Dynamic Services Reports

Strengthening Web Application Security: Charting a Robust Strategy That Starts at Development.
sponsored by IBM
WHITE PAPER: This paper examines the current dilemma that security auditors face with the bottleneck for Web application deployment.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

IBM

Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall
sponsored by PortalGuard
WHITE PAPER: Consult this informative white paper to find out how you can resolve issues with user-accessibility. Single sign-on can eliminate problems with multiple password prompts and make accessibility easier for the user. Learn why a single sign-on process can help handle an organizations multiple cloud applications as well as provide secure accessibility.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

PortalGuard

Selecting a SOA testing tool
sponsored by IBM
EGUIDE: Consult this expert e-guide and learn best practices for selecting a SOA testing tool, as well as some of the new approaches to building services with SOA.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

IBM

A closer look at video conferencing solutions, technology and vendors
sponsored by TechTarget Security
EGUIDE: In order to successfully implement your video conferencing solutions, you must understand the physical components of your system.  This e-guide can help you by uncovering the ins and outs of video conferencing architectures while also providing an in-depth look at solutions, technology and vendors.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security

Enterprises Reap the Rewards of Modernizing Their ERP Systems - IDC Research
sponsored by SAP America, Inc.
WHITE PAPER: This white paper outlines strategies for organizations considering upgrading or replacing their enterprise resource planning systems in order to handle business growth, streamline internal processes, and leverage technology innovation.
Posted: 06 Aug 2008 | Published: 01 Mar 2007

SAP America, Inc.

E-Guide: How to build a toolset to avoid Web 2.0 security issues
sponsored by TechTarget Security
EGUIDE: Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

TechTarget Security

Empowering the Business to Sense and Respond: Delivering Business Event Processing with IBM WebSphere Business Events
sponsored by IBM
WHITE PAPER: This paper addresses one of the critical IBM technologies for supporting agility and alignment, Business Event Processing (BEP).
Posted: 11 Nov 2009 | Published: 25 Jul 2008

IBM

A Case for IT Security: The Future of New EU Data Protection
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

TechTarget ComputerWeekly.com

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Are You Securely Delivering Enterprise Data and Services?
sponsored by OpenText Security Solutions
WHITE PAPER: Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

OpenText Security Solutions