IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
1 - 25 of 792 Matches Previous Page  |  Next Page
Data Theft Prevention The Key to Security, Growth & Innovation
sponsored by Forcepoint
WHITE PAPER: This white paper shows you a holistic approach to protecting your critical data. Learn about cybersecurity from a Data Theft Prevention perspective, which is broader in scope and more effective in defending sensitive information.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Rapid Recovery, Live Recovery: Recover From a System Failure in Minutes
sponsored by Dell Software
WHITE PAPER: This white paper highlights "live recovery," a recovery solution that instantly runs or resumes physical or virtual machines on any virtual platform, directly from the backup file. Read on to witness a demo of this recovery solution that shows how you can recover a sever failure in a few simple steps,
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Dell Software

Comprehensive data protection for physical, virtual and cloud infrastructures
sponsored by IBM
WHITE PAPER: This white paper talks about steps you should take to best protect your virtualized cloud data.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

A Foundation for Next-Generation Datacenter and Cloud-Based Security
sponsored by Citrix
WHITE PAPER: Your data is a constant target for cybercriminals. Not only are they coming up with new threats, but they are constantly improving the existing ones. With more technology at your fingertips, attackers have more choices. Access this white paper to learn about a security solution that covers your datacenter and the common attack avenues.
Posted: 22 Apr 2016 | Published: 29 May 2015

Citrix

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM
WHITE PAPER: This white paper teaches you how to safely embark on your own BYOD program. The main goal is to show you how BYOD is a feasible option for your organization by seamlessly securing corporate data and applications on each devices while providing separation from personal activity and data.
Posted: 22 Apr 2016 | Published: 01 Mar 2016

IBM

Protect Your APIs
sponsored by MuleSoft
WHITE PAPER: Access this white paper to discover how you can leverage a platform that can ensure your API is highly available while guaranteeing integrity and confidentiality of your information.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

MuleSoft

The Future of Simpler, Faster VDI Technology
sponsored by WorkSpot
WEBCAST: Exactly how important is VDI to the modern enterprise? Tune into this webinar now to learn about the future of VDI and how to overcome your desktop delivery conundrums. View now to also discover how important architecture is to secure application delivery.
Posted: 21 Apr 2016 | Premiered: Apr 21, 2016

WorkSpot

The Biggest Security Challenges for Embedded and Mobile Development amid the Rise of IoT
sponsored by Programming Research
EGUIDE: Internet-enabled devices are wreaking havoc on application development and security professionals. Explore the major challenges that complicate embedded and mobile security and 7 questions to keep in mind when developing secure applications.
Posted: 20 Apr 2016 | Published: 19 Apr 2016

Programming Research

Three ways AirWatch secures mobile Office365 applications
sponsored by VMware
EGUIDE: This e-guide shows how you can better manage business applications on BYOD and corporate-owned mobile devices. Learn how to encrypt important organizational information and lock down apps across all personal, mobile devices.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

VMware

Expert Advice for Software Security Testing (Including Embedded Systems)
sponsored by Programming Research
EGUIDE: What's the difference between security for embedded software and regular software testing? This two-part e-guide reveals best practices for security testing embedded software. Inside, discover how threat modeling can ensure a secure embedded system.
Posted: 20 Apr 2016 | Published: 18 Apr 2016

Programming Research

Securing the Internet of Things: 6 Crucial Steps
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Although a majority of large companies are actively working on Internet of Things (IoT) initiatives, data security continues to be a low priority for boards of directors. This resource explores the new security risks prompted by the IoT and reveals 6 crucial actions that CIOs need to take to counteract them.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

Hewlett-Packard Enterprise

SD-WAN: Application Performance Routing
sponsored by Fatpipe, Inc.
WHITE PAPER: SD-WAN is becoming increasingly vital to everyday operations, especially application functionality. Access this white paper to learn how the need to reduce costs surrounding applications is changing traffic patterns and how SD-WAN is providing solutions.
Posted: 19 Apr 2016 | Published: 06 Apr 2016

Fatpipe, Inc.

Turn iOS, Android or BlackBerry Devices into Security Tokens
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn about two-factor user authentication by leveraging passwords and users' devices. Access now and learn how to reduce associated operational costs and increase productivity with a modern authentication system.
Posted: 18 Apr 2016 | Published: 02 Mar 2016

BlackBerry

Securing Mobility Management in the Cloud
sponsored by BlackBerry
WHITE PAPER: Discover how to securely manage mobile devices and other endpoints across different operating systems ownership models. Learn how to manage your mobile workers' access to apps, data and content, all from a single, easy-to-use console.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper provides business planners with informative details on how to maintain strong security and PCI DSS compliance in a distributed retail environment. Access now for tools on how to keep applications, data and networks safe and PCI DSS compliant.
Posted: 15 Apr 2016 | Published: 01 Jan 2014

WatchGuard Technologies, Inc.

The Mobile Enterprise: Is Ease of Use Overriding Security?
sponsored by BlackBerry
WHITE PAPER: Enterprises are relying on native applications to mobilize their Microsoft environments despite major security threats. A recent survey displays the decision-making process when balancing the advantages and trade-offs associated with the four primary methods of mobilizing those apps.
Posted: 15 Apr 2016 | Published: 31 Mar 2016

BlackBerry

Three ways AirWatch secures mobile Office365 applications
sponsored by VMware
EGUIDE: This e-guide shows how you can better manage busienss applications on BYOD and corporate-owned mobile devices. Learn how to encrypt important organizational information and lock down apps across all personal, mobile devices.
Posted: 14 Apr 2016 | Published: 11 Apr 2016

VMware

VMware identity management adds SSO to AirWatch
sponsored by VMware
EGUIDE: This e-guide shows you how to better manage network access from mobile devices with a single sign-on (SSO) application. Access now to gain better security across all your remote locations while also adding ease of access for authorized users.
Posted: 14 Apr 2016 | Published: 11 Apr 2016

VMware

Illuminate Shadow IT and Securely Manage BYOX
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper discusses BYOX and explores strategies and solutions for embracing the business productivity aspects of a BYOX workforce culture. Access now to learn how you can promote a faster, flexible and mobile workforce while protecting your organization from security pitfalls.
Posted: 14 Apr 2016 | Published: 01 Apr 2013

WatchGuard Technologies, Inc.

The CIO’s Guide to EMM
sponsored by BlackBerry
WHITE PAPER: Developing and evolving a proper mobile strategy can spell the difference between success and failure in today's business landscape. Are you sure your mobile strategy is meeting the requirements for success in the evolving enterprise mobility landscape?
Posted: 14 Apr 2016 | Published: 04 Apr 2016

BlackBerry

Case Study: API Gateway Secures Public APIs and Minimizes Costs
sponsored by Axway
CASE STUDY: APIs can help enterprises roll out apps quickly, but exposing them to third parties can create security issues. In this case study, discover the API gateway that enabled the energy supplier First Utility to secure their publicly available APIs, optimize performance and scalability, and accelerate time to market.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

Axway

Solving the Top 11 API Threats
sponsored by Axway
WHITE PAPER: How can you ensure that APIs offer optimal functionality while minimizing their security vulnerabilities? Discover the 11 most critical API threats and the countermeasures that can help you thwart them.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

Axway

The Key to Protecting Your Business Amid Cybercrime’s Current Boom
sponsored by CA Technologies
WHITE PAPER: This white paper invites you to explore new vulnerabilities in our application-centric culture. Find relief as you uncover a simple-to-deploy, automated, proven strategy for privileged access management delivered in a single appliance protecting physical, virtual and cloud environments.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

CA Technologies

How Cloud Services Giant Exostar Protected Sensitive Data and Applications
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

VMware, Inc.

The Next Step in Mobility: Virtual Mobile Infrastructure
sponsored by Sierraware
EGUIDE: Virtual mobile infrastructure (VMI) is an emerging technology with a promising future that is going to change the way that mobile apps are run and utilized across different platforms. This exclusive guide, Brian Madden discusses what you need to know about VMI and what it means for the future of mobile devices.
Posted: 15 Apr 2016 | Published: 06 Apr 2016

Sierraware
1 - 25 of 792 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement