White Papers by Topic: Applications

Resources available: 378

SANS - Securing Web Applications Made Simple and Scalable

Check out this whitepaper to learn how automated security testing can provide a simple and scalable way to protect your web applications.

Designing a defense for mobile apps

Mobile apps may be a threat, but they don't have to be. Download this whitepaper to review the various considerations for defending mobile applications.

Infographic: HP Global 2000 Mobile Risk Report

Download this info-graphic for an overview of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.

HP Global 2000 Mobile Risk Report

Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.

Benchmark Report: Mobile App Performance

This report uses data from Crittercism customers actively optimizing their app performance. App performance across un-optimized applications is expected to be worse.

Protecting Digitalized Assets in Healthcare

Healthcare providers face an urgent, internal battle every day: security and compliance versus productivity and service. For most healthcare organizations, the fight is an easy one: Providing quick, high-quality care wins every single time.

Is a SaaS Deployment Right for You?

Find out the answer and as well as the other deployment options.

Discover How Mail Express Solves 2 of Your Biggest IT Headaches

Email. It can be the source of some of IT's biggest headaches. As it eats up storage and bandwidth, it also opens up holes in your IT security plan. But there is good news. Mail Express can easily solve your most troublesome headaches.

File Security Evolution: From 5 Years Ago to Today (with a Hint at Tomorrow)

This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security.

Data on the Move = Business on the Move; How Strategic Secure Managed File Transfer Adds Value and Drives Business

This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small text documents to multi-gigabyte video files.

©1994-2014 Infoworld, Inc.