application assessment

Results 1 - 25 of 39Sort Results By: Published Date | Title | Company Name
Published By: Avi Networks     Published Date: Mar 24, 2016
This buyer’s guide for load balancers is based on research, best practices, and conversations with network administrators and IT operations teams at over 110 Global 2000 enterprises. It presents guidelines for choosing application services that mirror the needs of modern data centers and public cloud initiatives. The guide is organized in sections, starting with a pre-assessment of your current application delivery capabilities. With data gathered from your pre-assessment, you can review the considerations involved in creating a software-defined application services strategy; identify opportunities to improve automation of application services and operations. Finally, use the software-defined application services checklist at the end of the guide to identify key priorities in your choice of application service solutions for your enterprise.
Tags : 
avi networks, best practices, application services, modern data centers, public cloud initiatives, load balancer, load balancing, application delivery
    
Avi Networks
Published By: BMC ESM     Published Date: Nov 05, 2009
Realizing its existing processes and tools were inadequate, labor intensive and error-prone, Morgan Stanley began looking for a new application deployment solution in early 2007. While not required in the initial assessment, Morgan Stanley also hoped to find a tool that would also provide capabilities such as hardware and operating system provisioning.
Tags : 
bmc esm, deployment, morgan stanley, hardware, operating system, management, application automation, operations manager
    
BMC ESM
Published By: CAST     Published Date: May 06, 2013
Download the paper to learn about CAST Application Intelligence Platform (AIP), the only enterprise-grade software quality assessment and performance measurement solution available.
Tags : 
architecturally complex violation, architectural hotspot, architecture of decay, cast, cast aip
    
CAST
Published By: CEB     Published Date: Nov 09, 2015
As an HR professional, you know the spotlight is on recruitment functions to prove their value to the business. You’ve seen how the volume of job applications has risen over the last few years, yet all it has done is create more work and rarely better outcomes – for candidates, recruiters or employers. Based on CEB research, this eBook uncovers the insights and solutions to overcome these volume recruitment challenges: • How to create an effective employer brand • How to optimize the candidate experience • How to make the recruitment process more efficient
Tags : 
recruitment, recruiting, volume recruitment, volume hire, volume recruiting, high volume recruitment, high volume recruiting, applicant sifting
    
CEB
Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : 
application security, web application security, hacker detection, cenzic, cenzic hailstorm
    
Cenzic
Published By: Cenzic     Published Date: Nov 29, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks.  Find out how Cenzic's ClickToSecure solution can help you secure your applications.
Tags : 
compiance, internet application security, it spending, application security, vulnerability management, identity management, security assessment, security audit
    
Cenzic
Published By: Cenzic     Published Date: Nov 11, 2008
This white paper highlights Cenzic’s recommendation of a process of continuous assessment for applications in development and production environments -- a process that can equally apply to Intranet and public facing applications alike. Continuous testing can now be easily and safely done in a virtualized environment; no longer putting production web applications at risk. Companies can now easily and quickly, add vulnerability testing to their list of activities for all of their Web applications including production applications. Using a testing methodology across a company’s Web application portfolio will significantly enhance the security of all Web applications.
Tags : 
web application security, testing web applications, cenzic, assessments for web applications
    
Cenzic
Published By: Dell     Published Date: Oct 20, 2008
Efficient desktop application management is essential in normal day-to-day operations of any company. Whether you are introducing a new application or implementing an OS migration, the goal is the same: minimize disruptions and ensure user productivity throughout the process.
Tags : 
dell, application management assistance, application assessment, application rationalization, testing application compatibility
    
Dell
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
On March 10, 2008, F5, a leader in application delivery, and WhiteHat Security, an innovator in application security assessment, announced they would be partnering to create an integrated Web application assessment and firewall technology. This product integration will incorporate WhiteHat’s Sentinel assessment technology and F5’s ASM attack blocking technology into a single solution.
Tags : 
web application assessment, defense technologies, whitehat security, web application vulnerabilities
    
F5 Networks Inc
Published By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
    
Forcepoint
Published By: Google Apigee     Published Date: Feb 05, 2019
Application programming interfaces, or APIs, are the way software talks to other software—so by definition, they’re a technology that connects systems. Many enterprise leaders think of them primarily in these terms. For example, 57 percent of respondents to Google’s enterprise digital maturity assessment tool, Apigee Compass, characterize APIs as systems integration technology.
Tags : 
    
Google Apigee
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"12-page white paper on workload placement: In this Frost & Sullivan report, they look at how the hybrid environment calls for a new way of thinking about “application performance.” They show how application performance is impacted by choice of deployment model (on premises and in the public cloud). They look at workloads whose performance requirements make them candidates for on-premises deployment, and identify the link between “optimal performance” and achievement of business goals. Finally, they offer suggestions for getting started with your workload assessment process. "
Tags : 
    
Hewlett Packard Enterprise
Published By: HireVue     Published Date: Feb 09, 2018
Unilever is a global player in the fast-moving consumer goods (FMCG) sector, with nearly a third of the world’s population using its products every day. The company has more than 169,000 employees working around the world, and its leaders estimate that within three years, as many as 60 percent of those employees will be Millennials. Critical to Unilever’s ongoing success will be its ability to attract these recent college graduates. For its signature Future Leaders Programme, the company wanted its recruitment efforts to get ahead of the curve. The existing process was rooted in paper-based applications, phone interviews with recruiters, and manual assessment tests. It took four to six months to sift through 250,000 applications and ultimately hire 800 individuals. The company sought to radically transform this process using online gamification, digitally recorded interviews, and science-based assessment tests and data analysis. In this case study, we: • Explain the challenges facing U
Tags : 
    
HireVue
Published By: HireVue     Published Date: May 16, 2018
OVERVIEW Unilever is a global player in the fast-moving consumer goods (FMCG) sector, with nearly a third of the world’s population using its products every day. The company has more than 169,000 employees working around the world, and its leaders estimate that within three years, as many as 60 percent of those employees will be Millennials. Critical to Unilever’s ongoing success will be its ability to attract these recent college graduates. For its signature Future Leaders Programme, the company wanted its recruitment efforts to get ahead of the curve. The existing process was rooted in paper-based applications, phone interviews with recruiters, and manual assessment tests. It took four to six months to sift through 250,000 applications and ultimately hire 800 individuals. The company sought to radically transform this process using online gamification, digitally recorded interviews, and science-based assessment tests and data analysis. In this case study, we: • Explain the chal
Tags : 
    
HireVue
Published By: HP     Published Date: Apr 13, 2014
Learn how Isbank, Turkey’s largest bank, dramatically reduced testing times for Functional Testing automation from 6 man-days to a few hours. Read about the benefits of adopting an Application Lifecycle Management approach to improve software quality, automate testing processes and safeguard mission-critical applications while supporting growth.
Tags : 
application lifecycle management, application development, application testing, enterprise release management, financial services, functional testing, hp application, hp loadrunner
    
HP
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : 
fortify, open source, business risk, security, application security, audit, risk, vulnerabilities
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Oct 16, 2008
The hacking community has shifted its effort toward a new frontier:  the application layer.  How are companies responding?  Business Software Assurance – the capability to address the problem of application risk within an enterprise.  This whitepaper provides an overview of the severity of the problem along with everything needed to develop Business Software Assurance in your organization. 
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
With an extensive background in police, military, government, and industry security, Howard Schmidt explains how to respond to the changing landscape of cyber threats and how business leaders are helping set the standards for application security. He then profiles industry role models who are setting the standard for application security.
Tags : 
howard schmidt, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: IBM     Published Date: Mar 17, 2015
This is IDC’s first MarketScape evaluating Digital Commerce Applications, and IBM was listed as a leader. It is the first ranking report from the analysts that takes a broader view of the commerce market.
Tags : 
digital commerce, ibm, vendor assessment, idc marketscape, commerce market
    
IBM
Published By: McAfee     Published Date: Jul 24, 2013
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : 
siem, data storage, event analysis, attacks, forensic analysis
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : 
siem, data storage, event analysis, attacks, forensic analysis
    
McAfee
Previous   1 2    Next    
Search Resource Library