Application firewall

Results: 701



#Item
61Security / Software testing / Crime prevention / National security / Application firewall / Application security / Penetration test / Zero-day attack / Cross-site scripting / Computer network security / Cyberwarfare / Computer security

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY April 2015 THE EVOLUTION

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:16
62Application programming interfaces / System software / API Management / OAuth / Service-oriented architecture / XML firewall / Cloud computing / OpenID / SAML-based products and services / Computing / Cloud standards / Software

DATA SHEET CA API Management The Industry’s Leading Products for Enterprise-Scale API Management At a Glance

Add to Reading List

Source URL: www.itworldcanada.com

Language: English - Date: 2015-05-08 11:18:23
63Security / Network security / Firewall / DMZ / Vulnerability / End point security / Application firewall / Information security audit / Computer network security / Computer security / Cyberwarfare

State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1.

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2013-09-24 10:13:22
64Computer security / Electronic commerce / Application firewall / DMZ / Software testing / DevOps / Cloud computing / Application security / Web application security / Computer network security / Computing / Cyberwarfare

Guarding Your Web Systems CLOUD-DMZ ™ Web APPLICATION Security A NEW, CLOUD-BASED ARCHITECTURE

Add to Reading List

Source URL: www.sentrix.com

Language: English - Date: 2015-05-19 11:36:28
65Security / Application security / Application firewall / Penetration test / Hacker / Cloud computing / Web application security scanner / Computing / Computer security / Computer network security

5 reasons hackers love your application security strategy February

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:13
66Cyberwarfare / Fortinet / Application firewall / Network security / Antivirus software / Virtual private network / Check Point / ZoneAlarm Z100G / Computer network security / Computing / Computer security

DATASHEET FortiGate®/FortiWiFi™-80 Series Integrated Threat Management for Small Networks The FortiGate/FortiWiFi-80C Series are compact, all-in-one security appliances that deliver Fortinet’s Connected UTM. Ideal

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:15
67Cyberwarfare / Network security / Check Point / Internet security / Application firewall / Fortinet / Managed security service / Security software / Symantec / Computer network security / Computer security / Computing

IT Security Sector Report September 26, 2003 Security’s Hot Summer Inside This Issue Page

Add to Reading List

Source URL: signalhill.in

Language: English - Date: 2013-09-25 15:28:43
68Early voting / Firewall / Government / Accountability / Elections / Computer network security / Politics

POLL MANAGEMENT SOFTWARE EVER WISH YOU COULD MANAGE YOUR POLL PLACES FROM THE CONVENIENCE OF YOUR PC OR SMARTPHONE? CentralPoint is a web-based application that displays, monitors and tracks poll place information in re

Add to Reading List

Source URL: www.essvote.com

Language: English - Date: 2015-04-01 10:27:16
69Security / Application security / Application firewall / Penetration test / Hacker / Cloud computing / Web application security scanner / Computing / Computer security / Computer network security

5 reasons hackers love your application security strategy February

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:13
70Computer security / Network Behavior Anomaly Detection / Deep packet inspection / Netflow / Network intelligence / Application firewall / Packet capture / Firewall / Stateful firewall / Computer network security / Computing / Cyberwarfare

White Paper DPI and Metadata for Cybersecurity Applications How vendors can improve solutions for new market demands by filling the gap between COTS

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:08:00
UPDATE