IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
26 - 50 of 455 Matches Previous Page  |  Next Page
Market Overview: Customer Identity and Access Management Solutions
sponsored by Gigya
WHITE PAPER: How can you balance a seamless customer experience with a strong security strategy to protect customers' privacy? This Forrester report evaluates 7 customer identity and access management (CIAM) solution vendors, revealing the major strengths of each choice. Discover the key features to look for when deciding on a CIAM solution.
Posted: 21 Mar 2016 | Published: 04 Aug 2015

Gigya

The Evolution of Consumer Identity: 5 Biggest Trends
sponsored by Gigya
WHITE PAPER: This resource reveals the 5 biggest trends currently influencing the customer identity and access management space. Learn how to prepare for upcoming developments regarding traditional usernames and passwords vs biometric authentication, regional data privacy regulations, IoT, and more.
Posted: 18 Mar 2016 | Published: 31 Dec 2015

Gigya

Getting a handle on mobile devices – securely, reliably and tidily
sponsored by Matrix42
WHITE PAPER: Mobile access to data and applications is now the rule rather than the exception. This trend has notably spurred thegenesis of both web and SaaS applications, which are used on a daily basis by allcompanies of all sizes nowadays. This technological progress is confronting both IT professionals and ordinary users with new problems.
Posted: 18 Mar 2016 | Published: 30 Dec 2015

Matrix42

Best Practices for Mobile Application Lifecycle Management
sponsored by InfoStretch
WHITE PAPER: This resource reveals the most common challenges in developing and maintaining mobile apps. Discover best practices for mobile testing to deliver secure, high-quality apps to meet users' increasingly high expectations.
Posted: 17 Mar 2016 | Published: 31 Oct 2014

InfoStretch

How to Choose an IT Platform to Empower Your Internet of Things
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This resource describes how to adapt your organization's human resources, processes, and architectures to derive maximum value from the Internet of Things (IoT). Discover the criteria you need to consider when establishing an IoT platform, including connectivity between devices and data, security and governance, big data analytics, and 2 more.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

Hewlett-Packard Enterprise

App and Threat Intelligence Defense Strategy Revealed
sponsored by Ixia
WHITE PAPER: In this white paper, delve deeper into app and threat intelligence defense strategies to mitigate hacker attempts to break through your vulnerabilities.
Posted: 15 Mar 2016 | Published: 25 Nov 2015

Ixia

Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: Access this SAP research paper to understand the threat of an SAP cyber breach and how organizations are managing the risk of information threat, modification of data and disruption of business processes. Learn from businesses that have been breached an average of two times in the past 24 months.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Onapsis

Addressing Security Vulnerabilities in Embedded Applications
sponsored by Programming Research
WHITE PAPER: This resource explains why it's so difficult to produce secure embedded software and provides best practices for embedded developers. Discover how you can minimize exploitable software vulnerabilities, cut costs, and speed up development with automated static analysis.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

Developing Secure Embedded Software: Quality Doesn't Equal Security
sponsored by Programming Research
WHITE PAPER: This white paper debunks 4 common misconceptions about software security and describes a variety of tools to improve embedded software security by detecting issues earlier on in development. Learn about the benefits of strategies like risk and threat management, application lifecycle management, static code analysis, and more.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

Gartner 2015 Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: This Gartner resource compares 19 leading application security testing solution vendors, revealing the strengths and weaknesses of each one. View now and discover how the vendors performed in areas like product quality, sales execution and pricing, and customer experience.
Posted: 11 Mar 2016 | Published: 06 Aug 2015

IBM

Backup and Recovery for SAP with Oracle Environments
sponsored by EMC & NextNet
WHITE PAPER: In this white paper, review the EMC data protection suite, which features the necessary SAP integration and support to make backup and recovery more efficient and easier to manage. Read on to discover the new features this technology can provide to your enterprise's backup solution.
Posted: 10 Mar 2016 | Published: 30 Sep 2015

EMC & NextNet

Backup and Recovery for SAP with Oracle Environments
sponsored by EMC & MicroAge
WHITE PAPER: In this white paper, review the EMC data protection suite, which features the necessary SAP integration and support to make backup and recovery more efficient and easier to manage. Read on to discover the new features this technology can provide to your enterprise's backup solution.
Posted: 10 Mar 2016 | Published: 30 Sep 2013

EMC & MicroAge

How IoT Is Making Security Imperative for All Embedded Software
sponsored by Programming Research
WHITE PAPER: This resource discusses the unique challenges of securing embedded applications and explains how to overcome these obstacles with static code analysis tools. Discover how you can identify and eliminate defects earlier on in the development cycle.
Posted: 10 Mar 2016 | Published: 10 Mar 2016

Programming Research

A Solutions Guide to Hyperconverged Infrastructure for Enterprise Applications
sponsored by Softchoice Corporation
WHITE PAPER: From this white paper, you will learn why hyperconverged infrastructure is the perfect web-scale infrastructure for enterprise applications, and see how this combo is revolutionizing today's enterprise data centers. Read on to discover how this HCI delivers compromise-free performance.
Posted: 10 Mar 2016 | Published: 31 May 2015

Softchoice Corporation

SAP SYSTEMS ANALYSIS Business Risk Illustration
sponsored by Onapsis
WHITE PAPER: This white paper helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 09 Mar 2016 | Published: 29 Feb 2016

Onapsis

Using Static Source Code Analysis to Develop Secure Embedded Software
sponsored by Programming Research
WHITE PAPER: When it comes to embedded software, it's critical to address the root causes of security issues rather than just the symptoms of the problem. This resource explains how static analysis tools can simplify and automate code review to eliminate mistakes before they become integrated into the code base.
Posted: 08 Mar 2016 | Published: 08 Mar 2016

Programming Research

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Dell Data Protection: Rapid Recovery
sponsored by Dell, Inc.
WHITE PAPER: In this white paper, find out how you can protect anything, anywhere: systems, apps and data – fast and easy. Gain a reliable, admin-friendly solution that can be deployed as software or in scalable appliance form factors with all capabilities included.
Posted: 02 Mar 2016 | Published: 29 Feb 2016

Dell, Inc.

A Guide to Mobile Application Delivery and Investment Protection
sponsored by Matrix42
WHITE PAPER: In this white paper, you will discover how to integrate your mobile applications management (MAM) into your existing infrastructures to allow remote management of app delivery, security, configuration and access – without the need for proprietary proxy servers.
Posted: 02 Mar 2016 | Published: 31 Dec 2015

Matrix42

Securing Docker: What You Need to Know
sponsored by Black Duck Software
WHITE PAPER: This white paper discusses how you can build, ship, and run distributed applications quickly and reliably. Learn how you can go from physical, single-tenanted computing resources to more efficient, virtual, multi-tenanted infrastructure that can run in traditional IT environments and in the cloud.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Black Duck Software

Reduce Risk, Cost, and Time to Market for Legacy App Conversions
sponsored by GizmoxTS
WHITE PAPER: Legacy apps pose security vulnerabilities and often aren't compatible with mobile devices, but rewriting custom apps can eat up your time and budget. This resource describes how transposition simplifies and accelerates legacy code modernization. Discover how you can reduce time to market, cut costs, and more.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

GizmoxTS

The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

Snow Software

How to Unleash the Full Potential of Linux with Docker Containers
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to achieve the ultimate flexibility for business critical Linux applications with Docker containers. Read on to take advantage of enterprise-grade automation, orchestration, management, visibility, and control capabilities for the application development and deployment process.
Posted: 01 Mar 2016 | Published: 31 Aug 2015

IBM

Application Control Observations & Strategies for Success
sponsored by Carbon Black
WHITE PAPER: This white paper provides a blueprint you can adopt to ensure successful application control deployment. It greatly simplifies the process of achieving "high enforcement" in your IT environment.
Posted: 25 Feb 2016 | Published: 27 Jan 2016

Carbon Black
26 - 50 of 455 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement