Web-based Application Security White Papers

(View All Report Types)
WebPulse Collaborative Defense
sponsored by BlueCoat
WHITE PAPER: Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Mapping Security for your Virtual Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

NetScaler VPX: Harness the Power of Virtualized Web App Delivery
sponsored by Citrix
WHITE PAPER: This technical white paper shows you how the NetScaler VPX virtual appliance offers maximum physical, functional, and operational flexibility for delivering web apps. Learn how virtual application delivery controllers can unleash the power of a virtualized dynamic data center! Compliments of Citrix.
Posted: 08 Jun 2010 | Published: 08 Jun 2010

Citrix

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010

Imperva

Web Content Control: Five Steps to a Successful Implementation
sponsored by Untangle, Inc.
WHITE PAPER: Implementing Web Content Control can seem intimidating. It represents the uneasy marriage of network administration and human resource management. With a little forethought, however, it becomes straightforward and very effective. Read this whitepaper for a step-by-step overview of a successful web content control implementation.
Posted: 18 Nov 2009 | Published: 30 Oct 2009

Untangle, Inc.

 Five tips to reduce risk from modern web threats
sponsored by Sophos
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 12 Oct 2010 | Published: 06 Oct 2010

Sophos