app security

Results 1 - 25 of 1680Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Feb 03, 2020
Mobile devices and cloud-based applications that empower teams to work anywhere have been a boon for business productivity, agility, and innovation. However, this new way of working presents a new challenge for cybersecurity teams: securing mobile devices accessing cloud applications that store sensitive data outside the control of on-premises security solutions.
Tags : 
    
Forcepoint
Published By: Hewlett Packard Enterprise     Published Date: May 01, 2020
CRAFTING A COMPREHENSIVE APPROACH TO CYBERSECURITY
Tags : 
    
Hewlett Packard Enterprise
Published By: Citrix     Published Date: Mar 26, 2020
There's a lot to think about when it comes to securing your sensitive data — like controlling access and meeting compliance. It can be overwhelming for small and medium-sized businesses. But we can help you boost your knowledge and simplify your approach to protecting important data so you can stay a step ahead in the security game. Download this e-book, and get your step-by-step guide to managing risk across: • Physical vulnerabilities • Unsecured networks • Mobile devices
Tags : 
    
Citrix
Published By: Lenovo - APAC     Published Date: May 22, 2020
Using cloud is the norm for businesses today, and expectations are high for these investments to create real business results. This sentiment is clear in TBR’s recent cloud adoption research: 83% of respondents indicated their organization is investing in IT for innovation. These expectations have led to the emergence of hybrid cloud environments, with organizations investing in various public and hosted cloud options, as well as building their own private clouds. While hybrid cloud adoption is increasing as organizations aim to enhance the value of their existing deployments, hybrid cloud also creates complexities for IT leaders. The road to cloud adoption is paved, but the path to ROI isn’t always as clear. With only 19% of respondents indicating their organization has a mature cloud strategy, there is work to be done to establish a winning approach that gives organizations the flexibility, agility, security, control, and cost savings they expect.
Tags : 
    
Lenovo - APAC
Published By: F5 Networks Singapore Pte Ltd     Published Date: Mar 04, 2020
Application security is hard. We see headlines about data breaches almost daily. According to F5 Labs, web application attacks are the #1 single source entry point of successful data breaches. Additionally, the fallout from application attacks come with high costs. Insecure software makes web applications so precarious. Always-on, always-connected apps can help power and transform your business–but they can also act as gateways to the data beyond the protections of your firewalls. With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. Read this eBook to review the OWASP Top 10 Injection attacks and how to protect your enterprise.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Dell EMC EMEA     Published Date: May 26, 2020
The end user computing industry has reached an important time in its history. For the first time, modern PC management, mobility, Zero Trust security, and virtualization are coalescing to deliver the world’s first digital workspace solutions. The world of any app, any device, and any location is finally here. Enterprises understand that this new digital capability will bring enormous benefits, including enhanced productivity, simplified management, reduced costs, and enhanced security. Today, most IT decision makers are now planning to radically transform their end user computing environments with digital workspaces in the upcoming years. Despite the enthusiasm, however, the question remains: how should companies go about adopting a modern, secure digital workspace to maximize the value from their investments?
Tags : 
    
Dell EMC EMEA
Published By: CheckMarx     Published Date: May 11, 2020
http://mediaadvanceb2b.com/LandingPage/gartner/2.html
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: May 11, 2020
http://mediaadvanceb2b.com/LandingPage/gartner/1.html
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: May 11, 2020
http://mediaadvanceb2b.com/LandingPage/gartner/3.html
Tags : 
    
CheckMarx
Published By: F5 Networks Singapore Pte Ltd     Published Date: Apr 20, 2020
"Most organizations prioritize cloud flexibility—and let application teams choose the best environment for each application—over the organizational benefits of common environments, processes, and tools. This leads to 87% of organizations supporting multiple clouds, selecting best-of-breed capabilities from each platform. 1 As applications proliferate, it becomes more challenging to implement consistent cross-cloud application performance policies, security, and regulatory compliance leaving organizations with concerns about long-term operability. The key for IT is to strike the right balance between freedom and flexibility for application development teams, while enabling the easy and consistent inheritance of corporate security, compliance, performance, and operability requirements. Download this guide to learn how you can deploy consistent applications in a Multi-Cloud Environment."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 18, 2020
A Fortune 500 retailer, manages a gift card program with a stored value of over $5B. Cybercriminals targeted the program, stealing tens of millions of dollars from the company and its customers. Attackers used credentials spilled from other website breaches to hijack customer accounts and steal funds from gift cards. Traditional defenses, like web application firewalls, intrusion detection and prevention services, and fraud analytics, failed to prevent these ongoing automated attacks. Find out how Shape Security helped to eliminate $10s of millions in fraudulent transactions and chargeback fees.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed breach world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: CheckMarx     Published Date: May 11, 2020
This Critical Capabilities guide provides application security testing (AST) tool buyers with vendor rankings for five common use cases, based on relevant evaluation criteria. Buyers can view vendor rankings for each use case to help formulate lists of vendors that, based on Gartner assessments, are well-suited based on product capabilities to address a given use case. Using the online interactive tool, buyers can also formulate custom use cases, and corresponding vendor rankings, where predefined use cases do not offer an appropriate match to an organization’s specific requirements. Using scoring for specific capabilities, buyers can also identify vendors with a product offering that is well-suited for a specific function, such as analysis of mobile applications or APIs.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: May 11, 2020
To be replaced with German-language summary once obtained: Download the May 2020 report to learn: Why Gartner placed Checkmarx in the Leaders’ quadrant Where Checkmarx placed among application security competitors and why Whether your organization has the right solutions in place to reduce software risk The Checkmarx Software Security Platform is used by more than 40% of Fortune 100 companies, and by government organizations around the globe.
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'20     Published Date: Mar 18, 2020
IBM Food Trust™ is the first blockchain food safety solution that allows transaction partners to confidently and securely share food information, creating a more transparent and trustworthy global food supply chain.  With the IBM Food Trust Solution Brief you can:  Understand how we apply blockchain technology to meet the demands for a safer and more efficient food ecosystem  Receive an overview on the fundamentals of our collaborative tool created to trace food during each step of the food supply Learn about the IBM Food Trust network of authorized participants, including suppliers, distributors, retailers, and consumers Explore the solution interface, including how various modules employ user and product data and security
Tags : 
    
Group M_IBM Q2'20
Published By: Group M_IBM Q2'20     Published Date: Mar 20, 2020
As security monitoring and analytics initiatives mature, a platform approach reduces the time to identify, investigate, and respond to security-related incidents — and drives a significant reduction in risk. Learn more about the success of a secure, compliant, and well-managed infrastructure.
Tags : 
    
Group M_IBM Q2'20
Published By: HashiCorp Q1-20     Published Date: Jan 17, 2020
To unlock the fastest path to value in the cloud, enterprises must consider how to industrialize the application delivery process across each layer of the cloud: embracing the cloud operating model, and tuning people, process, and tools to it. In this white paper, we look at the implications of the cloud operating model, and present solutions for IT teams to adopt this model across infrastructure, security, networking, and application delivery.
Tags : 
    
HashiCorp Q1-20
Published By: Dell EMC     Published Date: Apr 29, 2020
Many companies have treated migration to the cloud as a mandate and not a strategic resource to complement business and application requirements. A result of this has been the proliferation of multiple clouds, which can create challenges ranging from unpredictable costs to security vulnerabilities. Download this infographic from Dell Technologies and Intel® to learn how Dell Technologies Cloud solves for this, enabling you to establish a strategic hybrid cloud strategy that aligns IT resources with your business and application needs.
Tags : 
    
Dell EMC
Published By: Cisco Umbrella EMEA     Published Date: Jun 01, 2020
Concerned about the risks that hidden cyber threats present to your organization right now? Cisco Umbrella exposes the full extent of shadow IT with App Discovery and blocking. Gain visibility of cloud services in use and block risky apps to improve network security with three easy steps. Learn more by downloading the 3 Steps to Managing Shadow IT eBook.
Tags : 
    
Cisco Umbrella EMEA
Published By: CloudPassage     Published Date: May 19, 2020
As enterprises increase their use of the cloud to host business applications as part of their digital transformation, security and development teams must transform how they work together. Cloud development moves development from a centralized department developing applications for a private data center managed by a centralized operations team, to distributed teams responsible for both the development and operations of their applications known as DevOps. This can create a gap between security and DevOps. In this on-demand webinar, cybersecurity experts Carson Sweet, CloudPassage CEO and co-founder, and Holger Schulze, Cybersecurity Insiders CEO and co-founder, explore this transition and how both security and DevOps teams can best work together in this new world. Topics include: • The new organization structure security must work in • The new rapid development, continuous integration and continuous delivery model for DevOps • The diverse set of technologies DevOps are deploying in the
Tags : 
    
CloudPassage
Published By: CloudPassage     Published Date: May 19, 2020
Enterprises large and small are migrating existing applications to the cloud and developing new applications on cloud-native infrastructure. Datacenter security practices don’t translate to cloud environments due to technical and operational changes that disrupt existing security and compliance approaches. As organizations transition to distributed DevOps models, application development velocity increases dramatically. Continuous delivery and software-defined infrastructure result in additions and changes to critical assets on-demand at any time. This webinar is for security engineers, DevOps engineers, cloud architects, and security executives. Your take-aways from this webinar will be the six “must-haves” for achieving real-world, practical cloud security. You will leave the webinar with a working understanding of: • How moving to the cloud changes development and security practices • How the concept of “practical cloud security” cuts through the noise and hype • What to expect an
Tags : 
    
CloudPassage
Published By: Adobe     Published Date: Apr 23, 2020
With Adobe Sign, Microsoft’s preferred e-signature solution, you can send documents for e-signature and track the signing process at every step — right from within SharePoint. With the new Adobe Sign webforms integration, you can map data collected from completed web forms back into SharePoint and easily share across teams. Watch this on-demand event to learn more about this new capability and how you can leverage the Adobe Sign for SharePoint integration to increase productivity and collaboration in your organization. During this on-demand webinar, we will show you how to: • Add powerful e-signature capabilities to any document without leaving SharePoint • Track the status of any document sent for e-signature knowing who has signed and who needs to sign next • Accelerate digital enrollment and approvals with reusable digital web forms that automatically save data and documents in SharePoint folders and lists • Minimize risks by maintaining high levels of security and compliance
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 28, 2020
With Adobe Sign, Microsoft’s preferred e-signature solution, you can send documents for e-signature and track the signing process at every step — right from within SharePoint. With the new Adobe Sign webforms integration, you can map data collected from completed web forms back into SharePoint and easily share across teams. Watch this on-demand event to learn more about this new capability and how you can leverage the Adobe Sign for SharePoint integration to increase productivity and collaboration in your organization. During this on-demand webinar, we will show you how to: Add powerful e-signature capabilities to any document without leaving SharePoint Track the status of any document sent for e-signature knowing who has signed and who needs to sign next Accelerate digital enrollment and approvals with reusable digital web forms that automatically save data and documents in SharePoint folders and lists Minimize risks by maintaining high levels of security and compliance
Tags : 
    
Adobe
Published By: Adobe     Published Date: May 07, 2020
With less deals closing in person, companies are focusing on enabling their teams to electronically send contracts, agreements, and other time-sensitive documents for signatures anytime, anywhere. Adobe Sign works seamlessly inside Microsoft Dynamics CRM, making it easy to get documents signed quickly right from mobile devices. Watch this on-demand event to find out how to simplify approval processes and speed time to revenue with the security and compliance you expect from Adobe. This webinar will show you how you can: Navigate the Adobe Sign Dashboard within Dynamics CRM Create contracts ready for signatures from within Dynamics CRM Send documents from Dynamics CRM’s Opportunity View Use real-time tracking and contract status from within any Microsoft 365 apps
Tags : 
    
Adobe
Published By: Digital Realty     Published Date: Mar 26, 2020
Nearly 80% of organizations are introducing digital transformation faster than their ability to secure them against cyber attacks. It's critical that physical and cyber security be approached in a unified manner since they have become increasingly convergent in recent years. Download this white paper to learn how you can enable successful digital transformation without compromising your data's security by integrating physical and cyber security into one comprehensive strategy.
Tags : 
    
Digital Realty
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.