White Papers by Company: HP

Resources available: 35

2013 Cyber Risk Report

The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape.

Top 10 Reasons to Consider Blades

Why should you consider blades for your next wave of virtualization initiatives? Here are the 10 top reasons.

Mainstay ROI - Does Application Security Pay?

Does Application Security Pay? Actually, it does! Mainstay reviewed the Software Security Assurance solutions of 17 organizations and found financial benefits as high as $2.4M from efficiency and productivity improvements.

SANS - Survey on Application Security Programs

How do your peers secure their mobile apps? The SANS Institute surveyed 488 respondents on the state of their application security programs and practices. Download this report to learn more.

SANS - Securing Web Applications Made Simple and Scalable

Check out this whitepaper to learn how automated security testing can provide a simple and scalable way to protect your web applications.

Know the Big Three

How do you protect your mobile applications? Check out this whitepaper on three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.

Designing a defense for mobile apps

Mobile apps may be a threat, but they don't have to be. Download this whitepaper to review the various considerations for defending mobile applications.

Infographic: HP Global 2000 Mobile Risk Report

Download this info-graphic for an overview of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.

HP Global 2000 Mobile Risk Report

Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.

Why You Need a Next-Generation Firewall

This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.

©1994-2014 Infoworld, Inc.