Internet Applications Security White Papers

(View All Report Types)
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER: This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013

IBM

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Web Content Control: Five Steps to a Successful Implementation
sponsored by Untangle, Inc.
WHITE PAPER: Implementing Web Content Control can seem intimidating. It represents the uneasy marriage of network administration and human resource management. With a little forethought, however, it becomes straightforward and very effective. Read this whitepaper for a step-by-step overview of a successful web content control implementation.
Posted: 18 Nov 2009 | Published: 30 Oct 2009

Untangle, Inc.

NetScaler VPX: Harness the Power of Virtualized Web App Delivery
sponsored by Citrix
WHITE PAPER: This technical white paper shows you how the NetScaler VPX virtual appliance offers maximum physical, functional, and operational flexibility for delivering web apps. Learn how virtual application delivery controllers can unleash the power of a virtualized dynamic data center! Compliments of Citrix.
Posted: 08 Jun 2010 | Published: 08 Jun 2010

Citrix

Mapping Security for your Virtual Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012

Hewlett Packard Enterprise