IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
1 - 25 of 839 Matches Previous Page  |  Next Page
Fast Track Your Office 365 Deployment and Beyond
sponsored by OneLogin
WEBCAST: Access this informative webinar, featuring EMM industry leader SOTI, to discover hidden Office 365 roadblocks and headaches, how to automate on-and off-boarding of users in real time to achieve both business agility and security, and how SOTI quickly deployed Office 365 and achieved ROI in just one week.
Posted: 26 Aug 2016 | Premiered: Jul 1, 2016

OneLogin

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

The 411 on Mobile Application Security Testing and Runtime Protection for iOS Applications
sponsored by IBM
WEBCAST: This webcast provides best practices for mobile application testing for security vulnerabilities and protecting them at runtime, with a special emphasis on iOS applications. You'll learn how to protect your ever-expanding portfolio of mobile apps, to stay one step ahead of the rush-to-release phenomenon.
Posted: 25 Aug 2016 | Premiered: Jul 1, 2016

IBM

Five Signs It’s Time for Mobile Workspace Delivery
sponsored by Citrix
WHITE PAPER: Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.
Posted: 25 Aug 2016 | Published: 29 Jul 2016

Citrix

The Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business ApplicationsThe Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business Applications
sponsored by Onapsis
WHITE PAPER: Discover how SAP implementations have transformed through each technology trend such as cloud, mobile, big data and IoT. Learn why securing SAP applications is critical to accelerate the adoption of these new technology paradigms and to enable companies to realize the maximum value from their investment in SAP solutions.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

Account Takeover How Hacking Happens in 2016
sponsored by IMMUNIO, Inc.
WHITE PAPER: This white paper helps you understand what's inside the head of a modern cybercriminal and the techniques they use to steal your hard earned data. Through this understanding, you'll be able to improve your security posture and reduce the likelihood of a breach quickly.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

Simplifying the Complexity of the Internet of Things
sponsored by Xively by LogMeIn
RESEARCH CONTENT: To understand exactly what it takes to create strong IoT products and engage customers, Forrester conducted research into the key priorities and objects of IoT manufacturers. Access this report to explore their 4 key findings about product differentiation, device management, IoT data analysis, and third party support for manufacturers.
Posted: 25 Aug 2016 | Published: 30 Jun 2016

Xively by LogMeIn

Protecting Mission-Critical Source Code from Application Security Vulnerabilities
sponsored by IBM
WEBCAST: In this webcast, you'll learn how to test application source code for potential security vulnerabilities, so you can confidently release your organization's applications.
Posted: 24 Aug 2016 | Premiered: Jul 1, 2016

IBM

Making the Case for Application Security Testing on Cloud
sponsored by IBM
WEBCAST: It presents to you the pros and cons of application security testing and penetration testing techniques. Discover how you can combat application security threats conveniently and effectively in the cloud.
Posted: 24 Aug 2016 | Premiered: Oct 20, 2015

IBM

Manage risk by protecting apps, data and usage
sponsored by Citrix
WHITE PAPER: This white paper teaches you best practices to control apps and modern methods to secure your mobile workforce. Discover how to assure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

Strategy Guide for Securing the SAP Landscape
sponsored by Onapsis
WHITE PAPER: Your organization should be thinking about how best to protect SAP systems. Learn how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.
Posted: 24 Aug 2016 | Published: 01 Jun 2016

Onapsis

Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

IBM

Above Security Delivers Customer Value
sponsored by Above Security
WEBCAST: It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.
Posted: 23 Aug 2016 | Premiered: Jun 3, 2016

Above Security

Day in the Life of a Security Admin
sponsored by RSA Softcat
WHITE PAPER: Luckily for your CISO, it's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements directed by the CISO for each application for any user, from anywhere, to anything.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Onapsis Research Labs: SAP Systems Security Analysis
sponsored by Onapsis
WHITE PAPER: This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 22 Aug 2016 | Published: 29 Feb 2016

Onapsis

Transform your "Good Backup" to Efficient App Availability And Recovery
sponsored by Dell, Inc.
WHITE PAPER: Discover a data protection solution with recovery options and tools that enable enterprises to achieve optimal application availability and fast restores. This single solution can provide your enterprise with the abilities to centralize data protection and recovery across your environment, recover from public cloud storage providers, and more.
Posted: 22 Aug 2016 | Published: 31 May 2016

Dell, Inc.

Information Security and Data Privacy Practices
sponsored by Gigya
WHITE PAPER: Explore several information security and data privacy practices that will enable you to better protect your data. Topics discussed include infrastructure, data security, compliance, privacy, and more.
Posted: 18 Aug 2016 | Published: 29 Jul 2016

Gigya

Advanced Persistent Threats and the Case for a Security Intelligence and Response Program
sponsored by Above Security
WHITE PAPER: Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

Above Security

Application Defense In Depth
sponsored by IMMUNIO, Inc.
WHITE PAPER: The best security solutions for web applications build a layer of protection inside and around your apps. Learn how to control access, monitor activity and clean-up input to your applications. Paint an accurate picture of your threat environment to get actionable reports when vulnerabilities are found within your applications.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

Comparing App Security Strategies: WAFs vs. RASP
sponsored by IMMUNIO, Inc.
WHITE PAPER: Examine the current threat landscape for web applications and the approaches you should take to secure those applications. Uncover a comparison of one of the most common approaches – Web Application Firewalls (WAFs) - with the most recent addition to the application protection arsenal, Run-Time Application Self-Protection (RASP).
Posted: 16 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

Optimize Application Life Cycle with a Hybrid Cloud Strategy
sponsored by NetApp
WHITE PAPER: In this white paper, you will discover how to create a seamless app development process by leveraging a hybrid cloud strategy. Access now to uncover a 3-phase approach to a faster app lifecycle.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

NetApp

Web Application Security: Is your Site Vulnerable to Attackers?
sponsored by Akamai
RESOURCE: This short infographic shows you the importance of intelligent security for your web applications including the necessity of a web application firewall (WAF). Learn how to seamlessly integrate and manage a cloud-based WAF to keep hackers out of your business.
Posted: 12 Aug 2016 | Published: 01 Jul 2016

Akamai

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel
1 - 25 of 839 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement