IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
1 - 25 of 413 Matches Previous Page  |  Next Page
4 Market Trends Driving Mobile Banking
sponsored by HID
WHITE PAPER: Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

HID

Unified Endpoint Management - Security and Productivity for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Discover a UEM solution that provides a single pane of glass to manage and secure, devices and operating systems, whether laptops, smart phones, tablets or any other device.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Citrix

2017 Analyst Report for Application Security Testing
sponsored by IBM
WHITE PAPER: In this report, analysts review 18 application security testing (AST) tools. Learn which ones improve coordination between development and security teams.
Posted: 16 Mar 2017 | Published: 16 Mar 2017

IBM

Solution Brief - Securing the mobile enterprise
sponsored by IBM
WHITE PAPER: Discover a comprehensive portfolio of mobile security systems that address four key mobile security challenges: protecting devices, securing content and collaboration, safeguarding applications and data, and managing access and fraud. The portfolio also includes a layer of security intelligence for advanced threat detection.
Posted: 08 Mar 2017 | Published: 06 Mar 2017

IBM

Unleash the Potential of Windows 10
sponsored by vmware airwatch
WHITE PAPER: Windows 10 is Microsoft's first truly mobile operating system designed to work seamlessly across the unified desktop and mobile devices' platform. Download the infographic to learn how VMware AirWatch® provides the most comprehensive solution to get your organization Windows 10 ready.
Posted: 08 Mar 2017 | Published: 07 Mar 2017

vmware airwatch

The New BYOD: 5 Best Practices for a Productive BYOD Program
sponsored by vmware airwatch
WHITE PAPER: Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Posted: 08 Mar 2017 | Published: 07 Mar 2017

vmware airwatch

EMM Real Benefits in Today's Mobile World
sponsored by vmware airwatch
WHITE PAPER: The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Maximizing IT Security with Configuration Management
sponsored by Puppet
WHITE PAPER: This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including the creation of a Standard Operating Environment (SOE), reporting on and control of configuration drift, enhanced change remediation, and more.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Puppet

The Massive Mobile Migration
sponsored by IBM
WHITE PAPER: The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.
Posted: 03 Mar 2017 | Published: 27 Apr 2016

IBM

Microservices Done Right with API Management
sponsored by Apigee
WHITE PAPER: This white paper explores how important APIs are for managing and securing microservice architectures. Learn about how API management platforms create analytics and reporting capabilities for deep visibility, deliver modern RESTful APIs for legacy services, boost Agile development, expose microservices securely, and more.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Apigee

The Ultimate Guide to Cybersecurity to Drive Innovation
sponsored by Cisco Systems, Inc.
WHITE PAPER: Many developers may find themselves hesitant to build digital products and services for the cloud, web, and mobile because strict federal regulations and the rise of cyberattacks make this a risky endeavor. Discover how to accelerate innovation while still protecting your data and uncover several business cases for cybersecurity.
Posted: 24 Feb 2017 | Published: 31 Dec 2016

Cisco Systems, Inc.

Cloud, Mobility, Big Data: Future Proof Your Organization with Consolidation
sponsored by Matrix42
WHITE PAPER: This white paper explores how to optimize all of your existing workflows and manage them effectively. In the face of growing big data, cloud, and mobile adoption, learn how to leverage a business process automation platform for hybrid environments that facilitates integrations, boosts compliance, and enhances reporting.
Posted: 22 Feb 2017 | Published: 31 Dec 2015

Matrix42

Empowering the Mobile Workforce with MDM and EMM
sponsored by Snow Software
WHITE PAPER: This white paper examines a platform that provides both mobile device management (MDM) and enterprise mobile management (EMM) capabilities. Discover how to take your MDM and mobile app management to the next level by unlocking security features that allay IT concerns, creating transparency and insight into device and app use, and more.
Posted: 21 Feb 2017 | Published: 31 May 2016

Snow Software

10 Key Findings From the Ponemon Institute’s Mobile & IoT Application Security Testing Study
sponsored by IBM
WHITE PAPER: This article reveals 10 key findings from Ponemon's "2017 State of Mobile & Internet of Things (IoT) Application Security Study."
Posted: 17 Feb 2017 | Published: 17 Feb 2017

IBM

Enterprise Mobility Platform with Enterprise-Grade Security
sponsored by PowWow
WHITE PAPER: Explore how to accelerate mobile development, connect new apps to third party data sources and APIs, and modernize any enterprise app or workflow. Discover how to leverage existing APIs and containers to design, build, and deploy personalized, intelligent, and secure apps that run anywhere, on any device, and on any OS.
Posted: 16 Feb 2017 | Published: 31 Dec 2016


Manage Application Security Risks to Help Protect your Organization’s Critical Data
sponsored by IBM
WHITE PAPER: Effective application security is really a matter of managing risk. Learn how to develop application security when you build an asset inventory, assess the business impact, and 3 more ways to mitigate risks to your most crucial assets.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

IBM

Run Skype for Business as a Secure Virtual App with a Great User Experience
sponsored by Citrix
WHITE PAPER: Discover how to deliver secure, high-performance UC&C for your organization by virtualizing Skype for Business with the method illustrated. Read on to learn how this app virtualization will improve security and manageability of Skype, as well as how to evade the potential pitfalls traditional virtualization methods incur.
Posted: 25 Jan 2017 | Published: 31 Dec 2016

Citrix

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

State of Software Security: A Developer's Viewpoint
sponsored by Veracode, Inc.
WHITE PAPER: Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

How to Build a Robust Application Security Governance Framework
sponsored by Veracode, Inc.
WHITE PAPER: Discover not only how to simplify, but also streamline application security. Learn how to ensure that everyone is in-sync and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

App Security Can’t Happen Without Developers
sponsored by Veracode, Inc.
WHITE PAPER: In this report from Forrester, learn how to guide developers and security pros to deliver secure apps. Gain key takeaways that will help your developer team and security team work together to mitigate app security threats before they appear.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Veracode, Inc.

Why RAD is Right for Mobile and Web Front-End Development
sponsored by OutSystems
WHITE PAPER: Discover how to deliver agile, responsive front-end applications with rapid app development (RAD). Read on to meet today's dramatically digital customer journey by upgrading your legacy stacks and mobile app strategy, learning how to overcome the challenges in adopting an open-source stack, and more.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

OutSystems

Trustwave Global Security Report
sponsored by SingTel
WHITE PAPER: Discover in-depth analysis and organized statistics from breach investigations, incident reports and vulnerability research from around the world. Use this report as a business plan to learn what cybercriminals are plotting now and what you could face in the future.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: In this analyst report, learn about how 19 application security testing (AST) vendors fared in a comparison of their strengths and cautions. Discover which one is right for your organization.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

IBM
1 - 25 of 413 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement