IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
1 - 25 of 436 Matches Previous Page  |  Next Page
Shadow Data: Why Traditional Security Leaves Your Organization Vulnerable
sponsored by Elastica
WHITE PAPER: This exclusive white paper reviews Shadow Data trends to provide insights into data security and compliance issues.
Posted: 01 Sep 2015 | Published: 29 Jul 2015

Elastica

Think Like A Cybercriminal: Presenting the Mobile Security Landscape
sponsored by ControlEmail
WHITE PAPER: This white paper examines the mobile email threat landscape and how hackers are taking advantage of the flaws in mobile security strategies. Continue reading to get inside the mind of a hacker to learn how you can fortify your mobile security approach.
Posted: 28 Aug 2015 | Published: 31 Dec 2014

ControlEmail

Empower Your Workforce with More Secure Mobility
sponsored by Citrix and Google
WHITE PAPER: This white paper examines the application security architecture of Google Chromebooks and how they protect against emerging security threats. View now to learn the pros and cons of these devices for your security strategy.
Posted: 27 Aug 2015 | Published: 18 Mar 2015

Citrix and Google

Unified Network Solutions Case Study: Kettering Health Network
sponsored by F5 Networks
WHITE PAPER: This white paper demonstrates how the KHN was able to achieve access to its electronic medical records system and other apps for its remote users. Read on here to key into the benefits of a unified network solution.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

F5 Networks

Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about the prevalence of jailbroken iOS devices and how to protect against jailbroken device risks.
Posted: 25 Aug 2015 | Published: 24 Jun 2015

Lookout

Managing App Sideloading Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about how attackers sideload iOS apps and how to mitigate those threats.
Posted: 25 Aug 2015 | Published: 19 Aug 2015

Lookout

Demand Secure and Durable Enterprise Performance with Tablets
sponsored by Panasonic - Microsoft
WHITE PAPER: This white paper serves as a guide for how to find tablets that will adapt to your shifting enterprise application demands. Read on here to evaluate several rugged tablet platforms designed to boost mobility and productivity.
Posted: 25 Aug 2015 | Published: 28 Feb 2014

Panasonic - Microsoft

Top 5 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013

HID

Protect Your Business Critical Apps from Compromise
sponsored by Onapsis
WHITE PAPER: This white paper describes how, with technologies ranging from vulnerability management to advanced threat protection, you can make sure your SAP applications stay secure.
Posted: 18 Aug 2015 | Published: 31 May 2015

Onapsis

The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: This report examines the current state of security threats to iOS and Android devices in the workplace.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Lookout

Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

Developing Advanced Applications in Your Enterprise with Optimum Server Applications
sponsored by IBM
WHITE PAPER: This e-book introduces a solution for developing the advanced applications and gives an overview of the Liberty profile and its tools. This book also demonstrates the use of multiple open source frameworks or toolkits with the Liberty profile server, including Maven, MongoDB, Spring, JPA, Arquillian, Wicket, and others.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

IBM

Configuring and Deploying Open Source with WebSphere Application Server Liberty Profile
sponsored by IBM
WHITE PAPER: Enterprises are always searching hard for a capable platform for developing and testing web and OSGi applications. This e-book demonstrates the use of multiple open source frameworks or toolkits with the Liberty profile server, including Maven, MongoDB, Spring, JPA, Arquillian, Wicket, and others.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

IBM

Guide for Developers: WebSphere Application Server Liberty Profile
sponsored by IBM
WHITE PAPER: This e-book highlights how best to configure enterprise application security to fit your organization, and serves as an outline for using the WebSphere Application Server V8.5 Liberty profile along with the WebSphere Application Server Developer Tools for Eclipse.
Posted: 17 Aug 2015 | Published: 10 Aug 2015

IBM

A Simple Guide to Successful Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses the importance of penetration testing and presents six steps to doing it effectively.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Managing Threats and Remediating Risk for State of Vermont Applications
sponsored by Core Security Technologies
WHITE PAPER: In this case study, the Vermont state government struggles to detect and mitigate all vulnerabilities in the applications that handle its sensitive data.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Financial MDM: Bringing Secure BYOD to You
sponsored by IBM
WHITE PAPER: This white paper examines the growth of bring your own device (BYOD) culture in financial services, and outlines the host of security challenges IT finance departments face when implementing MDM. Click through to address your financial mobility concerns with a cloud-based solution.
Posted: 13 Aug 2015 | Published: 31 Dec 2014

IBM

The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 13 Aug 2015 | Published: 25 Feb 2015

IBM

Manufacturing Goes Mobile: Highlights in MDM and Application Security
sponsored by IBM
WHITE PAPER: This white paper surveys the use of mobile device management (MDM) in the manufacturing industry. Read on to learn how you can leverage MDM to improve operational efficiency and bottom-line benefits.
Posted: 12 Aug 2015 | Published: 31 Dec 2014

IBM

Mobile Enterprise Apps: Expert Tips to Eliminate Top Security Risks
sponsored by IBM
WHITE PAPER: In this white paper, learn the key security dangers of mobile apps in the enterprise and discover expert tips on how to eliminate them in your app-driven business.
Posted: 12 Aug 2015 | Published: 12 Aug 2015

IBM

Mobile is the New Playground for Thieves: How to Protect Against Mobile Malware
sponsored by IBM
WHITE PAPER: In this white paper, you'll uncover how to move towards a proactive mobile security strategy to detect, analyze, and remediate today's mobile threats.
Posted: 12 Aug 2015 | Published: 13 Jul 2015

IBM

Make Android Work for Your Enterprise: Expert Tips for EMM Strategy
sponsored by IBM
WHITE PAPER: In this white paper, you'll discover best practices for using enterprise mobility management (EMM) securely on both corporate and employee-owned Android devices. Read on to learn how to make Android work for your enterprise.
Posted: 12 Aug 2015 | Published: 12 Aug 2015

IBM

App Refactoring Update: Who's New to the Landscape?
sponsored by StarMobile
WHITE PAPER: In this e-guide, Gabe Knuth surveys the current app refactoring market, and examines how one company figures into the big picture. Click here to read on about app refactoring services today.
Posted: 12 Aug 2015 | Published: 12 Aug 2015

StarMobile

Mobilize Your Virtual Enterprise Applications with 4 Steps
sponsored by StarMobile
WHITE PAPER: Learn how next-generation remote computing protocols accelerate your company's application mobilization and improve user experience. Continue reading to access advice on implementing successful enterprise mobilization.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

StarMobile
1 - 25 of 436 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement