Software

TechRepublic covers the latest trends in software development and implementation.

  • White Papers // Mar 2014

    Breaking Down Silos of Protection: An Integrated Approach to Managing Application Security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • White Papers // Aug 2014

    Frost & Sullivan awards IBM 2014 Customer Value Leadership Award for Mobile Identity and Access Management Solution

    This Frost & Sullivan best practices research paper details why IBM have been provided their 2014 Customer Value Leadership in the Mobile Identity and Access Management because of IBM's outstanding performance.

    Sponsored By IBM

  • White Papers // Jul 2013

    Creating the Ultimate Security Platform

    It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every day are just as likely to be about the cost of providing security or the administrative hassles of ensuring regulatory...

    Sponsored By IBM

  • White Papers // Mar 2014

    Tolly Test Report: IBM Security Web Gateway Appliance

    The report summarizes the Tolly Group’s evaluation of the performance characteristics of the IBM Security Web Gateway AMP 5100 Appliance. It finds the IBM appliance to be 100% effective in blocking inline-preventable web threats and attacks, as well as being powerful and easy to use.

    Sponsored By IBM

  • White Papers // Mar 2014

    Managing User Identities and Access in the Cloud

    This document describes how IBM can help clients design, deploy and manage critical identity and access management controls within cloud environments. IBM is a trusted partner with the broad portfolio and comprehensive security strategy required to enable secure innovation.

    Sponsored By IBM

  • White Papers // Feb 2013

    Managing Identities and Access in the Cloud

    The ability to share services and information with various departments,partners, customers and other parts of the business ecosystem is a major advantage of cloud computing. As a result, successful cloud deployments hinge on securely and efficiently managing individuals’ access to resources, and protecting data from loss or corruption. From a...

    Sponsored By IBM

  • White Papers // Mar 2014

    When Millions Need Access: Identity Management in an Interconnected World

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // Oct 2014

    Practical Considerations for Expansion and Incremental Growth - IT Priorities Report

    Implementing prefabricated modular data centres results in well-understood benefits including speed of deployment, predictability, scalability, and life cycle cost. The process of deploying them – from designing the data centre, to preparing the site, to procuring the equipment, to installation – is quite different than that of a traditional data...

    Sponsored By APC by Schneider Electric

  • White Papers // Jul 2014

    Introducing Social Business for the Mid-Market.

    Aberdeen has studied the business practices of 229 mid-sized companies surveyed for the 2011 Aberdeen Business Review and 61 mid-sized companies profiled in Aberdeen's 2011 Social Collaboration Research. Mid-market organization can achieve strategic benefits from optimizing their Social Business deployments and achieving Best-in-Class status. This report provides directional guidance for...

    Sponsored By IBM

  • White Papers // Oct 2014

    Innovation to drive disruptive business models and high value services

    The next generation of market leaders are leveraging big data, mobile, social, and cloud innovation to drive disruptive business models and high value services. However, enterprises seeking to deliver software at high velocity and scale are often impeded by the complexity of deploying, upgrading, and operating their applications. Download this...

    Sponsored By Pivotal

  • White Papers // Oct 2014

    The Power of Enterprise PaaS - infographic

    Why is the enterprise platform-as-a-service (PaaS) market the focus of so much attention? Enterprise PaaS makes it faster and easier to build, test, deploy and scale applications across private or public cloud infrastructure. PaaS decreases time to market for applications and increases developer productivity. Download this resource now and...

    Sponsored By Pivotal

  • White Papers // Apr 2014

    Protect people, processes and technology from web appliation threats

    Incidents of web application security breaches that result in data theft are growing in frequency and severity, making it critical for organizations to take immediate steps to examine the security measures they have in place, assess vulnerabilities and act to protect their businesses.

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking down silos of protection - Integrated approach to managing application security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • White Papers // Aug 2014

    Security intelligence Report: The smart way to keep the cloud safe - Download

    Many of the same characteristics that make cloud computing attractive can also make it challenging to secure. An integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide visibility and control to help better secure cloud environments.

    Sponsored By IBM

  • White Papers // Aug 2014

    Today's Biggest IT Risks : Defending Against Malware -A Holistic Approach

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection. Download this...

    Sponsored By IBM

  • White Papers // Aug 2014

    IBM X-Force Threat Intelligence Quarterly Report Q2 2014

    This quarterly report from the IBM X-Force research and development team looks at how application vulnerabilities, spam threats and incident response are evolving - based on the latest data and ongoing analysis. It also includes insights from the IBM Global Technology Services division.

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Critical Capabilities for Security Information and Event Management

    IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Gartner notes that SIEM...

    Sponsored By IBM

  • White Papers // Oct 2014

    Pivotal Blog

    Pivotal's blog will give you access to the latest case studies and news on PaaS and Big data trends. Download now!

    Sponsored By Pivotal

  • White Papers // Jun 2014

    Osterman Report: Office 365 for the Enterprise

    Osterman Research outlines how third parties are required to strengthen security, compliance and control.

    Sponsored By Mimecast

  • White Papers // Sep 2014

    Modern ERP is Essential to Better Customer Experience – Infographic

    Perceptions of customer experience and service offered differ from customers to sellers. While sellers’ rate experience offered at more than 4 out 5, purchasers’ rate experience offered at 3 out of 5. Why the disconnection? Service represents 90% of the perceived sales value. So, How can we improve customer experience...

    Sponsored By Epicor

  • White Papers // Sep 2014

    The rise of Mobile Access to your ERP Data

    Mobile user access to ERP and other back office systems has become a core requirement as organizations seek operational efficiency and deepening customer engagement. Without mobile access, system users are disadvantaged by needing to return to a desktop, often after a job is completed, to enter data relating to that...

    Sponsored By Epicor

  • White Papers // Sep 2014

    Why Adaptive ERP Is Important? – Epicor ERP 10

    Response to the changed competitive landscape demands that ERP not only support the executive agenda but also the needs of individuals, regardless of where they are in an organization’s value network. Only then companies can mobilize quickly and respond effectively to events as they occur at breakneck speed, whether in...

    Sponsored By Epicor

  • eBooks // Oct 2014

    Web Application Security for Dummies

    This book simply explains all about web application security. After reading this book you'll know how to use a web application security scanner to quickly find vulnerabilities and remediate them for stronger security. Learn more...

    Sponsored By Qualys

  • White Papers // Oct 2014

    Six Essential Elements of Web Application Security

    This whitepaper highlights the six key best practices that industry-leading organizations are using in their web application security efforts while reducing resource requirements and lowering the TCO. Read more...

    Sponsored By Qualys

  • White Papers // Oct 2014

    Best Practices for Selecting a Web Application Scanning (WAS) Solution

    This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands. Learn more...

    Sponsored By Qualys

  • Case Studies // Sep 2014

    Global Insurance Company Tackles Fraud Detection On-Site With Hitachi Content Platform Software

    Is your enterprise looking for ways to reduce storage costs and delay capital expenditures (capex) with highly scalable public cloud computing services? Today’s top cloud services support enterprises with data encryption, tiering options and attractive, pay-as-you-go pricing. While public cloud services can cut storage costs, they are not cost-effective...

    Sponsored By Hitachi

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Sponsored By Webroot

  • White Papers // Sep 2014

    Performance Benchmark Report 2014

    PassMark Software® conducted objective performance testing on 8 security software products using 13 performance metrics. Find out how Webroot’s SecureAnywhere Business Endpoint Protection product performs against 7 competitor products. Download this research to learn more.

    Sponsored By Webroot

  • White Papers // Sep 2014

    ThreatBrief - CryptoLocker Your Money or Your Life

    Cryptolocker is a nasty bit of ransomware that encrypts all your files and holds them hostage . It’s been wreaking havoc worldwide since September 2013 – but we see a new variant every few weeks. Find out how Webroot SecureAnywhere solutions uses cloud-based behavioral intelligence to discover new malware and...

    Sponsored By Webroot

  • White Papers // Aug 2013

    Making Smarter Mobile Access Decisions

    Mobile devices can represent a significant threat to corporate data. Find out what IT departments need to know before deciding on a smartphone and tablet platform that is safe, easy to configure, and flexible enough to meet the needs of employees and senior executives alike.

    Sponsored By Dell Software

  • White Papers // Oct 2014

    Research Report: The Changing Mobile Landscape in Financial Services

    Sponsored by MobileIron, The Changing Mobile Landscape in Financial Services was conducted by Ponemon Institute to learn how organisations are enabling the use of mobile devices and technologies in ways that support business objectives and employee productivity. The study also examines the challenges many companies face when migrating from BlackBerry...

    Sponsored By MobileIron

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • White Papers // Dec 2013

    Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

    As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what will grow. Too often, users suffer from password fatigue, having to create and remember many log-on...

    Sponsored By F5

  • White Papers // Oct 2014

    Unlocking value in the “bring your own device” era - Flexible Workplace

    Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains...

    Sponsored By IBM

  • White Papers // Oct 2014

    Cost of Data Breach Study 2014: Impact of Business Continuity Management

    The latest Ponemon report, a survey of 314 companies around the world that had experienced a data breach, reveals that having a business continuity management (BCM) program in place can help reduce the financial and reputational consequences of a data breach. Read the analyst report to learn how having a...

    Sponsored By IBM

  • White Papers // Sep 2014

    Transforming your voice, video and collaboration - Unified communications for mobile and social collaboration

    A recent IDG survey of CIOs revealed that those using virtual desktops now say the biggest benefits are increased simplicity and a more productive and mobile workforce. Find out how other companies are using virtual desktops to: Drastically cut IT investment costs Simplify management across multiple platforms...

    Sponsored By IBM

  • White Papers // Oct 2014

    EMC InfoArchive: Data Sheet

    Information accumulation stretches capacity to the breaking point, with higher costs for servers, storage, application maintenance, database software, and operations. Keeping all information in its source application is neither cost-effective nor scalable. And backup is only a temporary measure; difficult to access and not a compliant solution.

    Sponsored By EMC

  • White Papers // Oct 2014

    2014 Ponemon Cost of Data Breach Study-India

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in India.

    Sponsored By IBM