IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityWhite Papers (View All Report Types)
51 - 75 of 385 Matches Previous Page  | Next Page
Balance Work and Personal Use on Mobile Devices Securely
sponsored by IBM
WHITE PAPER: This resource highlights a cross-platform solution that strives towards data loss prevention with a consistent workflow.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

IBM

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: This white paper explores the growing world of mobile application development and highlights the benefits of providing security for mobile applications during the development and deployment stages.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

IBM

Harnessing the tyranny of autonomy: the Dropbox problem and the manager’s dilemma
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to discover whether your employees should be able to share information that improves productivity, or if it should be tightly controlled for privacy and security purposes
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IntraLinks, Inc

Mitigating the OWASP Top 10 2013 with Imperva SecureSphere
sponsored by Imperva
WHITE PAPER: This informative guide outlines an effective tool designed to help mitigate the OWASP top 10 and how it can greatly enhance your enterprise security.
Posted: 08 Jul 2014 | Published: 31 Dec 2013

Imperva

How to Enhance End-User Productivity with a Unified Workspace solution
sponsored by NComputing
WHITE PAPER: This exclusive whitepaper examines how a unified workspace solution can help you seamlessly deliver hybrid apps and critical data to all of your end-users no matter the device they are using.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

NComputing

Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Five Simple Strategies for Securing APIs
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper examines security risks unique to APIs and discusses five simple solutions to these issues.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

CA Technologies.

BYOD and Beyond: How to Deliver Enterprise Data Securely Across Operating Systems
sponsored by Citrix Systems, Inc.
WHITE PAPER: Uncover the issues that arise when allowing Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.4, iOS 7.1 and Windows Phone and Surface 8.1 versions – and the steps you should take to maintain security and control.
Posted: 01 Jun 2014 | Published: 01 Jun 2014

Citrix Systems, Inc.

Data Security Through the Cloud
sponsored by Cisco Systems, Inc.
WHITE PAPER: As businesses become increasingly mobile, so does sensitive data. Learn more about the threats to your organisation.
Posted: 29 May 2014 | Published: 06 Mar 2014

Cisco Systems, Inc.

Meeting Demand of High Availability with Advanced Data Protection
sponsored by IBM
WHITE PAPER: This white paper features a series of data protection solutions that help businesses meet the demands for always-on availability for applications while keeping sensitive information secure.
Posted: 19 May 2014 | Published: 31 Jan 2014

IBM

IAM Systems Now Leverage Intelligence to Address Cloud and Mobile Apps
sponsored by IntraLinks, Inc
WHITE PAPER: This resource highlights the 4 newest roles for identity and access management (IAM) systems that enhance security for an expanding business environment.
Posted: 15 May 2014 | Published: 15 May 2014

IntraLinks, Inc

Next-gen Application Delivery Controllers: An Intelligent Path to Active-Active Clusters
sponsored by Citrix
WHITE PAPER: This informative guide explores the role of these next-generation ADCs and provides insight on their effectiveness.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management
sponsored by CommVault
WHITE PAPER: This white paper highlights the challenges associated with rapid data growth when it comes to storage. It also gives the benefits of a software solution that makes recovery and managing snapshots easier and more efficient.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

CommVault

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Defending Against Application-Layer DDoS Attacks
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains the serious problem that DDoS threats present, and how it impacts your business.
Posted: 25 Jun 2014 | Published: 31 Dec 2013

Juniper Networks, Inc.

Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.

Heighten Security and Improve Availability With an Application Delivery Solution
sponsored by Citrix
WHITE PAPER: Find out which application virtualization and delivery solutions are capable of working together to provide you with both high availability and stellar security.
Posted: 20 Jun 2014 | Published: 31 Dec 2010

Citrix

Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Windows 8 Pro
WHITE PAPER: This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Lenovo and Windows 8 Pro

Secure Access and Continuity in a Virtualized and BYOD World
sponsored by Hewlett-Packard Company
WHITE PAPER: This business whitepaper focuses on the challenges facing midsize businesses who are looking to provide business continuity and minimized downtime. It also highlights the benefits of HP Just Right IT secure access and business continuity solutions.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
WHITE PAPER: This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Posted: 30 May 2014 | Published: 30 May 2014

FireEye

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro

Improve Your Mobile Application Security
sponsored by IBM
WHITE PAPER: Mobile applications bring with them a whole slew of security concerns that must be addressed throughout the development and deployment process. This helpful white paper introduces a mobile application development platform that helps you tackle security issues on devices, over the network, in the enterprise, and within the application itself.
Posted: 06 May 2014 | Published: 31 Oct 2012

IBM

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
Posted: 05 May 2014 | Published: 25 Sep 2013

IBM
51 - 75 of 385 Matches Previous Page    1 2 3 4 5 6    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement