SQL Injection White Papers

(View All Report Types)
Voice over IP (VoIP) Growth and the Strain on Network Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Explore how VoIP can expose your organization to numerous risks and uncover why traditional firewalls often cannot thwart the many challenges VoIP presents.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

WatchGuard Technologies, Inc.

Ensuring Application Security in Mobile Device Environments
sponsored by IBM
WHITE PAPER: This crucial paper examines mobile application security in the age of BYOD, discussing common threats and what your organization can do to seal up vulnerabilities.
Posted: 03 Sep 2013 | Published: 03 Sep 2013

IBM

Mobilizing Windows Apps
sponsored by Citrix
WHITE PAPER: This white paper provides best practices for implementing secure remote access to Windows apps and data from any device. Read on now to learn more.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Citrix

Implementing Your BYOD Mobility Strategy: AN IT Checklist and Guide
sponsored by Insight
WHITE PAPER: This mobility checklist will offer readers an easy-to-read breakdown of what the IT department absolutely needs to consider when implementing a BYOD program into their enterprise. Read on to learn about the applications to choose, the installation and configuration options available, how to evaluate device performance, and more.
Posted: 10 May 2013 | Published: 21 Feb 2012

Insight

Application Control at the Wireless Edge
sponsored by Xirrus
WHITE PAPER: This exclusive paper examines an application control solution that uses next-generation Deep Packet Inspection (DPI) technology to deliver Layer 7 application visibility and policy control.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

Xirrus

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

A Foundation for Next-Generation Data Center Security
sponsored by Citrix
WHITE PAPER: This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing data center infrastructure.
Posted: 13 Aug 2013 | Published: 28 Sep 2012

Citrix

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys