IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Multimedia (View All Report Types)
1 - 25 of 102 Matches Previous Page  |  Next Page
GigaSECURE Security Delivery Platform
sponsored by Gigamon
VIDEO: Discover how to shift your security strategy from perimeter defenses towards a detect and protect frameworkm gaining greater visibility in the process. Learn how to extend the reach of your security applications everywhere on your network by giving them the right traffic at the right time.
Posted: 23 Sep 2016 | Premiered: 04 Aug 2015

Gigamon

Deliver Secure Applications to Boost Business Productivity on Mobile Devices
sponsored by Citrix
VIDEO: Tune into this video to discover how to enforce mobile business productivity with virtual application deployment that keeps apps and data secure in the data center. Watch now to assure your mobile workforce of a user-friendly experience with secure remote access, enterprise file sync and share, and more.
Posted: 30 Aug 2016 | Premiered: 16 Aug 2016

Citrix

Delivering Virtual Apps to Any Mobile Workspace
sponsored by Citrix
VIDEO: Learn how to deliver secure virtual applications and data to any corporate or personal device in your organization. Tune into this brief video to transform your employees' mobile workspaces to promote better productivity, and foster a new level of collaboration among your mobile and remote workers.
Posted: 30 Aug 2016 | Premiered: 19 Aug 2016

Citrix

Simplify Your Google Apps Collaboration and Management with IDaaS
sponsored by OneLogin
WEBCAST: This informative webinar is designed to get you through the most complex of Google App deployments.
Posted: 29 Aug 2016 | Premiered: Jul 1, 2016

OneLogin

Fast Track Your Office 365 Deployment and Beyond
sponsored by OneLogin
WEBCAST: Access this informative webinar, featuring EMM industry leader SOTI, to discover hidden Office 365 roadblocks and headaches, how to automate on-and off-boarding of users in real time to achieve both business agility and security, and how SOTI quickly deployed Office 365 and achieved ROI in just one week.
Posted: 26 Aug 2016 | Premiered: Jul 1, 2016

OneLogin

Above Security Delivers Customer Value
sponsored by Above Security
WEBCAST: It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.
Posted: 23 Aug 2016 | Premiered: Jun 3, 2016

Above Security

Overcoming the challenges presented by mobility in the enterprise
sponsored by IBM MaaS360
WEBCAST: This webinar shows you the granular management controls that you need working at the app and data levels. Learn how to leave the personal user experience unaffected while better securing corporate data.
Posted: 10 Aug 2016 | Premiered: May 25, 2016

IBM MaaS360

Simplify Cloud Access and Provisioning with a Federated Identity Service
sponsored by Radiant Logic, Inc.
WEBCAST: Delve into the identity integration issues that arise when enterprises connect to cloud applications. Discover how to overcome the challenges by creating a place to authenticate users, utilize a global reference image to provision to cloud apps, and simplify the management of users and groups.
Posted: 05 Aug 2016 | Premiered: Feb 19, 2016

Radiant Logic, Inc.

Extending the Value of Mobile Java Apps
sponsored by IBM
WEBCAST: In the age of mobile development, you may want to revisit your strategy for Java and JEE systems. Watch this webinar to get tips on how to implement microservices and APIs, improve user experience, and more. You'll also learn how to improve app integration and leverage cloud-based mobile backend as a service.
Posted: 03 Aug 2016 | Premiered: Aug 3, 2016

IBM

See How Apps are Being Hacked
sponsored by Arxan
WEBCAST: This webcast illustrates some of the ways hackers are breaking into your mobile applications. See real life examples of how mobile app hacking is becoming easier and faster than ever before.
Posted: 11 Jul 2016 | Premiered: Jun 1, 2016

Arxan

Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
sponsored by OneLogin
WEBCAST: In this webinar Garrett Bekker, Senior Analyst for 451 Research explores the current state of identity management and discusses some of the emerging access control technologies that can help address these challenges.
Posted: 07 Jul 2016 | Premiered: Jun 1, 2016

OneLogin

Data Security for the Digital Businesses
sponsored by HPE and IntelĀ®
VIDEO: How do you know if your data is secure? Uncover 3 questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.
Posted: 01 Jul 2016 | Premiered: 03 Feb 2016

HPE and IntelĀ®

Why an EHR is Only as Good as Your Process
sponsored by CloudMine
WEBCAST: With an 82% adoption rate as of 2015, electronic health records (EHRs) are used by nearly every office-based healthcare provider. Discover how EHR developed, the challenges associated with their interoperability, the benefits of integration, and how they can be used today to drive adherence and keep patients healthy.
Posted: 01 Jul 2016 | Premiered: Jun 22, 2016


The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
PODCAST: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 28 Jun 2016 | Premiered: Jun 16, 2016

Citrix

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
WEBCAST: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 28 Jun 2016 | Premiered: Jun 16, 2016

Citrix

5 Security Best Practices Every Developer Needs to Know
sponsored by CloudMine
WEBCAST: Arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.
Posted: 28 Jun 2016 | Premiered: Jun 22, 2016


Success Story Video: State of California
sponsored by Axway
VIDEO: Find out how the State of California was able to about a managed file transfer (MFT) system to centrally manage and monitor secure file transfers across all their web sites and applications for all their agencies.
Posted: 17 Jun 2016 | Premiered: 01 May 2016

Axway

B2B Success Story: E-Commerce Strategy for Thousands of Daily Transactions
sponsored by Axway
WEBCAST: In this video, Shawn Buske discusses the e-commerce system that Jabil chose to handle thousands of daily B2B transactions. Jabil was also able to easily meet SLA compliance and security compliance requirements.
Posted: 08 Jun 2016 | Premiered: Jan 11, 2016

Axway

Customer Story: Implementing Mobility in the Workplace
sponsored by Citrix
VIDEO: Learn how one of the largest healthcare systems in the United States implemented an efficient, secure mobile strategy and increased collaboration. Discover how you can provide your employees the flexibility of working outside of their offices and increase productivity.
Posted: 13 May 2016 | Premiered: 08 Oct 2013

Citrix

Customer Spotlight | blinkbox
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about a VOD service called blinkbox and their struggles finding solid cloud security for their platform. Watch now to see how they remediated their security issues and how they now operate without breach concerns.
Posted: 11 May 2016 | Premiered: 28 Oct 2014

Barracuda Networks

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel

Delivering high performing mobile applications with Cloud
sponsored by IBM
WEBCAST: In this webcast, you will discover how to leverage the cloud to continuously deliver high-performance mobile apps, and integrate these apps with your existing IT systems to source new avenues of revenue and transform your business.
Posted: 12 Feb 2016 | Premiered: Feb 12, 2016

IBM

Update your current Apple and Oracle software now
sponsored by WatchGuard Technologies, Inc.
VIDEO: Watch this video to learn about the latest updates to Mac OSX, iOS 9 and Oracle patch that will keep your network secure.
Posted: 20 Jan 2016 | Premiered: 19 Jan 2016

WatchGuard Technologies, Inc.
1 - 25 of 102 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement