IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
26 - 50 of 399 Matches Previous Page  |  Next Page
Security Breaks DevOps – Here’s How to Fix It
sponsored by CloudPassage
WHITE PAPER: This webcast presents the key ingredients your security strategy needs in order to secure and accelerate DevOps.
Posted: 20 Jan 2016 | Published: 14 Jul 2015

CloudPassage

Data Theft Prevention: The Key to Security, Growth and Innovation
sponsored by Forcepoint
WHITE PAPER: In this white paper, you will discover how Data Theft Prevention allows you to successfully embrace technological change and new opportunities.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Forcepoint

Special Report: The Risks of Shadow Data
sponsored by Elastica
WHITE PAPER: Based on the analysis of over 63 million documents, this report on shadow data provides valuable insights into cloud application usage to help organizations unlock the full business potential of cloud apps while staying secure and compliant.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

Elastica

Measure and Move Your Mobile Apps to Greatness
sponsored by IBM
WHITE PAPER: In this exclusive white paper, you will evaluate what turns consumers and other users both off and onto a mobile app, as well as learn how to elevate your serviceable and profitable mobile apps into great apps. Read on to discover four key findings that will elevate your apps.
Posted: 04 Jan 2016 | Published: 31 Oct 2015

IBM

How Risky Mobile Apps Steal Data and Spy on Users
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper explores the dangers of malicious mobile apps and gives you advice on avoiding them. Discover what threats are lurking in your users' app stores and how you can keep those threats out of your network.
Posted: 28 Dec 2015 | Published: 28 Dec 2015

Proofpoint, Inc.

Managing the Secure Deployment of Cloud Services
sponsored by IBM
WHITE PAPER: This white paper invites you to explore the possibilities of a SaaS-based approach to the secure deployment and use of cloud services. Access now and learn how to make it easier for business users to access sanctioned cloud services and introduce elements of identity and access management (IAM) that are often missing.
Posted: 22 Dec 2015 | Published: 27 Oct 2015

IBM

Securely Connecting Users to Cloud Apps with Integrated Cloud Access and Control
sponsored by IBM
WHITE PAPER: This research brief discusses how to employ identity as a service (IDaaS) for single sign-on (SSO) as a means to control both on-premises and mobile user cloud app usage. Access now and learn how to apply a "detect, connect, and protect" methodology to the visibility and control requirements of a cloud access security broker (CASB) offering.
Posted: 22 Dec 2015 | Published: 30 Oct 2015

IBM

Deliver Secure, New Business Services and Improve the Customer Experience
sponsored by CA Technologies
WHITE PAPER: This resource discusses ways organizations can deliver secure, new business services with identity management in mind. By accessing, you'll find a checklist designed to help you simultaneously grow and protect your business.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

CA Technologies

Definitive Guide to Office 365 Security
sponsored by BitGlass
WHITE PAPER: This exclusive white paper reveals how to fill the security gaps in your Office 365 applications. Discover the top 4 ways to secure Office 365 like a pro.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

BitGlass

Survey: The State of Wireless Security Today
sponsored by Fortinet, Inc.
WHITE PAPER: Learn more about what your peers are doing – or not doing – to secure the wireless infrastructure. Additional data points covered in this report include plans for cloud-managed WLANs and IT decision-maker confidence in relying on third-party hosted management.
Posted: 09 Dec 2015 | Published: 15 Oct 2015

Fortinet, Inc.

Rethinking Network Security and Access to Meet Today's Business Demands
sponsored by Fortinet, Inc.
WHITE PAPER: This paper outlines comprehensive Fortinet's Secure Access offering across 3 deployment modes, which provides the same comprehensive security in both controller-managed and cloud-managed environments. Read how this suite delivers flexibility and simplicity in both the wired and wireless network while ensuring that security is never compromised.
Posted: 09 Dec 2015 | Published: 09 Oct 2015

Fortinet, Inc.

Why SaaS Security is Hotter than Ever
sponsored by IBM
WHITE PAPER: Access this research reprint to get the latest in multifaceted SaaS security products that decision-makers can expect to see in the near future, and learn ways to embrace SaaS apps without bringing in loads of point products to secure them.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

IBM

Predictive Mobile Threat Defense
sponsored by Skycure
WHITE PAPER: This white paper explains the 3 reasons why traditional mobile security approaches can no longer protect users and organizations. Access this resource now to learn how to advance mobile security into a next-gen mobile threat defense to protect networks, apps, and users.
Posted: 03 Dec 2015 | Published: 11 Nov 2015

Skycure

When Policy and Productivity go Hand-in-Hand
sponsored by IBM
WHITE PAPER: Access this article and learn how to accommodate the new ways employees collaborate, while also maintaining a level of control and visibility over what corporate data can and cannot be shared with third-party cloud apps.
Posted: 01 Dec 2015 | Published: 22 Sep 2015

IBM

The Mobile Cloud: How Cloud Services Cast Dark Shadows on Mobile Activity
sponsored by IBM
WHITE PAPER: This article explains how cloud app security brokers solutions (CASBs) are giving CISOs visibility into employee usage of cloud apps in the enterprise. Read on to learn the benefits of integrating this technology with enterprise mobility management (EMM) tools.
Posted: 01 Dec 2015 | Published: 04 Nov 2015

IBM

CISOs' Guide to Enabling a Cloud Security Strategy: Focus on SaaS
sponsored by IBM
WHITE PAPER: This analyst report covers key reasons why you should put SaaS first in your cloud security strategy. Access now and discover 15 ways you can get started.
Posted: 10 Nov 2015 | Published: 30 Oct 2015

IBM

The Changing State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This report reveals just how often cloud environments are hacked and what methods are used when they are.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Alert Logic

Speed, Security, Availability: Apps Delivered Wherever You Are
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn how to protect your cloud applications with an app-centric strategy that provides certainty that app delivery will be seamless no matter where you are, security that meets requirements across hybrid environments, allows for deeper visibility, and mitigates risk with consistent policies, and more.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

F5 Networks

The Continuum of Self-Service
sponsored by LogiAnalytics
WHITE PAPER: Access this white paper to find five essentials you should consider before empowering users with self-service analytics.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

LogiAnalytics

The State of Mobile Security Maturity
sponsored by IBM
WHITE PAPER: This white paper reviews the blurred lines between personal and professional use of mobile devices as well as the inherent risks enterprise mobility poses to data, apps, and networks.
Posted: 19 Oct 2015 | Published: 31 Dec 2014

IBM

The Top 6 Tools Users Need For Mobile Files and How to Provide them Securely
sponsored by BlackBerry
WHITE PAPER: This white paper discusses the six tools mobile users need from their file management apps and gives advice on maintaining security while providing each one.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

BlackBerry

The Power of Collaboration with an Expiration Date and Data-Centric Security
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn the role of data-centric security in expiration collaboration. Access this paper now to see why the movement of consumers to apps like Snapchat clearly presages a similar move for enterprises to EFSS tools with real expiration built in.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

BlackBerry

The State of Application Delivery in APAC 2015
sponsored by F5 Networks
WHITE PAPER: In the following infographic, you will discover all you need to know about the state of application delivery in APAC in 2015. Discover why organizations are finding that success depends on the effectiveness of their security infrastructure.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

F5 Networks

Reimagine, Reinvent, Run: SAP in the Digitial Economy
sponsored by SAP America, Inc.
WHITE PAPER: This brief whitepaper discusses some of the ways SAP is changing how the world operates, with particular focus on efficiency. Access now to see how SAP could revamp your business as well.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

SAP America, Inc.

Don't Believe the Hype - All Containers are Not Equal
sponsored by Good Technology
WHITE PAPER: This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.
Posted: 11 Nov 2015 | Published: 11 Jun 2015

Good Technology
26 - 50 of 399 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement