Web Service Security

WS-Security (Web Services Security) is a communications protocol providing a means for applying security to Web Services. Integrity and confidentiality can also be enforced on Web Services through the use of Transport Layer Security (TLS), for example by sending messages over https.
Results 1 - 25 of 63Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Mar 31, 2009
The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured.
Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, idc
By: iboss     Published Date: Jan 22, 2018
When the General Data Protection Regulation (GDPR) replaces the European Unionís Data Protection Directive 95/46/ec on May 25, 2018, businesses across the globe will be subject to a wealth of potential fees and penalties for non-compliance.
Tags : iboss, gdpr, gdpr compliance, compliance, general data protection regulation, remote access, security policies, web service security
By: NodeSource     Published Date: Nov 20, 2017
Node.js is now the most dominant and in-demand language for application development, particularly on the enterprise scale. This report will trace the evolution and adoption of Node.js in the enterprise, as well as the directions in which the ecosystem will grow.
Tags : nodesource, application development, javascript, web applications, open source, soa, application security, web service security
By: NodeSource     Published Date: Nov 10, 2017
Digital transformation is ďthe use of technology to radically improve performance or (business) reach. But for digital-native businesses that have never needed to make that shift ó e-commerce, social media, web-based services ó it involves a sharpening of that focus combined with an ongoing evolution of process and infrastructure.
Tags : nodesource, xml, software development, digital transformation, open source, web applications, web development, java
By: Akamai Technologies     Published Date: Mar 15, 2016
Cybercriminals continue to evolve their tactics with ever-growing cyberattack sizes and new attack methods, which has spiked a demand for DDoS mitigation services. However, it is often difficult for companies to assess, evaluate, and differentiate DDoS mitigation service providers from one another. Read the four critical criteria you should use to evaluate providers before selecting one.
Tags : web security, best practices, mitigation services, network management, automotive, security, web services, web service security
     Akamai Technologies
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labsí group tests.
Tags : citrix, firewall, security, svm, firewalls, intrusion prevention, web service security, data protection
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler gives you the visibility and control to manage, accelerate, and secure all your web properties, so you can deliver both the service and security your users demand. To learn more about web security and NetScaler, read the full report: Defend Web Properties from Modern Threats with Citrix NetScaler
Tags : citrix, security, netscaler, web, hacker detection, web service security, web services, data protection
     Citrix Systems, Inc.
By: Cisco     Published Date: Nov 17, 2014
Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Tags : spyware, rootkits, hacking, cisco, advanced threat protection, networking, security, enterprise applications
By: Dyn     Published Date: Oct 16, 2014
Web presence is now a required option for customers accessing a businessís products and services. But more than just an option, web pages have become the face of most companies to the public. Learn how can you take control of the Internet effect on your companyís web presence through Internet monitoring, analysis and planning.
Tags : dyn, internet visibility, web infrastructure, web presense, customer service, online business, internet performance, network performance
By: Cisco     Published Date: Aug 18, 2014
Cisco offers an approach to network security that protects against new and emerging threats while enhancing network visibility and control. Ciscoís proven email and web security products protect 50 percent of Fortune 1000 companies, more than 20 percent of the world's largest enterprises, and eight of the 10 largest Internet service providers.
Tags : email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
By: Cisco     Published Date: Aug 18, 2014
Optimize benefits from your Cisco ASA 5500-X Series Next-Generation Firewall, and better secure your network from malicious activity, with a proven firewall and IPS design guide. Use this guide for faster, more reliable, and more predictable deployment.
Tags : security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network
By: Symantec     Published Date: Jul 30, 2014
This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.
Tags : vulnerability assessment, website security, protecting against vulnerabilities, web service security, vulnerability management
By: Webroot Inc     Published Date: Mar 05, 2014
Learn the top 5 malware trends for 2014 and how your organization can best protect against hackers and cyber thieves.
Tags : malware, security, cyber thieves, malware trends, security systems, webroot, networking, wireless
     Webroot Inc
By: Kaspersky Lab     Published Date: Feb 20, 2014
Donít get caught in the crossfire. Read our special report "Who's spying on you?" to find out more about the threats of malware to your business.
Tags : kaspersky, malware threats, cyberespionage, internet perpetrators, security technology, internet safety, business protection, cybercriminals
     Kaspersky Lab
By: Symantec     Published Date: Jan 15, 2014
This yearís ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantecís security experts. In this summary, we call out seven areas that deserve special attention.
Tags : symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection
By: Imperva     Published Date: Nov 07, 2013
This white paper outlines the application threat landscape; explains why next generation firewalls are ill-equipped to stop web attacks; and provides six essential requirements for protecting web applications.
Tags : imperva, web applications, web application security, ddos, web attack, data protection, firewalls, next gen firewalls
By: Qualys     Published Date: Nov 05, 2013
Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-used applications, which has drawn the attention of cyber criminals Ė making it a potential Achilles heel for security.
Tags : qualys, qualys browsercheck, security, web security, application security, web browser, cyber criminals, vulnerability
By: Imperva     Published Date: Sep 19, 2013
This guide will help you protect your organization from external threats targeting your high-value applications and data assets.
Tags : imperva, ddos, hackers, cybercriminals, cyberattacks, malware, phishing, web attack
By: ProfitBricks     Published Date: Jan 01, 2013
Performance testing and benchmarking of cloud computing platforms is a complex task, compounded by the differences between providers and the use cases of cloud computing users. IaaS services are utilized by a large variety of industries and, performance metrics cannot be understood by simply representing cloud performance with a single value. When selecting a cloud computing provider, IT professionals consider many factors: compatibility, performance, cost, security and more. Performance is a key factor that drives many others including cost. In many cases, 3 primary bottlenecks affect server performance: central processing unit (CPU) performance, disk performance, and internal network performance.
Tags : cloud computing, iaas, profitbricks, amazon ec2, rackspace cloud, central processing unit, disk performance, internal network performance
By: Symantec     Published Date: Sep 19, 2012
Symantec vulnerability assessments help to reduce the cost and complexity of vulnerability management with automated scans, actionable reports, and a cloud-based architecture that requires no software installation or maintenance.
Tags : hackers, information technology, symantec, verisign, web applications, security, network security, web service security
By: Symantec     Published Date: Sep 19, 2012
This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Tags : applications, information technology, symantec, verisign, web security, security, network security, web service security
By: Symantec     Published Date: Sep 19, 2012
The solutions to problems of computing security are varied and must be explored individually, but one technology shows up often: TLS or Transport Layer Security, often known by the name of the predecessor technology, SSL or Secure Sockets Layer.
Tags : business computing, information technology, symantec, verisign, web security, security, network security, web service security
By: Symantec     Published Date: Sep 19, 2012
This guide discusses the combined risk of data loss and customer trust, planning, deploying and maintaining SSL certificates and how SSL certificates can protect your business.
Tags : information security, information technology, web applications, security, web service security
By: Imperva     Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
Tags : imperva, application security, security costs, roi, firewall, ddos, web attacks, it spending
By: CollabNet     Published Date: Dec 20, 2011
Why the Cloud Is Advantageous for Agile, and for Accelerating its Enterprise-wide Adoption
Tags : cloud, development, alm, agile, software development, collaboration, dev team, production
Start   Previous   1 2 3    Next    End
Search White Papers