IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
1 - 25 of 760 Matches Previous Page  |  Next Page
Protecting against Application Logic and Session Theft Attacks
sponsored by Barracuda Networks
WHITE PAPER: This white paper discusses the danger of application logic attacks and gives a five-step process for proactively staying secure against them.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Barracuda Networks

API Management Designed for the Cloud: Getting Started
sponsored by IBM
WHITE PAPER: This white paper highlights a multi-tenant cloud-based service for API development. Access this white paper to learn how to rapidly design, secure, manage, and analyze APIs to reach both internal and external developers.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

IBM

Web Application Firewall vs. Intrusion Prevention Systems (IPS)
sponsored by Barracuda Networks
WHITE PAPER: This white paper compares IPS and web application firewalls, detailing the pitfalls of relying on IPS to defend app data today.
Posted: 03 Sep 2015 | Published: 19 Aug 2015

Barracuda Networks

How to Develop Mobile Applications Using Windows 10
sponsored by Pluralsight
WEBCAST: In this webinar, Windows Platform Development MVP and Pluralsight author Lars Klint outlines the Windows 10 upgrade and what it brings to bear on developing enterprise mobile applications, including benefits and services Windows offers as an app developer platform.
Posted: 03 Sep 2015 | Premiered: Sep 3, 2015

Pluralsight

Shadow Data: Why Traditional Security Leaves Your Organization Vulnerable
sponsored by Elastica
WHITE PAPER: This exclusive white paper reviews Shadow Data trends to provide insights into data security and compliance issues.
Posted: 01 Sep 2015 | Published: 29 Jul 2015

Elastica

Keeping Your Mobile Security Strategy on Pace
sponsored by Lookout
EGUIDE: This expert e-guide outlines the advancement of mobile security threats and how IT is failing to address them.
Posted: 31 Aug 2015 | Published: 21 Aug 2015

Lookout

Think Like A Cybercriminal: Presenting the Mobile Security Landscape
sponsored by ControlEmail
WHITE PAPER: This white paper examines the mobile email threat landscape and how hackers are taking advantage of the flaws in mobile security strategies. Continue reading to get inside the mind of a hacker to learn how you can fortify your mobile security approach.
Posted: 28 Aug 2015 | Published: 31 Dec 2014

ControlEmail

Delivering Windows Apps to Chromebooks: The Best of Both Worlds?
sponsored by Citrix and Google
WHITE PAPER: This white paper suggests one way you can deliver Windows apps and to Chromebooks in an easy and cost-effective manner. Access it now to learn how you can get the best of both worlds with this app delivery system.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Citrix and Google

Empower Your Workforce with More Secure Mobility
sponsored by Citrix and Google
WHITE PAPER: This white paper examines the application security architecture of Google Chromebooks and how they protect against emerging security threats. View now to learn the pros and cons of these devices for your security strategy.
Posted: 27 Aug 2015 | Published: 18 Mar 2015

Citrix and Google

Unified Network Solutions Case Study: Kettering Health Network
sponsored by F5 Networks
WHITE PAPER: This white paper demonstrates how the KHN was able to achieve access to its electronic medical records system and other apps for its remote users. Read on here to key into the benefits of a unified network solution.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

F5 Networks

Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about the prevalence of jailbroken iOS devices and how to protect against jailbroken device risks.
Posted: 25 Aug 2015 | Published: 24 Jun 2015

Lookout

Managing App Sideloading Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about how attackers sideload iOS apps and how to mitigate those threats.
Posted: 25 Aug 2015 | Published: 19 Aug 2015

Lookout

Demand Secure and Durable Enterprise Performance with Tablets
sponsored by Panasonic - Microsoft
WHITE PAPER: This white paper serves as a guide for how to find tablets that will adapt to your shifting enterprise application demands. Read on here to evaluate several rugged tablet platforms designed to boost mobility and productivity.
Posted: 25 Aug 2015 | Published: 28 Feb 2014

Panasonic - Microsoft

Top 5 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Simplify and Mobilize Any Business Workflow Securely by Next Week
sponsored by Citrix and Capriza
WEBCAST: In this webinar, you'll learn what it takes to rapidly design and securely deploy apps for your critical business workflows. View now to gain the opportunity to watch as a customized app is designed and deployed in 10 minutes, without the need for complex APIs or writing code.
Posted: 20 Aug 2015 | Premieres: Sep 22, 2015

Citrix and Capriza

Application Session Filtering
sponsored by Gigamon
PRODUCT LITERATURE: This feature brief discusses a way to filter your applications in order to optimize application inspection and identification.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Gigamon

What to Look For in a Web Application Scanner
sponsored by SearchSecurity.com
EBOOK: With so many Web applications on enterprise networks today, a scanner is essential to security. Here's what you need to know if you're in the market for a Web app scanner.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SearchSecurity.com

Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013

HID

Protect Your Business Critical Apps from Compromise
sponsored by Onapsis
WHITE PAPER: This white paper describes how, with technologies ranging from vulnerability management to advanced threat protection, you can make sure your SAP applications stay secure.
Posted: 18 Aug 2015 | Published: 31 May 2015

Onapsis

The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: This report examines the current state of security threats to iOS and Android devices in the workplace.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Lookout

Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

Developing Advanced Applications in Your Enterprise with Optimum Server Applications
sponsored by IBM
WHITE PAPER: This e-book introduces a solution for developing the advanced applications and gives an overview of the Liberty profile and its tools. This book also demonstrates the use of multiple open source frameworks or toolkits with the Liberty profile server, including Maven, MongoDB, Spring, JPA, Arquillian, Wicket, and others.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

IBM

Configuring and Deploying Open Source with WebSphere Application Server Liberty Profile
sponsored by IBM
WHITE PAPER: Enterprises are always searching hard for a capable platform for developing and testing web and OSGi applications. This e-book demonstrates the use of multiple open source frameworks or toolkits with the Liberty profile server, including Maven, MongoDB, Spring, JPA, Arquillian, Wicket, and others.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

IBM

Guide for Developers: WebSphere Application Server Liberty Profile
sponsored by IBM
WHITE PAPER: This e-book highlights how best to configure enterprise application security to fit your organization, and serves as an outline for using the WebSphere Application Server V8.5 Liberty profile along with the WebSphere Application Server Developer Tools for Eclipse.
Posted: 17 Aug 2015 | Published: 10 Aug 2015

IBM

A Simple Guide to Successful Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses the importance of penetration testing and presents six steps to doing it effectively.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies
1 - 25 of 760 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement