IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityReports
1 - 25 of 654 Matches Previous Page  | Next Page
Best Practices in BYOD: Addressing BYOD Challenges in the Enterprise
sponsored by BlackBerry
WHITE PAPER: This white paper investigates the key challenges seen with BYOD today and how this particular solution works to combat any troubles.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

ROI and Benefits of a Cloud-Based Application Security Service
sponsored by Veracode, Inc.
WHITE PAPER: In this report from Forrester Research, Inc., discover the potential ROI you could achieve by deploying a cloud-based application security service. Explore the costs and risk of this technology, and weigh them with the benefits you could experience.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

Veracode, Inc.

Mobile Apps are the Future - Is Your Enterprise Ready?
sponsored by BlackBerry
WHITE PAPER: View this white paper to explore how mobile apps are improving productivity and collaboration across the enterprise, discover options for mobile development tools, and compare native, web-based, and hybrid options. Plus, learn the three most important factors to consider in order to get the most value from mobile apps.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

BlackBerry

8 Patterns of Secure Agile Teams
sponsored by Veracode, Inc.
WHITE PAPER: Secure application development can be challenging for Agile teams, as short Agile sprints don't lend themselves well to the time-consuming process of finding and fixing application vulnerabilities. In this white paper, discover eight best practices for integrating security and Agile development.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

Veracode, Inc.

Out with the Old, in with the New: Modernizing Applications
sponsored by Dell, Inc.
EGUIDE: Not all applications that run successfully on-premise can be easily migrated to the cloud. This expert e-guide serves as a guide to application modernization, and offers a checklist to help you mitigate risk during legacy modernization.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

Dell, Inc.

An EMM Checklist for CIOs: Factors to Consider When Choosing an EMM Solution
sponsored by BlackBerry
WHITE PAPER: For help deciding on an Enterprise Mobility Management (EMM) solution consider the issues in the following white paper. It's derived from third-party research and best practices. It covers the critical areas you'll need to think through as you arrive at a decision. It also provides a CIO's Guide to EMM.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

BlackBerry

IBM X-Force Threat Intelligence Quarterly, 6/14: The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Application Delivery Optimization: Business And Technology Issues
sponsored by CA Technologies.
EGUIDE: This expert e-guide discusses the challenges of the virtual enterprise, why response time is key for application optimization and more.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CA Technologies.

DNS Challenges in a Changing Landscape
sponsored by F5 Networks
RESOURCE: View this infographic to discover common challenges of DNS management, and get the stats on the top availability and security concerns of DNS administrators, including outages and DDoS attacks.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

F5 Networks

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: This white paper explores the growing world of mobile application development and highlights the benefits of providing security for mobile applications during the development and deployment stages.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

IBM

Facebook Secures Remote Access and Optimizes Virtual Application Environment
sponsored by F5 Networks
WHITE PAPER: Facebook wanted to upgrade the performance and availability of their virtual application environment, as well as improve the security of their remote access portal. In this case study, learn how Facebook achieved these goals by implementing an application delivery technology that ensures applications are fast, secure and available.
Posted: 17 Jul 2014 | Published: 23 May 2014

F5 Networks

Harnessing the tyranny of autonomy: the Dropbox problem and the manager’s dilemma
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to discover whether your employees should be able to share information that improves productivity, or if it should be tightly controlled for privacy and security purposes
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IntraLinks, Inc

Securing Your PKI Building Trust You Can Depend On
sponsored by Thales
WHITE PAPER: Discover several security risks of typical enterprise and government PKIs and why higher assurance solutions are vital for security purposes.
Posted: 16 Jul 2014 | Published: 01 Feb 2013

Thales

Thales Solution for Microsoft Active Directory Certificate Services
sponsored by Thales
WHITE PAPER: Access a seamless solution that issues, manages, and validates digital identities that are used to verify an individual or a system.
Posted: 16 Jul 2014 | Published: 01 Feb 2013

Thales

Security Solutions for Every Layer of Your IT Environment
sponsored by CDW Corporation
RESOURCE: View this infographic now to learn about critical security concerns within every layer of your IT environment and the steps that you can take to prevent these dangerous threats.
Posted: 16 Jul 2014 | Published: 16 Jul 2014

CDW Corporation

Fast, Secure, and Always-Available Application Delivery
sponsored by F5 Networks
CASE STUDY: As a managed cloud hosting provider, Bulletproof Networks needed to provide their customers with highly -available applications and services. View this case study to learn how Bulletproof leveraged an application delivery networking technology to ensure fast, secure, and always-available application delivery to their users.
Posted: 15 Jul 2014 | Published: 07 Jul 2014

F5 Networks

2014 Gartner Magic Quadrant for Web Application Firewalls
sponsored by Imperva
ANALYST REPORT: Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Mitigating the OWASP Top 10 2013 with Imperva SecureSphere
sponsored by Imperva
WHITE PAPER: This informative guide outlines an effective tool designed to help mitigate the OWASP top 10 and how it can greatly enhance your enterprise security.
Posted: 08 Jul 2014 | Published: 31 Dec 2013

Imperva

Appropriate Third Party Software Security Controls
sponsored by Veracode, Inc.
WHITE PAPER: This informative whitepaper explores the appropriate security controls for your third party services and software.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Veracode, Inc.

Understanding the Risks of Mobile Applications
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper for a primer on the mobile application security landscape. Explore the top risks for mobile applications and learn what you can do to mitigate them in your enterprise.
Posted: 07 Jul 2014 | Published: 28 Feb 2011

Veracode, Inc.

Ten Tips for Building a Successful Vendor Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: If you rely on commercial, outsourced, cloud and mobile applications, you need a plan for vendor security compliance. In this resource, get 10 tips for building a successful vendor application security plan.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Veracode, Inc.

Streamline Compliance with Cloud-based Application Security
sponsored by Veracode, Inc.
DATA SHEET: This white paper introduces a cloud-based application security platform that assesses mobile, web, and third-party applications for standard controls and ensures compliance with OX, HIPAA, NIST 800-53, MAS, and other mandates.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Veracode, Inc.

Mobile Application Security Survey Results
sponsored by Veracode, Inc.
WHITE PAPER: In this resource, explore the results of a survey on mobile application security. See what security threats businesses are most concerned about, how they're managing applications for end-users, and what security policies, practices, and test they implement.
Posted: 07 Jul 2014 | Published: 30 Jun 2013

Veracode, Inc.

A Practical Introduction to Enterprise Mobility Management
sponsored by Code42
WHITE PAPER: Check out this white paper to get a breakdown of how mobile device management (MDM) and mobile app management (MAM) can address today's challenges. Read on to get guidelines on how enterprise mobility management technology applies to your environment.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Code42

Behavioral Analysis: Why it's Key to Mobile App Security
sponsored by Veracode, Inc.
CASE STUDY: In this brief case study, learn how Veracode, an application security company, dealt with security testing for the third-party development of a custom mobile app for iOS and Android. Discover what happens when a security risk is identified, and learn the key steps to decision-making in response.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Veracode, Inc.
1 - 25 of 654 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement