Search Site
Login
/
Register
Menu ↓
Home
Terms
Accessibility
Privacy
News
The Raven's Daily Blog
Editor's Comment
Comment
Last Word
Interviews
Featured Articles
Public Sector Focus
Workforce, Pensions and Training
Audit, Inspection and Safety
National and Devolved Politics
Energy Efficiency and Sustainability
Innovation and Efficiency
Service Transformation
Economy and Infrastructure
Planning and Housing
Poverty and Inequality
Public Sector Property
Waste Management
Welfare
Education
Crime Reduction
IT Systems and Data Protection
Inbox
pse tv
publicsectorpagesukcom
digital edition
Current Issue
Issues Archive
2014 Issues Archive
events
Editorial Board
ask the board
jobs
subscribe
Subscribe to PSE magazine
Email Alert Signup
Register
Newsletter Signup
advertise
Green Credentials
Testimonials
Request a media pack
web application scanner
Results 1 - 2 of 2
Sort Results By:
Published Date
|
Title
|
Company Name
The Right Tool for the Right Job
Published By:
Ounce Labs, an IBM Company
Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags :
owasp
,
ounce wagner
,
csrf
,
xss
,
cross-site scripting
,
sql
,
security management strategy
,
source code analysis
,
web application firewalls
,
web application scanner
Vulnerability Management Buyer's Checklist - Key Questions to Ask Before You Select a VM Solution
Published By:
Qualys
Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags :
qualys
,
vm solution
,
vulnerability management
,
saas
,
database security
,
network patching
,
vulnerability patching
,
networking
,
security
,
https
,
web application security
,
web application scanning
,
web application testing
,
web app
,
web application threats
,
web application risks
,
network scanning
,
network scan
,
network auditing
,
scanning
Search
Add Research
Get your company's research in the hands of targeted business professionals.