12 API security best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
Posted: 14 Feb 2023 | Published: 14 Feb 2023
|
|
|
Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER:
Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005
|
|
|
SAP Netweaver: Streamlining the Transition to Services-Based IT Security
sponsored by SAP America, Inc.
WHITE PAPER:
This paper describes how the SAP NetWeaver® platform and its components help IT organizations align with their enterprise business requirements in the area of security.
Posted: 18 Jun 2008 | Published: 01 Feb 2006
|
|
|
802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
sponsored by Juniper Networks, Inc.
WHITE PAPER:
This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.
Posted: 19 Dec 2008 | Published: 01 Mar 2007
|
|
|
Implementing a Telecommuting Program
sponsored by Avaya Inc.
WHITE PAPER:
This paper discusses several issues related to implementing a telecommuting home worker program for contact center agents. Certainly, the particular requirements of each company will dictate the extent to which these and other concepts are implemented.
Posted: 02 Jun 2008 | Published: 01 Jan 2008
|
|
|
Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER:
Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007
|
|
|
eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
sponsored by TechTarget Mobile Computing
EBOOK:
Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.
Posted: 09 Dec 2008 | Published: 09 Dec 2008
|
|
|
Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER:
This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006
|
|
|
CyberFusion Integration Suite™ (CFI): Managed File Transfer (MFT)
sponsored by Proginet Corporation
PRODUCT LITERATURE:
CyberFusion Integration Suite (CFI)™, from Proginet, is the world's most advanced managed file transfer solution.
Posted: 01 Feb 2008 | Published: 01 Jan 2008
|
|
|
Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
sponsored by VeriSign EMEA
WHITE PAPER:
A multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
Posted: 04 Dec 2008 | Published: 13 Nov 2008
|
|