IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityWhite Papers (View All Report Types)
1 - 25 of 341 Matches Previous Page  | Next Page
Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

Ensuring Security for your E-Mail Applications
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative article explores a top-tier email security strategy and how it utilizes advanced malware protection to prevent devastating security breaches.
Posted: 22 Apr 2014 | Published: 27 Feb 2014

Cisco Systems, Inc.

HIPAA Compliance: Sign on to Robust Access Controls
sponsored by Imprivata
WHITE PAPER: View this comprehensive white paper to learn how you can reduce the complexities of HIPAA compliance with single sign-on (SSO) technology.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Imprivata

Mobile Threat Report 2014
sponsored by Webroot
WHITE PAPER: The Webroot® Mobile Threat Report provides an overview of the risks and trends of the mobile space, based on research and analysis conducted by the Webroot Mobile Threat Research team.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Webroot

Design Security Policies For #GenMobile
sponsored by Aruba Networks
WHITE PAPER: This white paper highlights the 4 areas that must be addressed when providing secure, reliable access to business applications for mobile users. Click through to explore the essential tools you need for this strategy.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

Aruba Networks

Gaming Company Uses Cloud Infrastructure for Top Performance
sponsored by IBM
WHITE PAPER: In this brief case study, learn how KUULUU -- an interactive gaming company -- leveraged an Infrastructure-as-a-Service (IaaS) platform that could adjust to their dynamic infrastructure needs, so they didn't have to worry about downtime or security, enabling them to focus on their core mission.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

IBM

Cisco: Scaling Application Vulnerability Management Across the Enterprise
sponsored by IBM
WHITE PAPER: This case study reveals the solution that one organization chose to help improve application security testing efficiencies at a reduced cost.
Posted: 15 Apr 2014 | Published: 28 Feb 2013

IBM

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys

Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper highlights the benefits of a federated identity service that can help you improve efficiencies, reduce risks, and maximize ROI.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This informative guide explores best practices for choosing a Web application scanning solution.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

Silver Peak Positioned as a Leader in 2014 Magic Quadrant for WAN Optimization
sponsored by Silver Peak
WHITE PAPER: This informative paper takes an in-depth look at today's WAN optimization market, comparing and contrasting the strengths and weaknesses of the major vendors' offerings.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Silver Peak

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Automating the SANS 20 Critical Security Controls
sponsored by Qualys
WHITE PAPER: This guide explores security automation and how you can ensure system security with 4 main strategies.
Posted: 10 Apr 2014 | Published: 31 Mar 2013

Qualys

The Key to Seamless SSO
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

The New Workplace: Supporting Bring your own device
sponsored by IBM
WHITE PAPER: This paper explores how organizations can derive business value in the BYOD era, while still providing a security-rich IT infrastructure and consistent service levels.
Posted: 08 Apr 2014 | Published: 30 Nov 2012

IBM

The Next Generation in Application Monitoring
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this resource to discover the 3 major components to application security that will best keep your assets protected across the network.
Posted: 08 Apr 2014 | Published: 31 May 2012

Hewlett-Packard Limited

SANS Survey on Application Security Programs and Practices
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues.
Posted: 04 Apr 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Mobile Application Security Study
sponsored by Hewlett-Packard Company
WHITE PAPER: In this resource, unveil the major vulnerabilities created when mobile application developers speed through to meet deadlines instead of integrating top security measures.
Posted: 04 Apr 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Fortify Your App
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief white paper to learn the biggest mobile application security shortfalls. Click now to uncover 3 steps to take to help you boost your defenses.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Hewlett-Packard Company

How XenApp and XenDesktop Dramatically Simplify Data Protection, Access Control, and other Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Tips To Improve The Mobile App Experience Over Wi-Fi
sponsored by Aruba Networks
WHITE PAPER: This informative white paper discusses how, with a little upfront planning and some smart technology, you can significantly improve the quality of your users' mobile application experience on corporate Wi-Fi networks.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Aruba Networks

Deliver Application Services Without Constraints
sponsored by F5 Networks
WHITE PAPER: Modern organizations need to develop and deliver applications in a timely, secure manner. Unfortunately, network architectures just haven't kept up with the rapid pace of application change, making app delivery time-consuming, costly, and resource-intensive. In this white paper, discover how to overcome these constraints with a new delivery model.
Posted: 02 Apr 2014 | Published: 30 Nov 2013

F5 Networks

Selecting a Next-Generation Firewall: Topic 10 Considerations
sponsored by Cisco
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 01 Apr 2014 | Published: 28 Feb 2014

Cisco
1 - 25 of 341 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement