IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityWhite Papers (View All Report Types)
1 - 25 of 395 Matches Previous Page  | Next Page
How Alert Logic Enabled bfw Advertising to Better Secure Clients' Websites
sponsored by Alert Logic
WHITE PAPER: This white paper describes how bfw Advertising, an agency that builds and manages websites and applications for B2B clients, worked with Alert Logic to implement a Web Application Firewall (WAF) to filter out suspicious web traffic.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

Build a more-secure web infrastructure with DataPower
sponsored by IBM
WHITE PAPER: This white paper explains the importance of building a highly secure web application infrastructure, due to the growing amount of confidential business information accessible through devices.
Posted: 22 Oct 2014 | Published: 01 Aug 2012

IBM

Comparing 6 Web Application Firewall Solutions
sponsored by Fortinet, Inc.
WHITE PAPER: This helpful resource from NSS Labs provides detailed comparisons and analyses of web application firewalls from Barracuda, Citrix, F5, Fortinet, Imperva, and Sangfor.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Fortinet, Inc.

How to Deliver Attribute-Driven Authorization with Your Current Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper introduces a federated identity service that delivers smarter, finer-grained authorization without uprooting your current identity infrastructure, enabling you to reap the benefits of attribute-driven access control by federating identities and creating dynamic groups.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Radiant Logic, Inc.

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Shavlik Patch: Simplified Application Patch Management for Microsoft System Center
sponsored by Shavlik Technologies
WHITE PAPER: This exclusive whitepaper explores a patch management solution that will reduce your security risks from unpatched, non-Microsoft third-party applications.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Shavlik Technologies

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

API Security and Management
sponsored by CA Technologies.
WHITE PAPER: This whitepaper examines the key security and management considerations that need to be taken when looking for an API management solution, such as data security capabilities, POC evaluation and feature breadth.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

CA Technologies.

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Five Security Considerations in the Mobile Age
sponsored by IBM
WHITE PAPER: This white paper enumerates five security considerations for enterprises in the mobile age and provides a thorough introduction to enterprise mobile applications.
Posted: 07 Oct 2014 | Published: 31 Dec 2012

IBM

Combining the Flexibility of Public-Cloud Apps with the Security of Private-Cloud Data
sponsored by BitGlass
WHITE PAPER: This white paper explores technologies that combine the flexibility of public cloud apps like Salesforce and Box with the security and compliance of a private cloud.
Posted: 07 Oct 2014 | Published: 07 Oct 2014


Security in the New Mobile Ecosystem – A Ponemon Institute Study
sponsored by Raytheon Trusted Computer Solutions
WHITE PAPER: This study takes a look at over 600 IT security professionals who are highly involved in their organizations' mobile and enterprise security activities, and explains the current security status of mobile devices in the workplace.
Posted: 01 Oct 2014 | Published: 31 Aug 2014

Raytheon Trusted Computer Solutions

Five Steps for a Winning Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: The landscape of devices, operating systems, and touch points continuously grows in complexity – resulting in a security nightmare for application developers. View this informative white paper now to find out the 5 steps for a winning application security program.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Veracode, Inc.

Mobile Fraud Trends and Impact
sponsored by iovation, Inc.
WHITE PAPER: Device intelligence uncovers hidden layers of risk in mobile transactions from both web browsers and mobile applications. Get his report to learn more about mobile fraud—risks, insights and priorities.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Fighting Mobile Fraud: Protecting Businesses and Consumers from Cybercrime
sponsored by iovation, Inc.
WHITE PAPER: This white paper highlights the continuous fight against mobile fraud, and introduces a device-based solution that protects businesses from online threats in real-time.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: In this white paper, explore the endless possibilities of implementing mobile initiatives into your business while keeping security initiatives in mind.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CA Technologies.

Enterprise Security: Attacking the problems of application and mobile security
sponsored by Orasi
WHITE PAPER: Mobile devices, applications, and the network infrastructure are particularly vulnerable to attack and intrusion – and can all too often be the weak link in an otherwise secure enterprise infrastructure. This in-depth resource dives into trends in enterprise security, focusing on mobile systems and malware.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Orasi

APIs, Mobile Apps, and the Enterprise: Teaming Up for Better Consumer Health
sponsored by Intel® Services
WHITE PAPER: While people are ready to buy and use technology for health benefits, some organizations are slow to take advantage of mobile technologies due to concerns about sharing sensitive data. This exclusive paper overviews how businesses and health organizations are using APIs to provide better patient and consumer experiences.
Posted: 19 Sep 2014 | Published: 31 May 2014

Intel® Services

Consolidating Remote Servers and Storage for Security, Efficiency
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Access this white paper to find out how to decouple storage from its server over any distance and be available as if it were local to applications at the edge in remote offices.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Riverbed Technology, Inc.

The Hidden Risks Behind Mobile Application Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper provides the findings on mobile application security, based on more than 2,000 mobile applications from over 600 companies.
Posted: 15 Sep 2014 | Published: 01 Feb 2014

Hewlett-Packard Company

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: This white paper highlights the importance of IAM strategies complying with regulations to ensure strong security.
Posted: 11 Sep 2014 | Published: 01 Apr 2014

IBM

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies
1 - 25 of 395 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement