WEBCAST:
This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
VIDEO:
This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
WEBCAST:
Banking and financial institutions rely heavily on internally developed software to provide new products and services and are faced with an ever-changing regulatory environment that imposes tremendous challenges. This webinar will review specific compliance challenges, and how to automate compliance for open source software.
PODCAST:
Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.
Posted: 09 Jun 2011 | Premiered: Jun 7, 2011, 13:30 EDT (17:30 GMT)
VIDEO:
This training course was designed for professional developers interested in using Microsoft SharePoint 2010 to rapidly develop and deploy solutions. The course contains a series of videos and presentations that will help guide you along the way.
VIDEO:
Organizations today are leveraging cloud computing to take advantage of increased agility and flexibility at a reduced cost. Yet, many are making the mistake of using physical security approaches to protect virtualized infrastructures and cloud environments. Find out how you can strengthen your application and data security in the cloud.
WEBCAST:
View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.
WEBCAST:
In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.