Your business associates know mobile apps are important, and so do you. But that may be the only agreement on mobile apps between business and IT. Bloomberg Audience Insights interviewed 150 senior business decision makers and IT decision makers from large companies with more than 1,000 employees to find out where we agree and where we might disagree on mobile apps.
Archive
Mobile applications represent a growing threat to the enterprise. But how big of a threat? HP Security Research leveraged HP Fortify on Demand Mobile to scan more than 2,000 mobile applications from more than 600 companies to find out.
Global 2000 Mobile Risk Report
With the escalating number and increasing sophistication of cyber-attacks, perimeter defenses are no longer enough. Enterprises must ensure application vulnerabilities don't open doors for hackers.
ROI Research Study-Does Application Security Pay? Measuring the Business Impact ...
Are you part of the 51% of business that test your applications before deployment? What about testing after deployment?
Bloomberg Research Test & Secure Mobile Apps
Open source software is a game-changer in helping development organization herd their application security risks. But they can also introduce risk when employed without adequate precautions. However, by following a few strategies, your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Reducing Security Risks from Open Source Software
The weakest point in modern networking infrastructures is often not the low-level hardware and software running on the servers, but the web applications that are developed and hosted upon them. According to the SANS survey on application security, poor understanding of web security needs on the part of developers also limit the effectiveness of application security programs.
SANS Securing Web Applications Made Simple and Scalable
How do your peers secure their mobile apps? The SANS Institute surveyed 488 respondents on the state of their application security programs and practices.
SANS Survey on Application Security Programs
Employees want to use the toolsincluding tabletsthat help them be more productive. However, purchasing and maintaining two devices for each employee can be cost-prohibitive.
Cut the cost of productivity. Get the Dell Venue 11 ...
The workplace continues to modernize. Now more than 2,000 business applications are touch-enabled, and the latest business devices offer touch along with other inputs.
Stay ahead of the pack. Modernize your business with touch.
More employees are using their touch-enabled personal devices at work. However, many IT managers doubt that touch alone can add sufficient value to outweigh the challenges of purchasing, deploying, and maintaining touch-enabled devices.