IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityWhite Papers (View All Report Types)
26 - 50 of 397 Matches Previous Page  | Next Page
Consolidating Remote Servers and Storage for Security, Efficiency
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Access this white paper to find out how to decouple storage from its server over any distance and be available as if it were local to applications at the edge in remote offices.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Riverbed Technology, Inc.

The Hidden Risks Behind Mobile Application Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper provides the findings on mobile application security, based on more than 2,000 mobile applications from over 600 companies.
Posted: 15 Sep 2014 | Published: 01 Feb 2014

Hewlett-Packard Company

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: This white paper highlights the importance of IAM strategies complying with regulations to ensure strong security.
Posted: 11 Sep 2014 | Published: 01 Apr 2014

IBM

WAF or IPS - Why you need more than a Firewall and IPS to protect your applications
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains the importance of using more than just a firewall and IPS to protect your applications from malicious attacks.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Next generation firewall product analysis
sponsored by Fortinet, Inc.
WHITE PAPER: This resource contains a product analysis of a next generation firewall (NGFW) that discusses security, performance, TCO and several other categories that are not available anywhere else.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Fortinet, Inc.

Ready, Aim, HP Fortify!
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, discover how the U.S. Army uses a particular software to help prevent attacks to the TAMIS system.
Posted: 10 Sep 2014 | Published: 01 Oct 2013

Hewlett-Packard Company

Moving Beyond the Firewall for Complete Data Protection
sponsored by Fortinet, Inc.
WHITE PAPER: Check out this white paper to discover several new security threats and what solutions are available to mitigate those risks going forward.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Fortinet, Inc.

Simply deploy, manage and secure mobile apps from the cloud
sponsored by IBM
WHITE PAPER: View this brief paper that introduces a mobile application management suite that delivers an easy-to-use enterprise app catalog with full security and operational lifecycle management of apps. Learn how this system is ideal for security sensitive data, especially in this BYOD era.
Posted: 08 Sep 2014 | Published: 28 Feb 2013

IBM

BYOD Simplified Into 10 Steps
sponsored by Citrix
WHITE PAPER: Access this white paper to find out how to successfully use a BYOD program in the workplace with 10 simple steps.
Posted: 08 Sep 2014 | Published: 24 Jun 2014

Citrix

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: This white paper reveals why mobile application security is crucial element of your business.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

CA Technologies.

Bloomberg Research – Test & Secure Mobile Apps
sponsored by Hewlett-Packard Company
WHITE PAPER: According to this Bloomberg research report, only 51% of businesses test their apps for security before deployment. Access this report to learn about a technology that will help you avoid exposing your corporate data, losing brand equity and suffering financial loss through breaches of your mobile applications.
Posted: 05 Sep 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

Bloomberg Research - Business/IT view of App Security
sponsored by Hewlett-Packard Company
WHITE PAPER: In this Bloomberg research report, learn about the security issues surrounding mobile applications. Discover what business leaders and IT decision-makers agree and disagree on in regard to mobile apps, and why both groups are reluctant to express total satisfaction with their current ability to take advantage of the mobility trend.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Hewlett-Packard Company

The 10-Minute Guide to Cloud Encryption Gateways
sponsored by CipherCloud
WHITE PAPER: Learn about the innovative solutions that have been developed to address the security concerns regarding business applications in the cloud.
Posted: 03 Sep 2014 | Published: 31 Dec 2013

CipherCloud

5 Simple Strategies for Securing APIs
sponsored by CA Technologies.
WHITE PAPER: APIs share many of the same threats as the traditional web; however, they have an entirely unique risk profile that needs to be managed. View this resource now to discover an analysis of what an API truly is, and how they expose enterprises to new threats.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

CA Technologies.

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited

The Impact of Data Breaches: Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

2013 Threat Report
sponsored by Dell Software
WHITE PAPER: This report extensively details and categorizes recent global trends in network threats.
Posted: 19 Aug 2014 | Published: 23 Jan 2014

Dell Software

Privacy, Security and Compliance - What You Don’t Know May Just Hurt You
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: In this document, explore the changing nature and increasing value of data and how organizations are responding to changes in regulation.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Five Program Management Best Practices When Designing App Security
sponsored by Veracode, Inc.
WHITE PAPER: Program management is essential during the early stages of designing an application security program. This whitepaper discusses how a company implemented program management while developing an application security program, and the results they saw.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

Addressing the Scalability Challenge with Cloud-Based Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Ad-hoc application security programs have led to inconsistent policies across businesses, as shown in this startling statistic: 93% of companies suffered a data breach in 2013. This whitepaper considers a software system that focuses on scalability and simplicity.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Hewlett-Packard Company

Reducing security risks from open source software
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper highlights how your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Posted: 18 Aug 2014 | Published: 01 Oct 2013

Hewlett-Packard Company

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 18 Aug 2014 | Published: 01 Sep 2013

Hewlett-Packard Company

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company
26 - 50 of 397 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement