IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
26 - 50 of 439 Matches Previous Page  |  Next Page
Mobilize Your Virtual Enterprise Applications with 4 Steps
sponsored by StarMobile
WHITE PAPER: Learn how next-generation remote computing protocols accelerate your company's application mobilization and improve user experience. Continue reading to access advice on implementing successful enterprise mobilization.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

StarMobile

Cloud-Based MDM Makes the Grade in Education
sponsored by IBM
WHITE PAPER: Colleges and K-12 school districts across the country are embracing mobility in education. This white paper examines several smart mobile and app management cloud-based practices that give schools and educational institutions the tools they need to set their students up for success in the new Mobile Age.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

IBM

FICO and Red Hat Seed the Cloud with Enterprise Innovations
sponsored by Red Hat
WHITE PAPER: Platform-as-a-service tools have become the market's leading solution for business rules management. This white paper examines a new and emerging PaaS cloud computing solution (one of which features promises any time, on-demand access to a full-service cloud-based application platform). Read on here to learn about receiving the following benefits.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

Cloud Computing Solutions to App Delivery Issues
sponsored by Red Hat
WHITE PAPER: This white paper highlights one PaaS solution in particular, complete with automation technologies built on secure cloud architecture. Read on to learn how PaaS could make life easier for your application developers, IT operations staff, enterprise architects, and more.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Red Hat

Bolstering Network Security in a BYOD World
sponsored by VSS Monitoring
WHITE PAPER: As the world becomes more interconnected, the line between personal and professional continues to blur. This white paper examines a monitoring platform that will enable you to comprehensively view all network traffic to your organization's security toolset. Read on to learn how you can optimize your network for increased BYOB mobile traffic.
Posted: 05 Aug 2015 | Published: 31 Dec 2014

VSS Monitoring

Mobility-as-a-Service: See What's New in Workforce Mobility
sponsored by Sprint
WHITE PAPER: High device prices and complex management requirements can fall short when you're in the process of rethinking your mobility. This white paper examines a new mobility-as-a-service platform. Read on to learn how you can receive new and improved wireless service benefits.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

Sprint

Secure application delivery for a mobile workforce
sponsored by Citrix
WHITE PAPER: Access this white paper to discover two technologies that provide a complete, end-to-end-mobility solution by managing both application types. Find out how one makes it simple to mobilize Windows applications for use on any mobile device and how the other manages, secures and deploys native mobile apps.
Posted: 03 Aug 2015 | Published: 28 Feb 2014

Citrix

SDN 102: Tune into Application Delivery Network Services
sponsored by Citrix
WHITE PAPER: IT organizations need to respond rapidly to the ever-changing needs of their users for resources to support their business applications. This white paper will describe some of the models for SDNs, identify some of the associated use cases and describe methods to successfully integrate application delivery network services.
Posted: 31 Jul 2015 | Published: 31 Jul 2015

Citrix

Safeguarding Data and the Mobile Enterprise
sponsored by IBM
WHITE PAPER: As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

IBM

The 10 Keys to Seeing 20/20 on Your EMM Vision
sponsored by Accelerite
WHITE PAPER: Mobile devices, BYOD initiatives, cloud applications, and new technologies have ushered in fundamental changes in the way corporate IT needs to think about and manage endpoints in businesses, schools, healthcare, and beyond. This white paper examines the must-have strategies for IT mobility management implementation in your organization.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Accelerite

Defend Your Backend Mobile Web Properties
sponsored by Citrix
WHITE PAPER: This white paper explains how to extend coverage to your organization's mobile devices on the front end of mobile micro apps, while protecting the backend components of your web solutions. Read on to examine how BYOD can improve your enterprise.
Posted: 28 Jul 2015 | Published: 31 Jan 2015

Citrix

10 Essential Elements for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 28 Jul 2015 | Published: 15 Oct 2014

Citrix

The Definitive Guide to Mobile Application Management
sponsored by Apperian, Inc.
WHITE PAPER: Learn how to get your mobile apps securely distributed and rapidly adopted by 100% of target users, including BYOD, contractors, dealers and partners, while driving the highest possible levels of mobile app ROI.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

Apperian, Inc.

Re-Thinking Your Data Flow Transmission for Security Risk and Compliance
sponsored by Axway
WHITE PAPER: In this white paper, discover why it's best to ditch file transfer protocol-based and personal file sync and share tools that increase risk for a data breach. Access now and discover how a managed file transfer approach offers modern, secure data flow transmission.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Axway

Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: This white paper explores how to use device security telemetry to form a digital firmware fingerprint on each device to identify when one is vulnerable or has been compromised through jailbreak.
Posted: 22 Jul 2015 | Published: 24 Jun 2015

Lookout

8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Kony

Top 10 Security Considerations for the Internet of Things
sponsored by Axway
WHITE PAPER: Access this white paper and discover how IoT is shaping the landscape of application lifecycle management, logic, and data-access chores. In addition, learn 10 top security considerations IoT and how these can impact your software development projects.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

Axway

Strong Authentication without a Password
sponsored by Symantec Corporation
WHITE PAPER: This infographic explains how you can achieve strong authentication that's based on more than a simple password.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

Symantec Corporation

Securing Your Customers Online
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses how you can easily add a second level of authentication to your web applications without inconveniencing your users.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation

Tablets That Work for Business
sponsored by Dell, Inc.
WHITE PAPER: In this informative white paper, explore the four main concerns with tablets in work environments today.
Posted: 17 Jul 2015 | Published: 29 Aug 2014

Dell, Inc.

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper debunks the top 10 misconceptions about mobile device management and security.
Posted: 16 Jul 2015 | Published: 16 May 2014

IBM

Intro to Mobile App Management: App Security from the Onset
sponsored by IBM
WHITE PAPER: This white paper, the first in an installment of three, explores how to create a successful app security strategy from the beginning.
Posted: 16 Jul 2015 | Published: 24 Jun 2015

IBM

Top 10 API Security Considerations
sponsored by Axway
WHITE PAPER: This white paper explores the top 10 considerations for security architects looking to tackle one of today's biggest security challenges: APIs.
Posted: 16 Jul 2015 | Published: 16 Mar 2015

Axway

Defending Against Cloud Security Threats
sponsored by Data#3
WHITE PAPER: This white paper is a comprehensive guide to securing your cloud and virtual infrastructure using Microsoft Azure.
Posted: 16 Jul 2015 | Published: 28 Feb 2015

Data#3

Selecting a Next-Generation Firewall: Top 10 Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, uncover 10 considerations to weigh when evaluating next-generation firewall tools to ensure that the solution you select best protects your networks from today's broad range of risk.
Posted: 16 Jul 2015 | Published: 28 Feb 2014

Cisco Systems, Inc.
26 - 50 of 439 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement