IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application Security Reports
1 - 25 of 671 Matches Previous Page  |  Next Page
Cloud Readiness: Securing Access to Your Private Cloud
sponsored by Ping Identity Corporation
EBOOK: This eBook explains the benefits of moving enterprise applications to the cloud and describes how to keep your applications and data secure during this process.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Ping Identity Corporation

Web Application Security for Dummies
sponsored by Qualys
EBOOK: This e-book explains how to quickly locate and remediate vulnerabilities in order to prevent attackers from gaining control over the application and obtaining access to the server, database, and other back-end IT resources.
Posted: 26 Jan 2015 | Published: 30 Dec 2011

Qualys

Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys

Learn why NSS Labs Recommends NetScaler AppFirewall
sponsored by Citrix
WEBCAST: This exclusive webcast takes an in-depth look at application firewalls and includes a study of how one web application firewall (WAF) was able to toe the line and meet industry standards. Read on to learn more.
Posted: 26 Jan 2015 | Premiered: Jan 26, 2015

Citrix

SSL Offloading and Acceleration in Virtualized Environments
sponsored by Array Networks
WHITE PAPER: Access this white paper to find out how you can ensure high performance in both virtualized cloud and data center environments.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Array Networks

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This white paper explains how a Web Application Scanning solution can help you to locate and test web-based apps, and provides a checklist of best practices that will help you to understand what to look for when selecting a WAS solution.
Posted: 23 Jan 2015 | Published: 16 May 2013

Qualys

Web Application Firewall Comparative Analysis
sponsored by Citrix
WHITE PAPER: This valuable resource compares the security effectiveness and value of six web application firewalls (WAFs).
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Citrix

A Quick Guide to SSL for Apps
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

SSL for Apps: Best Practices for Developers
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the necessary steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

To Increase Downloads, Instill Trust First
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.
Posted: 19 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

What if your App Virtualization Solution Didn't Support Location-Based Security?
sponsored by Dell
VIDEO: In this video, Brian Madden faces what happens if application virtualization solutions doesn't support location-based security.
Posted: 19 Jan 2015 | Premiered: 19 Jan 2015

Dell

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this shortcut guide, readers will learn how changes in the way we deliver services, the increasing use of mobile devices, the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave web applications vulnerable to attack.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

5 Steps For Windows Server 2003 End of Life Success
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper today to learn the 5 steps that your organization needs to take now to ensure that your enterprise is prepared for Microsoft Windows Server 2003's end-of-life in six short months.
Posted: 14 Jan 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

How Mobile Security Is Shifting From Device To Data, Apps
sponsored by CommVault
WHITE PAPER: In this e-guide, learn why enterprise mobile security is no longer as simple as protecting an employee's device, and how CommVault is shifting with the industry and providing backup to people other than storage admins. Read on to learn more.
Posted: 08 Jan 2015 | Published: 08 Jan 2015

CommVault

It's Time to Get Serious About Protecting Sensitive Data in Transit
sponsored by Certes Networks
WHITE PAPER: This white paper explains why it's long past time to get serious about protecting your sensitive data as it travels across networks, and also lists 3 steps that you can take to avoid being a hacking statistic in 2015.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

Certes Networks

The Global State of Enterprise Mobility 2014/15
sponsored by ComputerWeekly.com
RESEARCH CONTENT: An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.
Posted: 05 Jan 2015 | Published: 05 Jan 2015

ComputerWeekly.com

6 Questions to Keep You Grounded in the Cloud
sponsored by Dell, Inc.
WHITE PAPER: This helpful white paper provides a list of 6 questions that you should always ask in the course of comparing cloud service providers.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Dell, Inc.

Defend web properties from modern threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Check out this white paper to discover the challenges of defending modern web properties from modern threats, as well as an application delivery controller (ADC) that works hand in hand with advanced malware protection and high-profile security products.
Posted: 16 Dec 2014 | Published: 31 Dec 2013

Citrix

Defend Against Injection-Based Attacks
sponsored by Rogue Wave Software
WHITE PAPER: In this informative paper, discover some of the most common security vulnerabilities currently plaguing the software development industry, and learn how static code analysis (SCA) can detect them.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Rogue Wave Software

Why Mobile Needs A Four-Tier Engagement Platform
sponsored by Kony
WHITE PAPER: Access this in-depth Forrester research report to discover why mobile needs a four-tier engagement platform. Read on to discover the 4 steps to take toward the four-tier engagement architecture.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

Kony

Application Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn about new app security tools you can use to vet open source libraries and manage security vulnerabilities.
Posted: 01 Dec 2014 | Premiered: 02 Dec 2014

SearchSecurity.com

Take Inventory of your Open Source Software Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why enterprise development teams should create in-house repositories to mitigate the risks of applications built on open source code.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.
1 - 25 of 671 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement