Trend Report: Application Security Infrastructure

Report Details

Anwendungssicherheitsinfrastrukturen oder Application Security Infrastructures werden die IT zukünftig immer stärker prägen. Sie sind das Bindeglied zwischen einer zentralisierten, stan-dardisierten IT-Infrastruktur mit Identitäts- und anderen Sicherheitsdiensten auf der einen Seite und den Anwendungen auf der anderen Seite.
You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Oct 23, 2007

Trend Report: Application Security Infrastructure

Anwendungssicherheitsinfrastrukturen oder Application Security Infrastructures werden die IT zukünftig immer stärker prägen. Sie sind das Bindeglied zwischen einer zentralisierten, stan-dardisierten IT-Infrastruktur mit Identitäts- und anderen Sicherheitsdiensten auf der…

€165.00
excl. VAT
Get Access
Mastercard Visa PayPal INVOICE

Latest Related Reports

Executive View

Executive View: SAP HANA Platform Security - 70272

SAP HANA Platform securely supports the IT applications and services needed by organizations to achieve digital transformation as well as the traditional IT systems of record. It offers a high - performance database through in - memory processing and provides enterprise grade security…

Executive View

Executive View: Microsoft Security Suite - 72541

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

Executive View

Executive View: SAP HANA Enterprise Cloud – Security and Compliance - 71117

An overview of the SAP HANA Enterprise Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

Executive View

Executive View: SAP Enterprise Threat Detection - 71181

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system level only, but involves business systems such as SAP. Identifying, analyzing, and responding to…

Advisory Note

Advisory Note: Integrating Security into an Agile DevOps Paradigm - 71125

Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing these challenges though the answers are not straightforward. This document describes agile approaches to system…

Executive View

Executive View: Standardized services and re-used code – blessing or curse? - 71614

Today’s software solutions rely on the re-use of existing software. This ranges from the inclusion of source code provided by various sources to Application Programming Interfaces (APIs), to third party libraries and standardized remote services. Securing internet-facing or enterprise…

Leadership Brief

Leadership Brief: Prioritäten in der SAP-Sicherheit - 72017

Die Sicherheit aller wichtigen geschäftsunterstützenden Systeme und Prozesse wird durch den Wandel der Unternehmensinfrastrukturen und den grundlegend steigenden Bedrohungsgrad beeinflusst. Prioritäten beim Absichern der SAP-Infrastruktur zu identifizieren und ein…

Executive View

Executive View: Onapsis Security Platform - 71290

Onapsis Security Platform es una solución de seguridad para aplicaciones críticas de negocio en SAP. Una plataforma con conocimiento del contexto, segura y lista para la nube, que integra controles de vulnerabilidad y cumplimiento normativo, detección y respuesta a…

Executive View

Executive View: Onapsis Security Platform - 71290

Onapsis Security Platform ist eine Sicherheitslösung für kritische Unternehmensanwendungen in SAP-Umgebungen. Diese Sicherheitslösung bietet eine kontextsensitive, sichere und cloud-fähige Plattform, die Schwachstellen- und Compliance-Steuerung, Echtzeiterkennung und…

Leadership Brief

Leadership Brief: SAP Security Priorities - 72017

Changing enterprise infrastructures and the overall growing threat level influence the security of all vital business-supporting systems and processes. Identifying the priorities for securing your SAP infrastructure and maintaining appropriate security is a continuous business and…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Future-Proofing Your Cybersecurity Strategy

It’s May 25 today, and the world hasn’t ended. Looking back at the last several weeks before the GDPR deadline, I have an oddly familiar feeling. It seems that many companies have treated it as another “Year 2000 disaster” - a largely imaginary but highly publicized issue [...]

Latest Insights

Hot Topics

Spotlight

Compliance, Risk & Security Learn more

Compliance, Risk & Security

Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00