White Papers by Topic: Application security

Resources available: 33

Web security buyers guide

Web interactivity increasingly relies on user- and third-party-generated content built on rich backend database systems, which are easily exploited. This has created a breeding ground for the distribution of malware-even among the most trusted and popular web sites and applications. This dramatic change in the nature of web threats has rendered traditional web filtering technology completely ineffective. Simply blocking access to sites that may host malware is no longer a viable solution - as that would now include each and every site on the net. Read this buyers guide to learn what to look for when evaluating web security solutions.

Evaluating Security-as-a-Service (SaaS) Solutions

The right Security-as-a-Service solution can perform reliably and effectively and deliver the flexibility and control associated with on-premise solutions - at a significantly lower cost - without compromising privacy and security.

US Government Prevents Malware with Application Whitelisting

This high profile US government agency handles extremely sensitive financial data, and as such, must maintain the highest standards for safety, integrity and security of its systems. Faced with a barrage of malware and under constant attack, this agency banks on Bit9’s award-winning application whitelisting solution to eliminate unauthorized software, keeping systems secure and significantly reducing support costs.

Application Whitelisting Puts Behavioral HIPS in the Recycle Bin

Traditional anti-virus and host intrusion prevention approaches have proven to be ineffective against advanced threats and failed to keep up with the explosion in malware. Bit9 invites you to learn why analysts recommend Application Whitelisting as the key foundational layer for endpoint security.

Protecting Against Targeted Cyber Attacks with Application Whitelisting

Download this Microsoft MVP authored whitepaper to learn how to enforce a white list of approved software to prevent targeted attacks and overcome the Advanced Persistent Threat.

Application Whitelisting Puts Behavioral HIPS in the Recycle Bin

Traditional anti-virus and host intrusion prevention approaches have proven to be ineffective against advanced threats and failed to keep up with the explosion in malware. Bit9 invites you to learn why analysts recommend Application Whitelisting as the key foundational layer for endpoint security.

Secure And Compliant Collaboration And Cccess

This white paper discusses how the need for faster access to resources can enable more effective collaboration but can also create significant security and compliance challenges. The paper then describes how IBM offers an adaptable, business-driven, holistic approach to security that addresses the different risk domains across organizations.

Network Security Overwatch Layer: Smarter Protection For the Enterprise

Read this IDC paper for background on today's threat ecosystem with an overview of network security threats, the impact of the threats on enterprises, and the operational challenges faced by IT.

Your Browser Wears No Clothes – Why Fully Patched Browsers Remain Vulnerable

This ISSA Journal article discusses the different types of attacks even when the browser is fully patched and hardened and offers guidance on ways in which organizations can revisit Web security.

Tackling the Top Five Network Access Control Challenges

In this document we explore five common networking challenges that enterprises face-network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)-and discuss how UAC can be used to address each.

©1994-2014 Infoworld, Inc.