Internet Applications Security Reports

Presentation Transcript: Challenges of Securing a Smarter Planet
sponsored by IBM
PRESENTATION TRANSCRIPT: In this presentation transcript of the webcast “Challenges of Securing a Smarter Planet,” IBM Rational's Worldwide Security Executive, Jack Danahy, discusses the changing security landscape and offers guidance to teams looking for the right place to start, and missteps to avoid.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

IBM

Imperva’s Web Application Attack Report
sponsored by Imperva
WHITE PAPER: Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 22 Sep 2011 | Published: 01 Jul 2011

Imperva

Data Loss Prevention: Keep Sensitive Data-In-Motion Safe
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In today’s business environment, media headlines are increasingly featuring data breaches of large magnitudes that put people’s personal information at risk, and no country or industry is immune.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

WatchGuard Technologies, Inc.

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

Presentation Transcript: Protect Data and Client Trust - An End-to-End Approach to Protecting Your Client Applications and Organizations
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Protect Data and Client Trust: An End-to-End Approach to Protecting Your Client Applications and Organizations” outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

IBM

IBM Mashup Center
sponsored by IBM
TRIAL SOFTWARE: IBM Mashup Center is an enterprise mashup platform enabling the rapid creation of reusable application building blocks (widgets, feeds, mashups) that can be easily assembled into new applications or leveraged within existing applications— with the governance and security IT requires—  to address daily business challenges.
Posted: 19 Dec 2011 | Premiered: 19 Dec 2011

IBM

Sophos Security Threat Report Mid-Year 2011
sponsored by Sophos
ANALYST REPORT: Malware is complex, seemingly everywhere and is often difficult to stop. Targeting high-profile organizations, damaging data loss incidents and web threats continue to make headlines for malware attacks this year. Read the latest report to understand how the latest threats work and how to keep your business safe.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

Sophos

What secure email gateways can do for your enterprise
sponsored by TechTarget Security
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

TechTarget Security

Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process
sponsored by IBM
PRESENTATION TRANSCRIPT: In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives.
Posted: 09 Dec 2011 | Published: 09 Dec 2011

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM