How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER:
Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020
|
|
|
10 Steps to Mobile Security
sponsored by Sybase iAnywhere
WHITE PAPER:
Security is the top priority on everyone's minds, especially with the growth of mobile devices on the rise. This paper details the 10 critical steps to ensure a successful mobile security strategy.
Posted: 02 Jan 2007 | Published: 01 Nov 2006
|
|
|
Top 5 IT Considerations for Secure Wireless Email
sponsored by Sybase iAnywhere
WHITE PAPER:
The use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.
Posted: 06 Jun 2007 | Published: 01 Jan 2006
|
|
|
Building a Secure and Compliant Windows Desktop
sponsored by BeyondTrust Corporation
WHITE PAPER:
Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights.
Posted: 16 Nov 2007 | Published: 01 Nov 2007
|
|
|
Developers and Identity Services - Tackling Identity Data with Identity Hub
sponsored by Oracle Corporation
WHITE PAPER:
This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.
Posted: 13 Feb 2009 | Published: 13 Feb 2009
|
|
|
Developing an Effective Corporate Mobile Policy
sponsored by BlackBerry
WHITE PAPER:
By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing.
Posted: 19 Jun 2008 | Published: 01 Jun 2008
|
|
|
Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER:
With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008
|
|
|
Success with Static Analysis for Security: Why Code Audits Fail
sponsored by Parasoft Corporation
WHITE PAPER:
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity.
Posted: 01 Apr 2009 | Published: 01 Apr 2009
|
|
|
Protecting SharePoint Data Long Term
sponsored by Varonis
WHITE PAPER:
This paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
Small Business Security: What You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Small business security is dependant upon defending against common threats, such as viruses, spyware, malware and hackers.
Posted: 02 Feb 2009 | Published: 02 Feb 2009
|
|