IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
1 - 25 of 432 Matches Previous Page  |  Next Page
7 Key Factors of a Highly Effective Application Protection Solution
sponsored by Arxan
WHITE PAPER: An effective application protection solution is paramount to safeguard the integrity and confidentiality of an application. This whitepaper discusses the key factors that enable an effective application protection solution.
Posted: 30 Jun 2016 | Published: 01 May 2016

Arxan

Balancing Needs of Providers and Patients
sponsored by CloudMine
WHITE PAPER: Don't be one of the organizations that take a haphazard approach to leveraging the invaluable asset of your patients. Discover both sides of the communication divide and what steps to take to improve communication quickly.
Posted: 30 Jun 2016 | Published: 17 Mar 2016


Defeating the Threat Within
sponsored by Forcepoint
WHITE PAPER: Your critical data will be stolen by someone who interacts with your network daily. Accidental or malicious, it will happen and you need the right plan before it happens. Learn from our top security experts the key to evading and understanding malicious user behavior.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Connected Health Cloud Brochure
sponsored by CloudMine
WHITE PAPER: Discover the different facets of a healthcare app development solution that can help your healthcare organization quickly and reliably create apps that are HIPAA compliant.
Posted: 30 Jun 2016 | Published: 30 Jun 2016


Newly Announced Tools For Healthcare App Building
sponsored by CloudMine
WHITE PAPER: Discover the importance of an interoperability engine, cognitive analytics, and developer tools. Learn how to connect with leading big data analytics platforms, utilize cognitive analytics to improve compliance reporting, incorporate wearables into the continuum of care, and more.
Posted: 30 Jun 2016 | Published: 01 Mar 2016


Deciphering the Latest in iOS Open Source Healthcare Software
sponsored by CloudMine
WHITE PAPER: Developing revolutionary apps isn't just a matter of having the best team. Learn about how a newly released healthcare-focused, open source software framework can change the way healthcare app developers build and how they capture clinical research data in real-time.
Posted: 30 Jun 2016 | Published: 23 Mar 2016


Interoperability and the Cloud in Connected Health
sponsored by CloudMine
WHITE PAPER: Learn how to conquer the interoperability, compliance, and security issues holding your organization back from leveraging cloud platforms to develop revolutionary applications.
Posted: 29 Jun 2016 | Published: 29 Jun 2016


A letter from the CEO: Connected Health Cloud Release
sponsored by CloudMine
WHITE PAPER: If you've been struggling to derive meaningful data insights, now you can with a HIPAA-compliant cloud solution that won't break the bank. It connects with big-data analytics platforms to help you gain a better understanding of patient data and take action to improve outcomes (all with impeccable threat detection capabilities).
Posted: 28 Jun 2016 | Published: 01 Mar 2016


Accelerating the Building, Managing, and Deployment of Healhcare Apps
sponsored by CloudMine
WHITE PAPER: Discover how your healthcare organization can reduce initiative time to market by up to 70% and create a multimedia app compatible with almost any device to contain the overflow of patient information that is received every day.
Posted: 28 Jun 2016 | Published: 04 Mar 2016


Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Mobile Solutions for IBM LinuxONE
sponsored by IBM
WHITE PAPER: Delivering the best possible mobile experience is critical to staying competitive. Learn about a solution that combines the open and industry-leadingaspects of Linux with proven qualities of service resulting in the mostscalable enterprise-grade Linux environment.
Posted: 17 Jun 2016 | Published: 31 Aug 2015

IBM

Mobile Application Security Report 2016
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover just how much of your data is being collected and to what extent applications can access your data. Learn precautionary steps you can take to make sure applications aren't grabbing data you don't want them to and make responsible choices when downloading apps.
Posted: 16 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

Axway SecureTransport Enhanced Managed File Transfer Gateway
sponsored by Axway
WHITE PAPER: Handle everything from high-volume automated file transfers between systems, sites and lines of business to user-driven communications and mobile file sharing. Ensure you're ready for high-growth uses cases while maintaining corporate controls and visibility.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Axway

Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.
Posted: 13 Jun 2016 | Published: 30 Jan 2015

Citrix

Empower a Mobile Workforce with Secure App Delivery
sponsored by Citrix
WHITE PAPER: As mobility and the internet create the expectation of immediate access to information from anywhere, IT is challenged with the need to deliver secure application access across any device. Discover how to ensure application security in the mobile trend.
Posted: 10 Jun 2016 | Published: 27 Feb 2015

Citrix

Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER: More than four in ten organizations are in the process of implementing Office 365 or already use it. This infographic gives you important statistics and insights on the top security, encryption and archiving challenges faced while moving to Office 365, based on a survey conducted by UBM Tech.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 08 Jun 2016 | Published: 02 May 2016

Fortinet, Inc.

Proofpoint Advanced Security Platform for Microsoft Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: Safeguard against advanced threats and targeted attacks to your Office 365 users. Gain visibility and threat insights to identify attacks quickly and contain them as early as possible.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

X-Force Cyber Security Intelligence Index  Report
sponsored by IBM
WHITE PAPER: It's clear no industry was immune to cyberattackers in 2015. Discover statistics from last year's cyber threat landscape and see which industries were most affected by cybercrime. Learn how to create an effective cybersecurity strategy to ensure your organizations doesn't show up on next year's report.
Posted: 03 Jun 2016 | Published: 01 May 2016

IBM

Recognize and Respond to Cyber Attacks
sponsored by Verizon
WHITE PAPER: The inability to recognize and react the lead indicators of a cyber attack can be an organization's greatest weakness. Learn how to prepare your organization to recognize and mitigate threats. Accelerate your detection capabilities so breaches can't linger.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Verizon

Mobile First Healthcare
sponsored by MobileIron
WHITE PAPER: It isn't news that the healthcare industry has stringent privacy regulations. Don't let these regulations hold you back from taking adavantage of all that mobility has to offer. Read on to learn about a solution that provides mobile security so healthcare professionals can do their jobs without having to worry about privacy breaches.
Posted: 01 Jun 2016 | Published: 25 May 2016

MobileIron

Flash Storage: Powering the Future of IT
sponsored by IBM
WHITE PAPER: Flash storage not only provides the performance necessary to run next-generation applications – such as cloud, mobile and social systems, and data analytics – but also provides the security necessary to prevent data breaches. See how your enterprise can boost your competitive advantage by leveraging flash today.
Posted: 01 Jun 2016 | Published: 31 Jan 2015

IBM

Real-time Threat Detection: The Financial Industry's Best Friend
sponsored by HID
WHITE PAPER: This white paper explores the effectiveness of real-time malware protection for financial institutions and banking customers. View now and see how this technology can help mitigate risks even from the most sophisticated malware.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

HID

Mobile First Financial Services
sponsored by MobileIron
WHITE PAPER: The financial services industry has found that mobility is the big stake feature that will propel organizations forward or leave them in the dust. Read on to learn about a mobile service designed with the cost and security concerns of the finance industry in mind.
Posted: 31 May 2016 | Published: 25 May 2016

MobileIron
1 - 25 of 432 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement