home_banner `

Content Icon

Overview of How Organizations Secure Applications

November 16, 2018 | Content Aggregator - Single Slide | Application Development and Testing

Almost two-thirds of IT and security professionals (61%) say they secure their applications by educating developers on safe coding, 59 percent use penetration testing, 53 percent use data masking during testing, and half (50%) use data and key encryption.


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Container Tools for AWS: An Overview

The market for container tools - and container monitoring tools -- is growing fast. In this Ask-an-Expert written response, IANS Faculty George Gerchow provides an overview of the space and recommends going with tools like Docker and Kubernetes.

Establish Governance Over APIs and Containers

If approached the right way, the move to APIs, containers and DevOps can actually result in better alignment between development and security. In this Ask-an-Expert written response, IANS Faculty Justin Leapline says the key is to focus on ensuring secure configuration and development, solid change management and reliable monitoring/response processes. 

Poll: Using Open Source Software for Security

What is the industry stance on using open source software to provide security capabilities? In this Viewpoints report, IANS Faculty Josh More, Davi Ottenheimer, Mark Clancy and Kevin Beaver offer their recommendations.