Home
 > Research and Reports > White Papers > How the Right Mix of Static Analysis and Dynamic Anal...

How the Right Mix of Static Analysis and Dynamic Analysis Technologies Can Strengthen Application Security

Source: Secure Software
In searching for tools to implement an effective application-security strategy, managers have a choice between two technological approaches: dynamic analysis and static analysis. Available in a variety of freeware and commercial automated tools, both approaches promise comprehensive detection of security vulnerabilities. But a truly effective strategy may require a mix of both.


Featured publications:

ServicePower Technologies
ServicePower Technologies Plc (AIM: SVR) provides a complete global, mobile field management platform enabling clients to mix labor channels, using employed, contracted resources and on-demand resources while controlling all elements of the field service lifecycle, from planning to execution and analysis. Read More...
The Balancing Act of Mobile Workforce Management
Source: ViryaNet When dealing with complex and dynamic scheduling decisions, knowing which plan best reflects a service organization’s business needs is difficult. So how can you get right person to the right place, at the right time, with the right resources—and minimize your overall operating costs? This paper discusses the challenges of mobile workforce management and provides solutions for continuous optimization of scheduling resources. Read More...
TEC Advisor
TEC Advisor is an online software evaluation and selection system. Read More...


You may also be interested in these related documents:

7 Essential Steps to Security Risk Reduction
Source: Qualys As management visionary and author Peter Drucker once said, “You can’t manage what you can’t measure.” No statement rings truer—especially when it comes to security risk reduction. By having an accurate depiction of your network, however, you can identify real-world security threats and learn how to evaluate your organization’s ability to respond to them. Find out how, with these seven essential steps. Read More...
How to Boost Your WAN to Top Speed
Source: Citrix While globalization can bridge distances and enhance communication, the story is a little different when it comes to wide area networks (WANs) and their effects on branch application performance. High-latency connections and chattiness cause slowed data transmission, and consequently, decreased user productivity. But there is light at the end of the tunnel: a fast branch office application delivery infrastructure. Read More...
Wetmetrics
Source: Queue Global Information Systems Corp. The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse of passwords as authentication tokens is generally cited as a cause of the accelerating erosion of user confidence and the increasing incidence of identity theft. It is generally agreed that passwords are not enough. Much has been lost, however, in the race toward person-present authentication systems. While the application of passwords is fraught with risk, the introduction of complex authentication infrastructures and cumbersome end user technology has eroded usability and increased the cost of security dramatically. This paper describes a new authentication approach that retains the simplicity and low cost of passwords, while gracefully introducing as much person-present assurance as is required by the application. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.