User talk:Madhusudhan rajappa
Welcome to OWASP! We hope you will contribute much and well. You will probably want to read the help pages. Again, welcome and have fun! KateHartmann (talk) 19:18, 26 February 2014 (CST)
AppScan Enterprise Scan Configuration Best Practices
IBM Security AppScan Enterprise Edition (AppScan) offers advanced application security testing and risk management with a platform that drives governance, collaboration, and security intelligence throughout the application life cycle. While configuring and running scans using Appscan, novice security testers may encounter problems such as improper scan coverage, excessive scan times, failed or suspended scans, communication errors, and so on. The practices described here will help security testers configure and run more successful scans with IBM Security Appscan Enterprise Edition.
Visit URL: [1] https://ibm.biz/BdR9uU
Importing .scan files into AppScan Enterprise
IBM® Security AppScan® Enterprise is deployed at organization level within an enterprise to provide application scanning and centralized dashboard reporting about the scans findings. Security testers often install IBM Security AppScan Standard on their laptop and desktop computers to scan applications because AppScan Standard is more flexible and portable. To provide a complete picture of the scan results in the AppScan Enterprise dashboard, the security testers must import their scan results from AppScan Standard to AppScan Enterprise. This document describes the step-by-step instructions for importing and exporting .scan file formats from AppScan Standard to AppScan Enterprise.
Visit URL: [2] http://www.ibm.com/developerworks/library/se-import-appscan-files/index.html
IBM X-Force Threat Intelligence Quarterly 1Q 2014
This quarterly report from the IBM X-Force research and development team explores the latest security trends - from malware delivery to mobile device risks - based on 2013 year-end data and ongoing research. It also includes data from Trusteer, an IBM company since September 2013.
URL [3]

