IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application Security Reports
1 - 25 of 726 Matches Previous Page  |  Next Page
Application-Centric Infrastructure Streamlines IT
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper introduces a network infrastructure that combines most needs into one place for a more efficient and more effective IT.
Posted: 26 Mar 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

Demo: Full Server Replication Protection
sponsored by Vision Solutions
WEBCAST: Watch this brief webcast for a live demo of a program designed to make your replication process easy, efficient and, most of all, secure.
Posted: 26 Mar 2015 | Premiered: Oct 31, 2013

Vision Solutions

Empower a Mobile Workforce with Secure App Delivery
sponsored by Citrix
WHITE PAPER: Explore how to integrate security into the app development process and deliver secure native-like apps to multiple devices.
Posted: 26 Mar 2015 | Published: 11 Feb 2015

Citrix

Citrix NetScaler: A Foundation for Next-Gen Datacenter Security
sponsored by Citrix
WHITE PAPER: This white paper reveals how NetScaler is meeting modern demands for more robust datacenter security.
Posted: 25 Mar 2015 | Published: 01 Sep 2012

Citrix

Securing Applications for a Safer Cloud Environment
sponsored by IBM
WHITE PAPER: View this white paper to learn the five steps to combating application breaches in the cloud. Additionally, explore other protocols to reduce risk.
Posted: 25 Mar 2015 | Published: 09 Jul 2014

IBM

Case Study: Mitigating App Vulnerabilities Before Production
sponsored by IBM
CASE STUDY: In this case study, learn how one university was able to mitigate risk and vulnerabilities by taking advantage of a leading app scanning platform. Read on to explore how this platform enables the university's apps to comply with regulations and if it may be right for your organization.
Posted: 25 Mar 2015 | Published: 09 Apr 2014

IBM

With IoT on the Rise, Feel Secure with APIs and a DLP Strategy
sponsored by Axway
EGUIDE: In this expert guide, you'll learn how to take control of your data security as the Internet of Things ramps up by diving into application programming interfaces (APIs) and data loss prevention (DLP).
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Axway

The Processes of an Application Security Program
sponsored by Veracode, Inc.
WEBCAST: In this video, you can view a demo of how one application security program works.
Posted: 20 Mar 2015 | Premiered: Mar 4, 2014

Veracode, Inc.

Five Questions to Ask Your SaaS Provider Before Putting Sensitive Data in the Cloud
sponsored by SailPoint Technologies
WHITE PAPER: Identity governance helps professionals manage and control user access to sensitive applications and data. Access this white paper to find pertinent information for desicion-makers who are in the proces of considering the deployment of SaaS applications.
Posted: 20 Mar 2015 | Published: 29 Mar 2013

SailPoint Technologies

Case Study: Global 500 Company Integrates Security and Application Development
sponsored by Veracode, Inc.
WHITE PAPER: A global 500 company faced the challenge of balancing fast application development with security. This case study describes how they met that challenge.
Posted: 20 Mar 2015 | Published: 01 Jan 2015

Veracode, Inc.

Global Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
WHITE PAPER: A global 100 manufacturer faced the problem of securing an increasing number of applications. How they solved this problem can provide insights for other large enterprises seeking to do the same.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Veracode, Inc.

Securing Your Applications and Protecting Your Systems
sponsored by WhiteCryption
EGUIDE: Access this expert e-guide to explore the pros and cons of replication and erasure coding to help you determine which method of data protection is best for your data center. Also, learn why applications experts say frameworks that enforce secure coding provides a better way for developers to write apps that can withstand attacks.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

WhiteCryption

Desktop SSO: Simple Authentication for Greater Productivity
sponsored by OneLogin
WEBCAST: This webcast introduces a single sign-on (SSO) program that will enable users to access to all their cloud apps with one login.
Posted: 16 Mar 2015 | Premiered: Dec 17, 2014

OneLogin

How to Extend Active Directory to the Cloud
sponsored by OneLogin
WEBCAST: This webcast shows you how to integrate Active Directory and cloud-based apps for better security.
Posted: 16 Mar 2015 | Premiered: Nov 19, 2014

OneLogin

How to Automate User Provisioning
sponsored by OneLogin
WEBCAST: This webcast explores the risk of cloud applications and how you can ensure secure application management for your enterprise.
Posted: 16 Mar 2015 | Premiered: Mar 16, 2015

OneLogin

Is Mobile Access to Cloud Apps Putting Your Company At Risk?
sponsored by OneLogin
WEBCAST: This webcast discusses the security risks of mobile cloud apps and the best ways to mitigate them.
Posted: 16 Mar 2015 | Premiered: Mar 16, 2015

OneLogin

Verifying the integrity of open source Android apps
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how researchers can determine whether an app was built from its published source code.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Top 3 Identity Management Considerations When Implementing Google Apps for Work
sponsored by OneLogin
WHITE PAPER: In this white paper, explore the three Google Apps Directory Services (GADS) limitations and what it means for your organization. View now to learn how to overcome these challenges.
Posted: 11 Mar 2015 | Published: 03 Mar 2015

OneLogin

Defining a New Standard for Mobile Single Sign-On (SSO)
sponsored by OneLogin
WHITE PAPER: This white paper outlines a new standard protocol to provide SSO for mobile users through a token agent.  View now to learn more
Posted: 11 Mar 2015 | Published: 02 Mar 2015

OneLogin

Mobile SSO & the Rise of Mobile Authentication
sponsored by OneLogin
WHITE PAPER: In this white paper, uncover the top four considerations when defining your mobile and cloud identity strategy. Discover why Identity and Access Management (IAM)-as-a-Service (IDaaS) appears to be the golden ticket for organizations to get a handle on who can and can't access important data. Read on to learn more.
Posted: 11 Mar 2015 | Published: 25 Feb 2015

OneLogin

Clustering to counter Android malware
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how the rapid growth of new Android malware calls for automated tools to help malware analysts.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Combating Android app repackaging attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how apps repackaged through reverse engineering pose a big security risk to the Android smartphone operating system.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Enhanced Mobile Endpoint Security
sponsored by ESET
WHITE PAPER: This white paper describes a mobile endpoint security system that gives you anti-theft protection, drive security, application control and more.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ESET

Conquering the Top 5 AD Challenges
sponsored by OneLogin
WHITE PAPER: In thiw white paper, explore how one security platform connects your AD infrastructure and cloud applications to simplify and strengthen identity and access management (IAM).
Posted: 09 Mar 2015 | Published: 18 Feb 2015

OneLogin

Closing the Web App Data Security Gap
sponsored by IBM
WHITE PAPER: In this white paper, you will learn about one security platform that monitors, tracks, and reports on user activities accesing critical applications.
Posted: 09 Mar 2015 | Published: 08 May 2013

IBM
1 - 25 of 726 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement