     Arbor
By: AWS     Published Date: Nov 07, 2018
To best support global users and customers, enterprises require seamlessly connectivity between branch office locations, applications, and workloads hosted in the cloud. Many WAN solutions are ill-equipped for this task because they are generally rigid, complex to configure, and expensive to maintain. IoT adoption, a dramatic increase of the number of network devices, and the sophistication of security threats further compounds this challenge. Geographically-distributed devices need secure cloud connectivity, limiting the ability of existing WAN solutions to fulfill the need of distributed organizations. Cisco SD-WAN on Amazon Web Services (AWS) is an overlay WAN architecture that is designed to address modern enterprise cloud applications and workloads, heterogeneous WAN connectivity, distributed global workforces, and other business needs that traditional WAN solutions cannot meet. Learn more by downloading this solution brief. Join our webinar to learn -How to migrate a data ce
Tags : 
     AWS
By: Secure Computing     Published Date: Feb 27, 2007
This industry white paper takes the mystery out of the key differences in the main classes of firewall architectures. It was independently written by Marcus J. Ranum, a world-renowned expert on security system design and implementation. It includes fundamental lessons about building application layer firewalls, technical examples, and concludes with predictions about the future of firewall technology.
Tags : security, firewalls, firewall, internet security, intrusion detection, intrusion prevention, application security, email security
     Secure Computing
By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
     ProofSpace
By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : java, network security, security breach, security flaws, network intrusion
     Rapid7
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics