IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
1 - 25 of 388 Matches Previous Page  |  Next Page
Maximizing The Value of Web Application Firewalls
sponsored by Akamai
WHITE PAPER: In this white paper, learn some best—practices for managing your web application firewall (WAF) such as 3 basic rules for running your WAF when it's in 'alert mode', why data analytics is key to building an intelligent WAF, and more.
Posted: 21 Apr 2017 | Published: 29 Apr 2016

Akamai

Native Hybrid Cloud: A Turnkey Pivotal Cloud Foundry Developer Platform
sponsored by Dell EMC
WHITE PAPER: Access now to learn how to boost app developer productivity, empower developers with self-service, and eliminate the cost, time, and complexity of building and maintaining an in-house cloud infrastructure while navigating the cultural shift to DevOps with a native hybrid cloud platform.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Dell EMC

Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

Improving Application Security and Performance With Cloud Firewalls
sponsored by Akamai
WHITE PAPER: This whitepaper dives into the biology of web and DDoS attacks. Learn how a suite of systems can provide you with a cloud-based web application firewall to protect your infrastructure from any threat.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Akamai

4 Market Trends Driving Mobile Banking
sponsored by HID
WHITE PAPER: Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

HID

Solution Brief - Securing the mobile enterprise
sponsored by IBM
WHITE PAPER: Discover a comprehensive portfolio of mobile security systems that address four key mobile security challenges: protecting devices, securing content and collaboration, safeguarding applications and data, and managing access and fraud. The portfolio also includes a layer of security intelligence for advanced threat detection.
Posted: 08 Mar 2017 | Published: 06 Mar 2017

IBM

Maximizing IT Security with Configuration Management
sponsored by Puppet
WHITE PAPER: This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including the creation of a Standard Operating Environment (SOE), reporting on and control of configuration drift, enhanced change remediation, and more.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Puppet

The Massive Mobile Migration
sponsored by IBM
WHITE PAPER: The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.
Posted: 03 Mar 2017 | Published: 27 Apr 2016

IBM

Empowering the Mobile Workforce with MDM and EMM
sponsored by Snow Software
WHITE PAPER: This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.
Posted: 21 Feb 2017 | Published: 31 May 2016

Snow Software

Enterprise Mobility Platform with Enterprise-Grade Security
sponsored by PowWow
WHITE PAPER: Explore how to accelerate mobile development, connect new apps to third party data sources and APIs, and modernize any enterprise app or workflow. Discover how to leverage existing APIs and containers to design, build, and deploy personalized, intelligent, and secure apps that run anywhere, on any device, and on any OS.
Posted: 16 Feb 2017 | Published: 31 Dec 2016


Run Skype for Business as a Secure Virtual App with a Great User Experience
sponsored by Citrix
WHITE PAPER: Discover how to deliver secure, high-performance UC&C for your organization by virtualizing Skype for Business with the method illustrated. Read on to learn how this app virtualization will improve security and manageability of Skype, as well as how to evade the potential pitfalls traditional virtualization methods incur.
Posted: 25 Jan 2017 | Published: 31 Dec 2016

Citrix

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

State of Software Security: A Developer's Viewpoint
sponsored by Veracode, Inc.
WHITE PAPER: Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

How to Build a Robust Application Security Governance Framework
sponsored by Veracode, Inc.
WHITE PAPER: Discover not only how to simplify, but also streamline application security. Learn how to ensure that everyone is in-sync and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

App Security Can’t Happen Without Developers
sponsored by Veracode, Inc.
WHITE PAPER: In this report from Forrester, learn how to guide developers and security pros to deliver secure apps. Gain key takeaways that will help your developer team and security team work together to mitigate app security threats before they appear.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Veracode, Inc.

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Manage Risk by Protecting the Apps and Data that Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Protecting the 3 Areas of Secure Mobility
sponsored by BlackBerry
WHITE PAPER: Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

How to Identity Web Threats in Real-Time
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how you can achieve real-time web protection and dynamic malware scanning in your existing security infrastructure. Learn how you can quickly enforce network access policies, instantly report on web threats and user activity, and more.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

Secure and Accelerate User Access to Web Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

Deliver Complete Security for Enterprise Web Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to fully protect web applications without adversely affecting web performance for your users. Address all of today's critical web vulnerabilities while at the same time accelerating web applications for optimal productivity.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

The New BYOD: 5 Best Practices for a Productive BYOD Program
sponsored by vmware airwatch
WHITE PAPER: Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Posted: 08 Mar 2017 | Published: 07 Mar 2017

vmware airwatch

EMM Real Benefits in Today's Mobile World
sponsored by vmware airwatch
WHITE PAPER: The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: In this analyst report, learn about how 19 application security testing (AST) vendors fared in a comparison of their strengths and cautions. Discover which one is right for your organization.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

IBM
1 - 25 of 388 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement