Virtualization Technology News and Information
White Papers
White Papers Search Results
Showing 1 - 4 of 4 white papers, page 1 of 1.
The Forrester Wave: Intelligent Application and Service Monitoring, Q2 2019
Thirteen of the most significant IASM providers identified, researched, analyzed and scored in criteria in the three categories of current offering, market presence, and strategy by Forrester Research. Leaders, strong performers and contenders emerge — and you may be surprised where each provider lands in this Forrester Wave.

In The Forrester Wave: Intelligent Application and Service Monitoring, Q2 2019, Forrester identified the 13 most significant IASM providers in the market today, with Zenoss ranked amongst them as a Leader.

“As complexity grows, I&O teams struggle to obtain full visibility into their environments and do troubleshooting. To meet rising customer expectations, operations leaders need new monitoring technologies that can provide a unified view of all components of a service, from application code to infrastructure.”

Who Should Read This

Enterprise organizations looking for a solution to provide:

  • Strong root-cause analysis and remediation
  • Digital customer experience measurement capabilities
  • Ease of deployment across the customer’s whole environment, positioning themselves to successfully deliver intelligent application and service monitoring

Our Takeaways

Trends impacting the infrastructure and operations (I&O) team include:

  • Operations leaders favor a unified view
  • AI/machine learning adoption reaches 72% within the next 12 months
  • Intelligent root-cause analysis soon to become table stakes
  • Monitoring the digital customer experience becomes a priority
  • Ease and speed of deployment are differentiators

iOS App Security: Is it really better than Android?
With its tightly controlled iOS ecosystem, Apple insists that its platform is more secure than Android’s. Is this really the case? This infographic explores the myths and misconceptions surrounding iOS security, and how they can affect your mobile app. From ‘fleeceware’ apps to sideloading, each security myth is evaluated and solutions are provided to help iOS apps improve their overall security posture.

Apple paints a rosy picture of of the iOS ecosystem’s security. However, the “walled garden,” or closed platform isn’t as secure as it appears. This myth often leads to developers neglecting security measures when creating apps for the iOS ecosystem, as they believe that Apple’s security is superior to Android’s.

In this infographic, Guardsquare provides an overview of Apple’s security features, like the closed system and code signing. Each is examined for both strengths and weakness. The infographic also looks at some of the system’s largest security concerns, including jailbreaking and sideloading.

Guardsquare’s analysis of the iOS system includes an analysis of over 200 tweaks, or scripts used to modify the behavior of iOS apps. The results yielded surprising insights:

  • 93% of the scripts provide free access within the targeted apps to premium content or features
  • Revenue losses for targeted apps could potentially cost the publisher millions of dollars annually
  • Scam apps found in the Apple Store generate approx. $48M in revenue

As demonstrated in this infographic, it is essential for iOS app developers to strengthen their mobile app’s security in the Apple ecosystem. Guardsquare offers strategic security recommendations to keep your organization’s apps secure, regardless of platform.

The OWASP Mobile Top 10 List and Why it Matters for App Developers
It can be challenging to find reliable information on the web. The Open Web Application Security Project (OWASP) is dedicated to publishing reliable content in the web application space. OWASP’s Mobile Security Project provides resources like the “Mobile Top 10” and Mobile Application Security Verification Standard (MASVS). This report covers these resources in depth to help developers access a reliable framework for identifying, and solving mobile application vulnerabilities.

Mobile applications are a rapidly growing attack surface. With a variety of tools and techniques available to threat actors, mobile application developers need to build a reliable security framework to address the most common security vulnerabilities. In this report, Guardsquare analyzed OWASP’s “Top 10” mobile security risks and mapped them to RASP and code hardening best practices.

The report also examines the Mobile Application Security Verification Standard (MASVS), also produced by OWASP, which details additional risks and resilience guidelines that complement the “Top 10.”

Key insights:
●    A developer-centric overview of OWASP’s “Top 10” & MASVS
●    How resilience layer controls can prevent reverse engineering and tampering
●    Security technique that protect against the OWASP’s “Top 10” mobile vulnerabilities
●    How to build a layered security approach

Download the full report to learn how you can leverage RASP and code hardening to defend your Android and iOS apps against the most common mobile app security threats.

!hooked a technical magazine_
It’s often difficult for developers to get hands-on knowledge and experience in code hardening techniques To help bridge the gap, Guardsquare’s engineers have created a set of fun, practical labs around four code hardening techniques. This technical magazine is the perfect way to improve your security knowledge, regardless of the mobile platform you use. Developers will walk away with a greater understanding of compiler and security concepts.

Application hardening is an important part of mobile app security, and yet, it can feel like a difficult concept to grasp.

Developers often struggle to get hand-on knowledge and experience working with hardening techniques. In this technical magazine, Guardquare’s engineers have created a set of four fun, practical labs to help your organization familiarize itself with application hardening techniques and the security vulnerabilities that each technique thwarts. These four labs include:

•    Code Checksumming
•    Control Flow (non-) Integrity in Android Applications
•    Native Library Encryption
•    Encrypting Objective-C Selectors

Developers will walk away from these labs with a greater understanding of the theory behind each technique, as well illustrations and guided examples to help them implement them in their own application security strategy.

Download the technical manual here and begin building a stronger security posture through application hardening.