Resources Search Results: Security

18 resources found.

  • NIST Cybersecurity Framework for Government Departments In an era of increasing digital threats, government departments face growing pressure to safeguard their systems, data and services. To support these... White Paper
  • CRA-Dora-and-Abandoned-Code-A-Business-Survival-Guide_Cover-scaled
    CRA, Dora and Abandoned Code A Business Survival Guide The CRA, DORA & Abandoned Code: A Business Survival Guide explores the risks of using unsupported open-source software (OSS) in today... CRA, Dora and Abandoned Code A Business Survival Guide
  • Fortify Your Runtime Environment: Proven Strategies for Robust Security – A Guide for Executives Securing your application server is about protecting your organization’s future. This guide breaks down how to customize your security settings, stay... Executives Guide
  • Understanding the Security Risks of Using GlassFish
    eBook: Understanding the Business Risks of Using GlassFish Application Server in Production Environments Is your enterprise still relying on the outdated GlassFish application server? This exposes your business to significant security vulnerabilities and operational risks... eBook
  • Java EE Server Runtime Environment: The Business Risks of Outdated and Unsupported Legacy Software Java EE Server Runtime Environment: The Business Risks of Outdated and Unsupported Legacy Software While Java EE is an outdated and unsupported... Whitepaper
  • Future-Proofing Cybersecurity: Payara’s Response to the EU Cyber Resilience Act
    Future-Proofing Cybersecurity: Payara’s Response to the EU Cyber Resilience Act The EU Cyber Resilience Act (CRA) mandates new cybersecurity standards for digital products sold in the European market. Whether you’re an... Brochure
  • Mitigating Risks of Unsupported Open Source in Production - The Case for Payara Enterprise Platform
    Mitigating Risks of Unsupported Open Source in Production – The Case for Payara Enterprise Platform Open source solutions offer a variety of benefits, but when it comes to mission-critical applications in production environments, the risks of... User Guide
  • Guard Your Business Against Cyber Threats with Payara Enterprise Payara Enterprise isn't just about security. It's a cost-effective investment that: • Reduces breach vulnerability: Save yourself millions in potential... Brochure
  • Securing REST Web Services on Payara Server cover page
    Securing REST Web Services on Payara Server with Jakarta Security and OIDC The Jakarta Security API provides an easy, straightforward, and standard way to configure and secure your Jakarta REST resources with the OIDC... User Guide
  • How to Create Predictable Tests in Jakarta EE Applications: A Guide to Reliable and Repeatable Testing This guide aims to delve into the key strategies and best practices that can help you achieve predictability and repeatability in your... User Guide
  • Securing Jakarta EE Applications with MicroProfile JWT Securing applications is a critical aspect of modern software development, ensuring that only authorised users can access sensitive functionalities and data. In... User Guide
  • Guide front cover - Securing Jakarta EE Applications With OIDC And Keycloak
    Securing Jakarta EE Applications With OIDC and Keycloak The need to simplify, harmonise and centralise security as much as possible led the industry to come up with the OpenId Authentication... User Guide
  • How to Develop Applications with Minimal Security Risks Cover
    How to Develop Applications with Minimal Security Risks Minimising security risk is a key part of developing your application. Users of software expect that systems will be safe and their... cheat sheet
  • Security Tools in the Payara Platform datasheet
    Security Tools in the Payara Platform Using Payara Platform Enterprise gives you additional reassurance that your production systems are secured and safe, with: Monthly releases including security fixes... datasheet
  • Security Auditing in Payara Server
    Security Auditing in Payara Server This guide explains and demonstrates the security auditing best practises and features you can find in Payara Server Security is always a... guide
  • How to Secure JAX-RS Endpoints of a Stateless Application
    How to Secure JAX-RS Endpoints of a Stateless Application Securing your application is a very important aspect of the development of your application. You not only need to make sure that... guide
  • Secure Your Applications with Authentication and Authorization Cover
    Secure Applications with Authentication and Authorization Securing your application is a very important aspect of development. You not only need to make sure that the application has the... guide
  • Integrating LDAP with Payara Server This guide explains and demonstrates how to integrate Lightweight Directory Access Protocol with Payara Server If you work in an organization with... guide
Back to top