Defend Against Injection-based Attacks

We’ll explore some of the most common security vulnerabilities currently plaguing the software development industry, and present different ways in which Static Code Analysis, or SCA, can detect them.

In this paper, we’ll:

• Provide a detailed description of the weakness

• Show how it presents itself to the end user and the developer

• Explain mitigation strategies to help resolve each issue

Get Whitepaper

Prototype to Production with IMSL Numerical Libraries

In this paper, we describe how to call IMSL routines directly from R and Matlab. In general, use of IMSL reduces software production time and costs. Moreover, the technique we describe streamlines the process further by easing the transition from algorithm development to production code. We show how to integrate IMSL with common tools used by applied mathematicians, data scientists, and advanced algorithm groups.
Get Whitepaper

Getting Agile with Database Development

Once an organization becomes convinced of the advantagesof agile development, there is no going back. Shorter time to value, lower risk and greater flexibility are among the most frequently cited benefits of the agile mentality.

Although most application developers now consider agile a mainstream approach, database developers — especially those working on relational databases — have been slower to embrace it because of the need to understand and respect the state of a database when deploying changes. Thus, database professionals have had to rely on manual processes that do not scale up to the faster development cycles at the heart of agile.

Get Whitepaper

Deliver Better Applications Using Database Development Best Practices

Delivering properly functioning, easily maintainable, bugfree code really is harder than it used to be. Not only do development teams have to deal with frequently changing requirements and tight project timelines, they also must find ways to work effectively in distributed project teams, and with larger, more complex database environments than even just a few years ago.

The resulting challenges include:

• Ensuring that the code works properly

• Ensuring that the application functions not only today, but also years into the future

• Dealing with everyday setbacks, such as coding errors and rework, in the most effective way

• Making sure development projects are versioned properly

Get Whitepaper

Simple and Secure

This white paper explains why companies need secure enterprise file sync and share (EFSS) solutions, how users can work with them, and which capabilities an EFSS product should have. Last but not least, the white paper also looks at the extent to which Brainloop Dox, a new EFSS product, corresponds to user requirements.
Get Whitepaper

DDoS Attack Interceptor

Your business is increasingly reliant on digital content and a 24x7 online presence. Any disruption can have serious consequences to your reputation, operations, and bottom line. Yet the pace, scale, and sophistication of attacks targeting online resources is constantly increasing—and requires multiple lines of defense. Limelight’s DDoS Attack Interceptor is a comprehensive, multi-layer solution that offers protection from even the largest and most complex Distributed Denial of Service (DDoS) attacks before they can wreak havoc on your business.
Get Whitepaper

All Systems Go

Do your systems engineering projects suffer from product-decision gridlock or arduous concept, design and validation phases that lead to unpredictable development costs and late releases?

Coordinating requirements management, verification and validation among the competing interests and inputs of multiple teams, all while striving to guarantee successful system development is a formidable challenge. But you have wise advocates on your side.

Get Whitepaper

Tableau Metadata Model

The first layer of abstraction is the Connection. The Connection stores information about how to access the data and what data to make available to Tableau. The connection attributes for the database, the tables, views and columns to use, and any joins or custom SQL used to access the data. To support true ad hoc analysis, Tableau does not require that all fields, tables or joins be included in the initial connection. This allows users to get started with a simple connection and change it as needed to include more fields or tables.
Get Whitepaper

Trust Online is at the Breaking Point

Most alarming threat to security professional in 2015 is a Cryptoapocalypse: a discovered cryptographic weakness that becomes the ultimate weapon, allowing websites, payment transactions, stock trades, and government to be spoofed or surveilled (term was coined by researches presenting their findings at Black Hat 2013).
Get Whitepaper

Unfettered Mobility: Driving the International Extended Enterprise

Organisations are increasingly international in both their outlook and their operations. Despite these developments, international workers continue to be impeded by their organisations' approaches to mobility.

IDC research highlights that when working internationally, employees make a distinct change in their communication preferences, becoming less available and less collaborative. This impacts both productivity and job satisfaction.

This whitepaper outlines the learnings that can be implemented in mobile policies by senior decision makers who are responsible for managing telecommunications across the globe.

Get Whitepaper

Unfettered Mobility: Research Highlights

Organisations are increasingly international in both their outlook and their operations. This is being driven by developments in the global economy and the search for new partners, as well as access to travel and communications. As a result, businesses are making greater use of a global network of customers, suppliers and partners. IDC refers to this network as the International Extended Enterprise.
Get Whitepaper

Stop Unauthorized Privileged Access

SSH is a cryptographic security protocol used to connect administrators and machines. While SSH keys are often used to secure access to the most sensitive systems and data, there is usually little awareness or policy enforcement in place around their use. If you don’t know which administrator or SSH key has access to which servers, your IT environment may already be at risk.
Get Whitepaper

Prevent Costly Outages Due to Expired Digital Certificates

Your organization, like so many others, is most likely increasing its use of SSL/TLS to protect sensitive data and reduce risk. To accomplish this, organizations rely on digital certificates to enable encryption and authenticate communications for customers, partners, and employees. These digital certificates are also used to secure machine-to-machine authentication and mobile applications.
Get Whitepaper