IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
76 - 100 of 483 Matches Previous Page  |  Next Page
Best Practices for Mobile Application Lifecycle Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

A Guide to Mobile Application Delivery and Investment Protection
sponsored by Matrix42
WHITE PAPER: In this white paper, you will discover how to integrate your mobile applications management (MAM) into your existing infrastructures to allow remote management of app delivery, security, configuration and access – without the need for proprietary proxy servers.
Posted: 02 Mar 2016 | Published: 31 Dec 2015

Matrix42

How to Unleash the Full Potential of Linux with Docker Containers
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to achieve the ultimate flexibility for business critical Linux applications with Docker containers. Read on to take advantage of enterprise-grade automation, orchestration, management, visibility, and control capabilities for the application development and deployment process.
Posted: 01 Mar 2016 | Published: 31 Aug 2015

IBM

Securing Docker: What You Need to Know
sponsored by Black Duck Software
WHITE PAPER: This white paper discusses how you can build, ship, and run distributed applications quickly and reliably. Learn how you can go from physical, single-tenanted computing resources to more efficient, virtual, multi-tenanted infrastructure that can run in traditional IT environments and in the cloud.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Black Duck Software

Reduce Risk, Cost, and Time to Market for Legacy App Conversions
sponsored by GizmoxTS
WHITE PAPER: Legacy apps pose security vulnerabilities and often aren't compatible with mobile devices, but rewriting custom apps can eat up your time and budget. This resource describes how transposition simplifies and accelerates legacy code modernization. Discover how you can reduce time to market, cut costs, and more.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

GizmoxTS

Open Source Security Needed in Development
sponsored by Black Duck Software
WHITE PAPER: With 4,000 new vulnerabilities disclosed in open source projects each year, you can't afford to use open code without knowing the risk and how to prevent them.
Posted: 24 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Know Your Code: Don't Get Blindsided by Open Source Security Risks During Development
sponsored by Black Duck Software
WHITE PAPER: This white paper teaches you the advantages and disadvantages of using open source software and how you can avoid some of the disadvantages. Access this resource now for considerations your organization should know.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Secure and Manage Open Source Software
sponsored by Black Duck Software
WHITE PAPER: This resource reviews a process called, "Open Source Hygiene," which keeps software stacks and application portfolios free of known-exploitable versions of open source code.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Open source: What developers and security pros need to know
sponsored by Black Duck Software
WHITE PAPER: Whether you're a developer or security professional, get a firm grip on open source software management, compliance and security risks and solutions you need to know to keep your company safeguarded.
Posted: 22 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Protect Your Business with the Next-Generation Firewall
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper shows you how to achieve next-generation firewall protection with integrated application awareness, intrusion prevention and role-based user controls.
Posted: 18 Feb 2016 | Published: 31 Jul 2015

Juniper Networks, Inc.

Think You Have Application Security Covered? Think again.
sponsored by Black Duck Software
WHITE PAPER: Access this white paper and learn about some of the complications developers have when dealing with open source application development.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Black Duck Software

Know Your Open Source Code Security is Enhanced by Better Visibility into Code Acquired from Multiple Sources
sponsored by Black Duck Software
WHITE PAPER: This white paper shows you the benefits and shortcomings of open source code and how to deal with any problems you might face when developing with it.
Posted: 16 Feb 2016 | Published: 27 Jan 2016

Black Duck Software

What Executives Need to Know About Security Testing Tools and Open Source
sponsored by Black Duck Software
WHITE PAPER: This white paper teaches you how to utilize open source code without accruing potential risks involved in it.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Application Security in 2016: A Comprehensive Overview
sponsored by Black Duck Software
WHITE PAPER: In this white paper, you will read about key open source application security challenges that your business will face in 2016. Learn how CISO's can address and manage those challenges effectively.
Posted: 15 Feb 2016 | Published: 27 Jan 2016

Black Duck Software

There's More to Backing Up VMs Than Meets the Eye
sponsored by Veeam Software
WHITE PAPER: This whitepaper highlights a built-in infrastructure for application backups that can enable the full backups of virtual environments. Read on to see how this infrastructure, combined with Veeam's backup and recovery solutions, can provide your virtual environments with a wide array of backup, recovery, and replication functionalities.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

Veeam Software

Choosing an Online Backup Tool: Why Speed Should Be a Key Consideration
sponsored by LogicNow
WHITE PAPER: This whitepaper explores an online backup solution that speeds up the process of identifying what files have been changed so that backup windows can focus on actual backups, making them faster and more efficient. Read on to see how this solution can allow your enterprise to eliminate the hassle of slow backups.
Posted: 12 Feb 2016 | Published: 31 Dec 2015

LogicNow

10 Features Every Web App Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 11 Feb 2016 | Published: 30 Dec 2015

Imperva

The Industralization of Hacking: How to Stop Automated Attacks
sponsored by Imperva
WHITE PAPER: View this infographic and learn how you can better defend against such advanced Web-based attacks.
Posted: 11 Feb 2016 | Published: 30 Dec 2015

Imperva

The Cloud App Visibility Blindspot
sponsored by Imperva
WHITE PAPER: Learn about the visibility blind spot when adopting SaaS apps and the increased risks organizations face with employee use of "Shadow IT."
Posted: 11 Feb 2016 | Published: 16 Sep 2015

Imperva

The State of App Security
sponsored by MobileIron
WHITE PAPER: In this white paper, learn how to proactively approach mobile app security. Explore the features one mobile security option provides, including automated responses to threats like malware, integration to make existing security stack mobile-aware, and more.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron

Application Control Observations & Strategies for Success
sponsored by Carbon Black
WHITE PAPER: This white paper provides a blueprint you can adopt to ensure successful application control deployment. It greatly simplifies the process of achieving "high enforcement" in your IT environment.
Posted: 25 Feb 2016 | Published: 27 Jan 2016

Carbon Black

Higher Education Network Security: Satisfying Today's Bandwidth-Hungry Students
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a strategy that helped a leading higher education institution protect their network without slowing it down or affecting availability. Learn about benefits like in-depth visibility and reporting of network activities, identity-centric authentication for device security, and much more.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Secure Wireless LAN for Uninterrupted Clinical Applications
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a solution that addresses the security and performance requirements for uninterrupted clinical applications, with the least amount of administrative complexity.
Posted: 16 Feb 2016 | Published: 29 Jul 2015

Fortinet, Inc.

Secure Wi-Fi for K-12 Education
sponsored by Fortinet, Inc.
WHITE PAPER: Mobile devices present new security challenges for schools that need to protect their network integrity as well as restrict students' access to dangerous sites. Access this resource to learn about a solution that unifies network and application security and delivers maximum control at a low cost.
Posted: 16 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Solution Brief: Satisfying Today's Bandwidth Hungry Consumers
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights a high performance next generation firewall solution that protects information and applications without slowing down your network or affecting availability. Read on to see how this firewall solution can provide your enterprise with in-depth visibility and reporting, highly effective intrusion prevention system, and more.
Posted: 12 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.
76 - 100 of 483 Matches Previous Page    2 3 4 5 6 7    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement