Trend Report: Application Security Infrastructure

Report Details

Anwendungssicherheitsinfrastrukturen oder Application Security Infrastructures werden die IT zukünftig immer stärker prägen. Sie sind das Bindeglied zwischen einer zentralisierten, stan-dardisierten IT-Infrastruktur mit Identitäts- und anderen Sicherheitsdiensten auf der einen Seite und den Anwendungen auf der anderen Seite.
You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Oct 23, 2007

Trend Report: Application Security Infrastructure

Anwendungssicherheitsinfrastrukturen oder Application Security Infrastructures werden die IT zukünftig immer stärker prägen. Sie sind das Bindeglied zwischen einer zentralisierten, stan-dardisierten IT-Infrastruktur mit Identitäts- und anderen Sicherheitsdiensten auf der…

€165.00 Get Access

Latest Related Reports

Executive View

Executive View: Microsoft Security Suite - 72541

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

Executive View

Executive View: SAP HANA Enterprise Cloud – Security and Compliance - 71117

An overview of the SAP HANA Enterprise Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

Executive View

Executive View: SAP Enterprise Threat Detection - 71181

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system level only, but involves business systems such as SAP. Identifying, analyzing, and responding to…

Advisory Note

Advisory Note: Integrating Security into an Agile DevOps Paradigm - 71125

Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing these challenges though the answers are not straightforward. This document describes agile approaches to system…

Executive View

Executive View: Standardized services and re-used code – blessing or curse? - 71614

Today’s software solutions rely on the re-use of existing software. This ranges from the inclusion of source code provided by various sources to Application Programming Interfaces (APIs), to third party libraries and standardized remote services. Securing internet-facing or enterprise…

Leadership Brief

Leadership Brief: Prioritäten in der SAP-Sicherheit - 72017

Die Sicherheit aller wichtigen geschäftsunterstützenden Systeme und Prozesse wird durch den Wandel der Unternehmensinfrastrukturen und den grundlegend steigenden Bedrohungsgrad beeinflusst. Prioritäten beim Absichern der SAP-Infrastruktur zu identifizieren und ein…

Executive View

Executive View: Onapsis Security Platform - 71290

Onapsis Security Platform es una solución de seguridad para aplicaciones críticas de negocio en SAP. Una plataforma con conocimiento del contexto, segura y lista para la nube, que integra controles de vulnerabilidad y cumplimiento normativo, detección y respuesta a…

Executive View

Executive View: Onapsis Security Platform - 71290

Onapsis Security Platform ist eine Sicherheitslösung für kritische Unternehmensanwendungen in SAP-Umgebungen. Diese Sicherheitslösung bietet eine kontextsensitive, sichere und cloud-fähige Plattform, die Schwachstellen- und Compliance-Steuerung, Echtzeiterkennung und…

Leadership Brief

Leadership Brief: SAP Security Priorities - 72017

Changing enterprise infrastructures and the overall growing threat level influence the security of all vital business-supporting systems and processes. Identifying the priorities for securing your SAP infrastructure and maintaining appropriate security is a continuous business and…

Advisory Note

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

10 Information Security topics that were central at European Identity & Cloud Conference 2015

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

GDPR as opportunity to build trusted relationships with consumers

During the KuppingerCole webinar run March 16th, 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack of time to cover them all. Here are answers to questions that couldn’t be answered live during the [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Security Operations Center

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00