Web-based Application Security White Papers

(View All Report Types)
The Right Tool for the Right Job: An Application Security Tools Report Card
sponsored by IBM
WHITE PAPER: This white paper examines the most common tools found in the enterprise application security environment.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM

Technology Audit: Imperva SecureSphere Data Security Suite
sponsored by Imperva
WHITE PAPER: Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

IBM Rational and the Financial Services Sector
sponsored by IBM
WHITE PAPER: Financial services institutions (FSIs) are under tight pressure to reduce cost and risk in the business while improving profitability and enhancing customer satisfaction. But achieving these goals can be a daunting task.  View this paper to explore a systematic approach and key recommendations that FSI should invest in to help tackle these goals.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

IBM

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Data Protection Solutions at Midsize Organizations
sponsored by Trend Micro, Inc.
WHITE PAPER: In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.
Posted: 15 Jul 2010 | Published: 01 Feb 2008

Trend Micro, Inc.

Understanding Why Web Application Security is Critical to Business
sponsored by Sirius Computer Solutions
WHITE PAPER: This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.
Posted: 13 Oct 2009 | Published: 01 Sep 2009

Sirius Computer Solutions

Oracle Application Express Tutorial
sponsored by Oracle Corporation
WHITE PAPER: Follow this step-by-step tutorial to create secure web applications that run inside your database using Oracle Application Express. You'll quickly learn how to easily build secure web forms, reports and charts.
Posted: 04 Dec 2006 | Published: 04 Dec 2006

Oracle Corporation

Cloud Computing for the Enterprise-- Part 3: Using WebSphere CloudBurst to Create Private Clouds
sponsored by IBM
WHITE PAPER: Read this article to get an introduction to WebSphere CloudBurst and WebSphere Application Server Hypervisor Edition and discover how these new offerings bring the significant advantages of private cloud computing to WebSphere enterprise environments.
Posted: 21 Sep 2010 | Published: 21 Sep 2010

IBM

Imperva’s Web Application Attack Report
sponsored by Imperva
WHITE PAPER: Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 22 Sep 2011 | Published: 01 Jul 2011

Imperva

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys