IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
1 - 25 of 461 Matches Previous Page  |  Next Page
Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

Five Signs It’s Time for Mobile Workspace Delivery
sponsored by Citrix
WHITE PAPER: Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.
Posted: 25 Aug 2016 | Published: 29 Jul 2016

Citrix

The Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business ApplicationsThe Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business Applications
sponsored by Onapsis
WHITE PAPER: Discover how SAP implementations have transformed through each technology trend such as cloud, mobile, big data and IoT. Learn why securing SAP applications is critical to accelerate the adoption of these new technology paradigms and to enable companies to realize the maximum value from their investment in SAP solutions.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

Account Takeover How Hacking Happens in 2016
sponsored by IMMUNIO, Inc.
WHITE PAPER: This white paper helps you understand what's inside the head of a modern cybercriminal and the techniques they use to steal your hard earned data. Through this understanding, you'll be able to improve your security posture and reduce the likelihood of a breach quickly.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

Manage risk by protecting apps, data and usage
sponsored by Citrix
WHITE PAPER: This white paper teaches you best practices to control apps and modern methods to secure your mobile workforce. Discover how to assure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

Strategy Guide for Securing the SAP Landscape
sponsored by Onapsis
WHITE PAPER: Your organization should be thinking about how best to protect SAP systems. Learn how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.
Posted: 24 Aug 2016 | Published: 01 Jun 2016

Onapsis

Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

IBM

Day in the Life of a Security Admin
sponsored by RSA Softcat
WHITE PAPER: Luckily for your CISO, it's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements directed by the CISO for each application for any user, from anywhere, to anything.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Onapsis Research Labs: SAP Systems Security Analysis
sponsored by Onapsis
WHITE PAPER: This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 22 Aug 2016 | Published: 29 Feb 2016

Onapsis

Transform your "Good Backup" to Efficient App Availability And Recovery
sponsored by Dell, Inc.
WHITE PAPER: Discover a data protection solution with recovery options and tools that enable enterprises to achieve optimal application availability and fast restores. This single solution can provide your enterprise with the abilities to centralize data protection and recovery across your environment, recover from public cloud storage providers, and more.
Posted: 22 Aug 2016 | Published: 31 May 2016

Dell, Inc.

Information Security and Data Privacy Practices
sponsored by Gigya
WHITE PAPER: Explore several information security and data privacy practices that will enable you to better protect your data. Topics discussed include infrastructure, data security, compliance, privacy, and more.
Posted: 18 Aug 2016 | Published: 29 Jul 2016

Gigya

Advanced Persistent Threats and the Case for a Security Intelligence and Response Program
sponsored by Above Security
WHITE PAPER: Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

Above Security

Application Defense In Depth
sponsored by IMMUNIO, Inc.
WHITE PAPER: The best security solutions for web applications build a layer of protection inside and around your apps. Learn how to control access, monitor activity and clean-up input to your applications. Paint an accurate picture of your threat environment to get actionable reports when vulnerabilities are found within your applications.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

Comparing App Security Strategies: WAFs vs. RASP
sponsored by IMMUNIO, Inc.
WHITE PAPER: Examine the current threat landscape for web applications and the approaches you should take to secure those applications. Uncover a comparison of one of the most common approaches – Web Application Firewalls (WAFs) - with the most recent addition to the application protection arsenal, Run-Time Application Self-Protection (RASP).
Posted: 16 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

Optimize Application Life Cycle with a Hybrid Cloud Strategy
sponsored by NetApp
WHITE PAPER: In this white paper, you will discover how to create a seamless app development process by leveraging a hybrid cloud strategy. Access now to uncover a 3-phase approach to a faster app lifecycle.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

NetApp

Protect Your Websites and Web Applications from Downtime and Data Theft
sponsored by Akamai
WHITE PAPER: This white paper teaches you how to put a security strategy in place that lets you expand your business without constantly watching the door for intruders. Learn how to reduce your risk for a cyberattack, but also maintain performance if a cyberattack should hit.
Posted: 12 Aug 2016 | Published: 01 Jul 2016

Akamai

Lifecycle Management Best Practices for Mobile Apps
sponsored by IBM
WHITE PAPER: This white paper explores the role of app security in mobile app lifecycle management. From design through deployment, learn about the proactive best practices that can simplify and strengthen the development process.
Posted: 11 Aug 2016 | Published: 31 Mar 2016

IBM

Infographic: Top Use Cases for App Virtualization
sponsored by Citrix
WHITE PAPER: Finding FIPS compliant and Common Criteria certified app virtualization tools can help deliver end-to-end security and protection. Discover what else you can do with app virtualization to enable a secure, cost-effective, mobile, and simplified enterprise.
Posted: 08 Aug 2016 | Published: 08 Aug 2016

Citrix

Market Guide for Merchant and Acquirer Tokenization of Payment Card Data
sponsored by Vormetric
WHITE PAPER: The tokenization of sensitive data is a key component in the ensuring of payment system security. Chief Information Security Officers at cardacceptors and payment processors should use this Market Guide to choose the most appropriate products for their tokenization projects.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Vormetric

Ponemon Institute Application Security Risk Management Study
sponsored by IBM
WHITE PAPER: This report shows you the results of the recent Ponemon Institute study entitled "How to Make Application Security a Strategically Managed Discipline". Inside, you'll see why many organizations are falling short of adequate application security and learn how you might patch your own application security vulnerabilities.
Posted: 27 Jul 2016 | Published: 01 Mar 2016

IBM

10 REASONS TO TEST, NOT GUESS
sponsored by Trustwave
WHITE PAPER: This infographic gives you 10 reasons you should test, not guess the strength of your security. Create a testing plan based on these 10 reasons and strengthen your security posture through more informed decision making.
Posted: 21 Jul 2016 | Published: 31 Dec 2015

Trustwave

Red Hat Product Security Risk Report 2015
sponsored by Red Hat
WHITE PAPER: Tools that detect and address critical vulnerabilities before they go public are crucial to empowering developers. Explore reasons you should implement open source tools with security in mind.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Red Hat

App Development Strategies fit for Governments
sponsored by Red Hat
WHITE PAPER: Application development, deployment, and ongoing management doesn't have to be difficult. Discover secure ways to implement DevOps practices using open-source tools.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Red Hat

Get Your Apps Back in Business
sponsored by Dell Software
WHITE PAPER: Discover a cloud-era data protection solution that combines rapid snap technology and recovery repository to back up, replicate, verify, and restore your data anywhere. Read on and explore how you can eliminate downtime and protect your critical workloads with this single, unified solution.
Posted: 13 Jul 2016 | Published: 31 Dec 2015

Dell Software

Case Study: Defending Mobile Apps from Attacks
sponsored by Arxan
WHITE PAPER: Discover how a leading medical device manufacturer hardened their application protection strategy to allow physicians to securely read and monitor patient data, as well as securely control medical devices using mobile applications. Learn how you can gain similar security benefits for your own applications.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

Arxan
1 - 25 of 461 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement