White Papers by Topic: Application security

Resources available: 30

How to Extend Identity Security to Your APIs

This paper discusses what these standards and specifications are, how they can be composed with existing standards like SAML, and details about how they work to provide identity and access management and API security now and into the future.

The DDoS Threat Spectrum

Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.

The Shortfall of Network Load Balancing

Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access from anywhere, at any time, on any device.

How to Keep Company Assets Secure with Federated Identity and Access Management

This Technology Spotlight discusses the growing need for security in today's cloud-based, mobile world of IT, and the rise of SaaS-based solutions.

Security, Privacy and Trust in Email Management

This white paper discusses a SaaS-based email management solution that delivers the security, continuity and archiving capabilities your organization demands.

The Total Cost of Email

In this white paper, we'll explore the true costs of fragmented email management and uncover how to reduce those costs with a cloud-based solution for email management.

Prevent Zero Day Attack with Application Whitelisting

Learn how this US Military Command Center's cyber attack exercise can get your security plan in shape. During a recent exercise, this US military command center discovered serious vulnerabilities in their existing security solutions. Despite being on high alert, personnel accidentally introduced malware that immediately broke through all their layers of defense - except one: Bit9 Parity's Application Whitelisting.

US Government Prevents Malware with Application Whitelisting

This high profile US government agency handles extremely sensitive financial data, and as such, must maintain the highest standards for safety, integrity and security of its systems. Faced with a barrage of malware and under constant attack, this agency banks on Bit9's award-winning application whitelisting solution to eliminate unauthorized software, keeping systems secure and significantly reducing support costs.

Stop the Advanced Persistent Threat

The cyber attacks targeting Google and others rang a loud wakeup call: the reactive approach of blacklisting known viruses is no match for today's advanced threats. Gartner's Neil MacDonald wrote, "Application Whitelisting at the endpoints would have stopped these attacks." Download this Microsoft MVP-authored whitepaper to learn how this proactive approach ensures only trusted software runs, rendering new malware useless.

Stop the Advanced Persistent Threat

The cyber attacks targeting Google and others rang a loud wakeup call: the reactive approach of blacklisting known viruses is no match for today's advanced threats. Gartner's Neil MacDonald wrote, "Application Whitelisting at the endpoints would have stopped these attacks." Download this Microsoft MVP-authored whitepaper to learn how this proactive approach ensures only trusted software runs, rendering new malware useless.

©1994-2014 Infoworld, Inc.