IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
1 - 25 of 791 Matches Previous Page  |  Next Page
The Spectrum of Mobile Risk: Understanding the Full Range of Risks to Enterprise Data From Mobility
sponsored by Lookout
WHITE PAPER: Download this white paper to discover a mobile risk matrix that will help organizations understand the prevalence of mobile risk surrounding software vulnerabilities, mobile app threats, behavior and configurations and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Lookout

Understanding IoT: Performance across Use Cases, Regions, and Vertical Markets
sponsored by Aruba Networks
EBOOK: This e-book examines which use cases, geographical regions, and vertical industries are benefiting most from a well-executed IoT strategy. Explore case studies about IoT smart cities, connected automobiles, smarter healthcare, and uncover tips from Kevin Ashton, the "father of IoT," on how to get started with your IoT strategy.
Posted: 23 Jun 2017 | Published: 31 Mar 2017

Aruba Networks

The Internet of Things: Posing Security Threats and Delivering Beyond Expectations
sponsored by Aruba Networks
WHITE PAPER: Not only are many early adopters struggling to secure IoT devices and apps, but many organizations disagree on what IoT means and how to extract value from it. Discover how different industries define, use, and benefit from IoT by creating "smart workplaces," increasing innovation, enhancing customer experiences, and more.
Posted: 23 Jun 2017 | Published: 31 Mar 2017

Aruba Networks

Cost Savings and ROI Enabled by IBM API Connect
sponsored by IBM
WHITE PAPER: The following study conducted by Forrester consulting provides a framework to evaluate the potential financial impact of IBM API Connect on developing new opportunities for developers. Learn how 32 IBM users fared with accelerating development and time to market.
Posted: 21 Jun 2017 | Published: 28 Feb 2017

IBM

An App - Centric Approach to Mobile Security in Healthcare
sponsored by Blue Cedar
WHITE PAPER: In this brief white paper, learn about a new mobile security suite that makes protecting your devices as simple as downloading one application.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Blue Cedar

Sungard AS Data Protection Customer Case Study
sponsored by Dell EMC and Intel®
CASE STUDY: Explore how Sungard AS implemented a scalable data protection infrastructure that enables faster backups and disaster recoveries. Find out how they created a "Protect My Data" managed data vaulting service, expanded protection storage for virtually any app, improved deduplication and backups, and more.
Posted: 16 Jun 2017 | Published: 31 Dec 2016

Dell EMC and Intel®

Software Asset Management: Critical for Mitigating Non-Compliance Risks
sponsored by Flexera Software
WHITE PAPER: This IDC white paper defines software asset management and emphasizes the factors driving its importance. Uncover best practices for mitigating the risks of inefficient software portfolio management and addressing 3 key priorities, namely app security, cost management, and quality of service.
Posted: 16 Jun 2017 | Published: 28 Feb 2017

Flexera Software

Secure the App, Not the Device. Accelerate the Benefits of Mobility
sponsored by Blue Cedar
EBRIEF: Open up this solution brief to learn about the current state of mobile security, and how the app, not the device became the center for security operations. Then, learn about a new way to inject security code into pre-existing app without disrupting the user experience.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Blue Cedar

11 Policies to Keep Your Apps Secure
sponsored by Blue Cedar
WHITE PAPER: This white paper outlines a suite of app platform policies to help you secure your applications and govern who has access to them, including certificate management, network integration control, secure microtunnels to application's back-end service, and more.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Blue Cedar

The App is the Endpoint
sponsored by Blue Cedar
WHITE PAPER: Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Blue Cedar

Delivering A Consumer-Simple, Enterprise-Secure Mobile Experience
sponsored by VMware
RESOURCE: Access this infographic to find out how mobility and BYOD are changing the enterprise as much as the introduction of the Internet did.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

VMware

Building a World-Class Web Application Security Program
sponsored by Rapid7
CASE STUDY: Read this case study to learn the criteria that went into Microsoft's decision making process when buying their new web application vulnerability scanning system.
Posted: 08 Jun 2017 | Published: 08 Jun 2017


Application Security Buyers Guide: 15 Requirements
sponsored by Rapid7
WHITE PAPER: In this white paper, learn the 15 elements you need to make sure an application scanning vendor has before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017


7 Questions to Ask Your Dynamic Application Security Scanning Vendor
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017


The Latest Strategies for New Security Challenges
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how you can improve your protection and visibility while reducing operating complexity to meet tomorrow's security needs.
Posted: 05 Jun 2017 | Published: 03 Apr 2017

Fortinet, Inc.

When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017

BDNA

Building Modern Apps For The Age Of The Customer
sponsored by Salesforce
EBOOK: What does it take to build a modern app in the age of the customer? This e-book explores a platform that enables you to easily build, connect, optimize, and deploy every kind of app. Find out how anyone in your business--from developers to admins--can build apps.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Salesforce

8 Steps to Building Great Mobile Apps
sponsored by Salesforce
WHITE PAPER: Delivering the next generation of apps requires solid strategy, design, and execution at every step. This e-book is your guide to the eight key steps for building a mobile app. Learn about the anatomy of a successful mobile app, how they are evolving, and ensure your apps can be continuously upgraded for future success.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Salesforce

Patching for businesses –from Manual to Automated
sponsored by GFI
WHITE PAPER: In this white paper, learn about the importance of patch testing, what some of today's dangerous Trojan programs are and what they do, as well as a device-blocking system perfect for SMBs.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

GFI

Comprehensive Data Security In The Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017

Palo Alto Networks

6 Key Security Considerations for Responsible Cloud Migration
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper explores how to execute a safe and successful cloud migration. Uncover 6 key security considerations when moving enterprise data and apps to the cloud.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

15 Endpoint Security Suites Compared
sponsored by Symantec & Blue Coat Systems
RESEARCH CONTENT: Access Forrester's 25-criteria evaluation of endpoint security suite providers to learn market trends and uncover how 15 vendors match up.
Posted: 26 May 2017 | Published: 19 Oct 2016

Symantec & Blue Coat Systems

Safe Adoption of Cloud Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Gartner predicts that nearly 40% of enterprise IT application spend will be shifted to cloud versus on-premise by 2020. Access this white paper for major considerations you will need to focus on when looking for cloud app security.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

Digital Transformation: Why Financial Services Companies Are Adopting A Suite Approach To Software
sponsored by NetSuite
WHITE PAPER: As the pace of change continues to accelerate in the financial services industry, digital transformation has become key for staying ahead of the curve. But where to begin on the digital transformation journey? Learn how to take the first step for your financial services firm to keep competitive, improve application security, and more.
Posted: 23 May 2017 | Published: 23 May 2017

NetSuite

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.
1 - 25 of 791 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement