securing applications

Results 26 - 50 of 58Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Todays enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the worlds largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security, networking, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Todays enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
identity guard, enterprise, securing identities, corporate network, mobile platforms, security
    
Entrust Datacard
Published By: Infosys     Published Date: Jun 12, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: F5 Networks Inc     Published Date: Feb 18, 2015
In this article, F5's Karl Triebes and VMware's Kit Colbert share their perspectives on where the market is headed, and how IT organizations can stay ahead of the curve when it comes to securing apps in a mobility-focused world.
Tags : 
application security, mobility-focused world, application solutions, it management, knowledge management, enterprise applications, business intelligence
    
F5 Networks Inc
Published By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : 
ibm ouncelab, secure web application, software development lifecycle, security integration, risk management, testing, application security, security management
    
IBM Software
Published By: Enterprise Mobile     Published Date: Jul 14, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. Its time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile
Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture, it management
    
Box
Published By: Enterprise Mobile     Published Date: Dec 11, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. Its time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, its critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security, networking, it management
    
CDW-Trend Micro
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service providers security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: Symantec.cloud     Published Date: Oct 11, 2012
The emergence of mobile applications has fundamentally changed the way that millions of people around the world work, play, and communicate. Meanwhile, cybercriminals want to infect and exploit as many mobile devices as they can to steal information.
Tags : 
symantec, phishing, malware, security, internet security, mobile security, mobile
    
Symantec.cloud
Published By: Trend Micro, Inc.     Published Date: Nov 25, 2009
The increasing adoption of electronic health records greatly complicates the tasks of security and privacy requirements. In this webcast, *Trend Micro* and *Beth Israel Deaconess Medical Center* discuss how to successfully navigate through the challenges associated with securing Web-based applications.
Tags : 
trend, trend micro, webcast, security, hitrust, web, privacy, ehrs
    
Trend Micro, Inc.
Published By: Five9     Published Date: Apr 29, 2013
Far from being a reason to dismiss a cloud alternative,the increasing complexity of securing both company and customer data is a great reason to consider shifting applications to the cloud.
Tags : 
five9, cloud, cloud computing, cloud security, cloud alternative, data, securities and exchange commission, customer data
    
Five9
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
A new survey commissioned by Palo Alto Networks and conducted by Enterprise Strategy Group explores why enterprise IT leaders are embracing CASB products, where they are using them, and what capabilities are most important to them. One of the most critical needs is securing the use of SaaS applications. Heres what you need to know.
Tags : 
    
Palo Alto Networks
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal governments National Science and Technology Council Committee on Technology (NSTCC), AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures. Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still dont understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
BlackBerry Cylance
Published By: SPAN Systems     Published Date: Aug 30, 2013
2013 was a challenging year for major companies fighting high-profile security breaches. Apple, Twitter, Facebook, Microsoft, Tumblr, Burger King, Jeep, Evernote and The New York Times are just a few of the big-name organizations that had to combat security problems.
Tags : 
securing applications, compliance, security, applications, security, firewall, compliance issues, loopeholes
    
SPAN Systems
Published By: IBM     Published Date: Feb 11, 2015
Strengthen application protectionfrom design to deploymentto proactively address cloud security risks.
Tags : 
cloud environment, web application, cloud-based security, ibm, ibm security, security, it management, business intelligence
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environmentswhich often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levelshave created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data, security, dbms, data management
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse teenagers looking to win a game of Pokmon Go with moms work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion dont always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, mobile, mobile security, devices, platform to device, networking, enterprise applications, mobile computing
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse teenagers looking to win a game of Pokmon Go with moms work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion dont always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Jun 09, 2010
Learn how to implement a robust process for integrating security and risk management throughout the web application software development lifecycle with this free IBM white paper.
Tags : 
software delivery, data security, ibm, data protection, it security, web applications, application security, internet security
    
IBM
Published By: F5     Published Date: Jan 31, 2013
Cloud computing is becoming a key IT resource, but securing applications and data in the cloud remains a concern. Secure remote access tech, web application firewalls, network-side scripting and other strategies can make cloud deployments secure.
Tags : 
securing cloud, cloud computing, security, cloud security, authenticaion, authorization, it management, data management
    
F5
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis
    
Cisco
Published By: IBM     Published Date: Apr 09, 2015
How can you get actionable insight from user feedback to develop mobile apps that engage users and deliver what matters to them? The answer lies in cloud-based services that enable rapid collection and analysis of user feedback combined with automation enabling faster response.
Tags : 
application integration, mobile apps, coding, cloud-based services, cloud computing, automation, user feedback, mobile computing
    
IBM
Published By: IBM     Published Date: Nov 19, 2014
As the use of mobile devices exponentially expands, so too does security threats to the increasing number of mobile applications that companies rely on. As a result, companies struggle to keep pace with mobile application security and face the risk of embarrassing and costly data breaches. In this technical session, youll learn how Worklight Application Scanning helps you deliver applications that arent susceptible to the most common types of malware, including SQL Injection and Cross-Site Scripting. In addition, youll learn how this powerful tool helps address the OWASP Top 10 Mobile Risks for 2014.
Tags : 
application screening, user feedback, mobile app development, cloud-based services, it management, knowledge management, enterprise applications, data management
    
IBM
Start   Previous    1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.