IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application Security Reports
1 - 25 of 710 Matches Previous Page  |  Next Page
Fighting Emerging Cyber-Attacks with a Holistic Security Architecture
sponsored by Radware
WHITE PAPER: This white paper outlines a holistic security architecture strategy designed to fight complex and dynamic attack campaigns. Access now to learn how to explore four attack cases and how to defend against them.
Posted: 31 Mar 2015 | Published: 09 Apr 2014

Radware

Cloud Security through Trend Micro Deep Security
sponsored by Trend Micro
VIDEO: Inside this brief video, learn about a technology that provides organizations with the tools to mitigate security threats built especially for the cloud. Find out how one click can add security to your instances without you having to manage the entire security infrastructure yourself.
Posted: 31 Mar 2015 | Premiered: 18 Dec 2014

Trend Micro

Coding: The Core Weakness of Web App Design
sponsored by Symantec Corporation
EGUIDE: View this expert e-guide to explore an in-depth look at improving coding to prevent web app attacks such as cross site scripting (XSS) and SQL injection (SQLi). Read on now to learn more about protecting your web apps and data.
Posted: 27 Mar 2015 | Published: 07 Jan 2015

Symantec Corporation

Application-Centric Infrastructure Streamlines IT
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper introduces a network infrastructure that combines most needs into one place for a more efficient and more effective IT.
Posted: 26 Mar 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

Demo: Full Server Replication Protection
sponsored by Vision Solutions
WEBCAST: Watch this brief webcast for a live demo of a program designed to make your replication process easy, efficient and, most of all, secure.
Posted: 26 Mar 2015 | Premiered: Oct 31, 2013

Vision Solutions

Empower a Mobile Workforce with Secure App Delivery
sponsored by Citrix
WHITE PAPER: Explore how to integrate security into the app development process and deliver secure native-like apps to multiple devices.
Posted: 26 Mar 2015 | Published: 11 Feb 2015

Citrix

Citrix NetScaler: A Foundation for Next-Gen Datacenter Security
sponsored by Citrix
WHITE PAPER: This white paper reveals how NetScaler is meeting modern demands for more robust datacenter security.
Posted: 25 Mar 2015 | Published: 01 Sep 2012

Citrix

Securing Applications for a Safer Cloud Environment
sponsored by IBM
WHITE PAPER: View this white paper to learn the five steps to combating application breaches in the cloud. Additionally, explore other protocols to reduce risk.
Posted: 25 Mar 2015 | Published: 09 Jul 2014

IBM

Case Study: Mitigating App Vulnerabilities Before Production
sponsored by IBM
CASE STUDY: In this case study, learn how one university was able to mitigate risk and vulnerabilities by taking advantage of a leading app scanning platform. Read on to explore how this platform enables the university's apps to comply with regulations and if it may be right for your organization.
Posted: 25 Mar 2015 | Published: 09 Apr 2014

IBM

With IoT on the Rise, Feel Secure with APIs and a DLP Strategy
sponsored by Axway
EGUIDE: In this expert guide, you'll learn how to take control of your data security as the Internet of Things ramps up by diving into application programming interfaces (APIs) and data loss prevention (DLP).
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Axway

The Processes of an Application Security Program
sponsored by Veracode, Inc.
WEBCAST: In this video, you can view a demo of how one application security program works.
Posted: 20 Mar 2015 | Premiered: Mar 4, 2014

Veracode, Inc.

Five Questions to Ask Your SaaS Provider Before Putting Sensitive Data in the Cloud
sponsored by SailPoint Technologies
WHITE PAPER: Identity governance helps professionals manage and control user access to sensitive applications and data. Access this white paper to find pertinent information for desicion-makers who are in the proces of considering the deployment of SaaS applications.
Posted: 20 Mar 2015 | Published: 29 Mar 2013

SailPoint Technologies

Case Study: Global 500 Company Integrates Security and Application Development
sponsored by Veracode, Inc.
WHITE PAPER: A global 500 company faced the challenge of balancing fast application development with security. This case study describes how they met that challenge.
Posted: 20 Mar 2015 | Published: 01 Jan 2015

Veracode, Inc.

Global Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
WHITE PAPER: A global 100 manufacturer faced the problem of securing an increasing number of applications. How they solved this problem can provide insights for other large enterprises seeking to do the same.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Veracode, Inc.

Securing Your Applications and Protecting Your Systems
sponsored by WhiteCryption
EGUIDE: Access this expert e-guide to explore the pros and cons of replication and erasure coding to help you determine which method of data protection is best for your data center. Also, learn why applications experts say frameworks that enforce secure coding provides a better way for developers to write apps that can withstand attacks.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

WhiteCryption

Verifying the integrity of open source Android apps
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how researchers can determine whether an app was built from its published source code.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Clustering to counter Android malware
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how the rapid growth of new Android malware calls for automated tools to help malware analysts.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Combating Android app repackaging attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how apps repackaged through reverse engineering pose a big security risk to the Android smartphone operating system.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Enhanced Mobile Endpoint Security
sponsored by ESET
WHITE PAPER: This white paper describes a mobile endpoint security system that gives you anti-theft protection, drive security, application control and more.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ESET

Closing the Web App Data Security Gap
sponsored by IBM
WHITE PAPER: In this white paper, you will learn about one security platform that monitors, tracks, and reports on user activities accesing critical applications.
Posted: 09 Mar 2015 | Published: 08 May 2013

IBM

When Business is the App, The App is the Business. Volume 2
sponsored by Maas360 by IBM
WHITE PAPER: Click through to explore how building an effective strategy is key to ensuring that apps truly benefit the business while keeping corporate data and your network secure. Learn how a successful approach to appification should involve discovery, scalability, sustainability and, of course, security.
Posted: 07 Mar 2015 | Published: 07 Mar 2015

Maas360 by IBM

Cyber Risk Report 2015 - Executive Summary
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad overview of the threat landscape and how hackers operate.
Posted: 05 Mar 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This 2015 cyber risk report provides a broad view of the 2014 threat landscape and gives you the information you need to protect your business.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Hewlett-Packard Company

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015

IBM

The Complete Guide To Google Apps Security
sponsored by Datto, Inc.
WHITE PAPER: In this helpful guide, explore the available additional protection services and technologies for securing data stored in Google's cloud.
Posted: 04 Mar 2015 | Published: 07 Jan 2015

Datto, Inc.
1 - 25 of 710 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement