IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityWhite Papers (View All Report Types)
76 - 100 of 369 Matches Previous Page  | Next Page
The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012

Imperva

API Management: Choosing the Right Tools
sponsored by CA Technologies.
WHITE PAPER: Making application programming interfaces (APIs) available to the general public brings with it a number of challenges and risks. In this white paper, explore the functional and operational requirements in depth and get the key criteria you need to choose the right API management tool for your organization.
Posted: 10 Feb 2014 | Published: 31 Dec 2011

CA Technologies.

Secure Mobile Access for Enterprise Employees
sponsored by CA Technologies.
WHITE PAPER: This white paper explains the top 4 challenges of integrating corporate data with mobile applications for remote users. Click now to unveil a solution that acts as a mobile gateway and ensures data adaptation, performance optimization, security, and improved management for mobile developers.
Posted: 07 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

5 Oauth Essentials for API Access Control
sponsored by CA Technologies.
WHITE PAPER: View this resource to uncover an application programming interface (API) authentication solution fit for the enterprise. Read on for 5 things to consider before deployment.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

CA Technologies.

Enterprise on the Go: 5 Essentials for BYOD & Mobile Enablement
sponsored by CA Technologies.
WHITE PAPER: To get the most benefits from enterprise mobility and bring-your-own-device (BYOD) policies, businesses need to deploy applications that give employees the same functionality as on-premise apps without sacrificing the security of critical enterprise systems. While this may seem like a tall order, it's possible with the right strategy in place.
Posted: 06 Feb 2014 | Published: 06 Feb 2014

CA Technologies.

Protecting Your APIs Against Attack & Hijack
sponsored by CA Technologies.
WHITE PAPER: Even though application programming interfaces (APIs) experience the same threats as the Web, thanks to architecture differences, existing Web security methods aren't enough to keep them protected. Read on to unveil 5 best practices to secure your API architectures.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

Federated Identity & Single Sign‐On Using Layer 7
sponsored by CA Technologies.
WHITE PAPER: In this white paper, learn how separate identity silos create gaps and complexities in security measures. Read on to reveal a solution that federates identity and provides single sign-on (SSO) services for mobile and virtual applications to reduce these challenges.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

Not All SOA Gateways Are Created Equal
sponsored by CA Technologies.
WHITE PAPER: Most service-oriented architecture (SOA) gateways offer similar functionality: they address security and performance issues that arise when using XML-based messaging protocols. However, not all SOA gateways are created equal, as the total cost of ownership (TCO) can vary greatly.
Posted: 06 Feb 2014 | Published: 31 Dec 2011

CA Technologies.

Do You Really Need A SAN-Based Cluster? Ten Essential Questions to Ask Before Choosing a Cluster Solution
sponsored by SIOS Technology Corp
WHITE PAPER: Businesses today are deploying applications in physical, virtual, and cloud environments, and as such, clusters based on storage SANs are no longer the go-to choice for application security. SAN-less clusters offer increased flexibility and cost savings without sacrificing performance -- but will they work for your IT environment?
Posted: 05 Feb 2014 | Published: 05 Feb 2014

SIOS Technology Corp

Securing Identities and Data Across Mobile Apps
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights the 3 major challenges in protecting user identities through mobile applications. Read on to discover a mobile gateway solution that offers secure access and user protection.
Posted: 05 Feb 2014 | Published: 31 Dec 2013

CA Technologies.

A How‐to Guide to OAuth & API Security
sponsored by CA Technologies.
WHITE PAPER: When it comes to Web applications, one of the top concerns is security. With OAuth, users can authorize limited access to applications and data. View this white paper for a how-to guide to OAuth and API security.
Posted: 05 Feb 2014 | Published: 31 Dec 2013

CA Technologies.

Why You Must Have Cloud Governance Before You Move Your Apps
sponsored by CA Technologies.
WHITE PAPER: Access this resource to explore how you can leverage traditional SOA governance programs and extend practices to your future cloud deployment.
Posted: 04 Feb 2014 | Published: 31 Dec 2011

CA Technologies.

Patch Management Best Practices
sponsored by LabTech Software
WHITE PAPER: A top priority for IT service providers is to keep clients' critical systems free from known vulnerabilities. This is where patch management comes into play. Access this white paper today to find best practices for various kinds of patches so you can keep critical systems safer.
Posted: 31 Jan 2014 | Published: 31 Dec 2012

LabTech Software

Enabling and Protecting the Open Enterprise
sponsored by CA Technologies.
WHITE PAPER: View this informative resource for an overview of the challenges of securing the open enterprise, and learn the steps you can take to enable your business for growth, while protecting it from risk and attack.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

CA Technologies.

Mobilizing Windows Applications
sponsored by Citrix
WHITE PAPER: This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: In this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.
Posted: 26 Dec 2013 | Published: 31 Aug 2013

Palo Alto Networks

Buyers guide to next-gen firewalls
sponsored by Palo Alto Networks
WHITE PAPER: In this resource, uncover a buyers guide for next-generation firewalls that details all the must-have functions in order to ensure optimum network security. Click now to see how to choose the right solution for your organization's needs.
Posted: 26 Dec 2013 | Published: 26 Dec 2013

Palo Alto Networks

Defending Against Insider Threats in the “Snowden Era”
sponsored by CA Technologies.
WHITE PAPER: Security breaches are a significant threat for organizations in the age of big data: broken privacy laws, reputational damage, and loss of classified information are very real possibilities. What's worse is one of the most commonplace and damaging causes of security breaches can come from the inside of your business.
Posted: 28 Jan 2014 | Published: 31 Dec 2013

CA Technologies.

Accelerating the deployment of a secure mobile enterprise
sponsored by IBM
WHITE PAPER: In this insightful white paper, explore key challenges you'll face in ensuring the security of enterprise mobile devices, learn strategies that will help you reduce risk, and discover new ways that you can be more secure in your use of mobile technology.
Posted: 15 Jan 2014 | Published: 31 Oct 2013

IBM

Securing mobile devices in the business environment
sponsored by IBM
WHITE PAPER: As smartphones and other mobile devices gain traction in consumers' personal lives, they're also being introduced into their work environments. In this white paper, learn how to safely introduce personal or corporate-owned mobile devices into the workplace, identify and prevent the risks to corporate data, and ultimately drive more business value.
Posted: 15 Jan 2014 | Published: 31 Oct 2011

IBM

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Challenging Some of the Myths About Static Code Analysis
sponsored by Klocwork
WHITE PAPER: This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
Posted: 27 Dec 2013 | Published: 30 Nov 2013

Klocwork

Cloud Based Application Penetration Testing Trial
sponsored by iViZ
WHITE PAPER: Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

iViZ

BMC Release Lifecycle Management
sponsored by BMC Software
WHITE PAPER: This whitepaper covers a solution that will help ease your management of complex web applications and reduce the risks of failure.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

BMC Software

Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Trend Micro
76 - 100 of 369 Matches Previous Page    2 3 4 5 6 7    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement