23 results in Everything
 

Sorry — your search returned 0 results, so we expanded the date range to "All".

Sort by:
Refine
  • Application Development Processes & Tools
  • Security & Risk

Search Results

  • Report Construct A Business Case For Interactive Application Security Testing

    How Faster App Releases At Reduced Cost Make IAST Worthwhile
    November 3, 2017 | Amy DeMartine

    As software delivery times speed up, security professionals are trying to fit repeatable security testing into shrinking software delivery life cycles. Rather than depending on a crawler to assess...

  • Report Vendor Landscape: Software Composition Analysis

    Security, Legal, And App Dev Pros Find Common Value In Dependency Management
    October 21, 2016 | Amy DeMartine

    Software composition analysis (SCA) tools provide valuable data to security pros, legal pros, and app developers by identifying software vulnerabilities and exposing licenses for open source...

  • Report Quick Take: Rapid7 Pushes Into Application Security With Its NT Objectives Acquisition

    May 4, 2015 | Tyler Shields, Kelley Mak, Rick Holland

    Over the past decade, penetration testing tools and vulnerability management vendors have continually commoditized the efforts of manual service offerings. Delivering automated, high-quality,...

  • Report The Forrester Wave™: Public Cloud Platform Service Providers' Security, Q4 2014

    Public Cloud Platforms Step Up Their Security Game, But Is It Enough To Safely Deploy Critical Applications And Data To The Cloud?
    November 17, 2014 | Andras Cser, Ed Ferrara

    Nearly every large enterprise today is building and deploying new applications on one or more of the leading public cloud platforms. But rarely is this initiative done with the security and risk...

  • Report Improving Security With Your Indian Software Service Provider

    You Can't Outsource Accountability
    December 2, 2013 | Manatosh Das

    Outsourcing IT functions has many benefits, but when there are gaps in security and something goes wrong, it can have a serious impact on business. For example, in early 2013, authorities...

  • Report The GRC Technology Puzzle: Getting All The Pieces To Fit

    Breaking Down The Complex GRC Technology Landscape
    February 3, 2009 | Christopher McClean

    At a time when the global business community struggles to enhance internal controls and maintain long-term viability, improvements in governance, risk, and compliance (GRC) programs can be well...

  • Report Rich Internet Applications: Security Professionals Must Understand The Security Implications

    Securing Rich Internet Applications
    August 26, 2008 | Simon Yates

    The use of rich Internet application (RIA) frameworks has sharply increased in the past year as more and more application development professionals embrace rich Internet development technologies...

  • Report HP And IBM Try To Pull Security Testing Into The Mainstream

    September 21, 2007 | Chenxi Wang

    Recently, two major platform vendors announced acquisitions of security testing vendors: IBM announced its intent to acquire Watchfire on June 6, 2007, and HP announced its intent to acquire SPI...

  • Report Making Nessus Tenable

    January 23, 2007 | Jennifer Albornoz Mulligan, Michael Goulde

    Nessus started as a one-man project written over a free weekend. It has since grown to be used at an estimated 85,000 organizations, with hundreds of thousands of users. After three years spent...

  • Report SugarCRM Finds The Sweet Spot In Customer Relationship Management

    January 23, 2007 | Jennifer Albornoz Mulligan, Michael Goulde

    SugarCRM was founded in April 2004 and has grown to support 900 paying customers and 50 languages. The firm boasts 150 resellers in 30 countries and 5,000 developers contributing translations, bug...

Content Type

Apply

Filters

Region

Vendor

Analyst