IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityReports
101 - 125 of 695 Matches Previous Page  | Next Page
Five Simple Strategies for Securing APIs
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper examines security risks unique to APIs and discusses five simple solutions to these issues.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

CA Technologies.

Secure Cloud Applications Without Disrupting Your Enterprise Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features an on-premise federated identity service that helps you extent your existing identity and access management (IAM) infrastructures to the cloud.
Posted: 05 Jun 2014 | Published: 31 Dec 2012

Radiant Logic, Inc.

DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
WHITE PAPER: This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Posted: 30 May 2014 | Published: 30 May 2014

FireEye

Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

Application Security Advice: Stop Threats before They Start
sponsored by SearchSoftwareQuality.com
EBOOK: Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle.
Posted: 20 May 2014 | Published: 20 May 2014

SearchSoftwareQuality.com

IAM Systems Now Leverage Intelligence to Address Cloud and Mobile Apps
sponsored by IntraLinks, Inc
WHITE PAPER: This resource highlights the 4 newest roles for identity and access management (IAM) systems that enhance security for an expanding business environment.
Posted: 15 May 2014 | Published: 15 May 2014

IntraLinks, Inc

Next-gen Application Delivery Controllers: An Intelligent Path to Active-Active Clusters
sponsored by Citrix
WHITE PAPER: This informative guide explores the role of these next-generation ADCs and provides insight on their effectiveness.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

Why Customers Use Box with Office 365
sponsored by Box
WHITE PAPER: This whitepaper details a born-in-the-cloud platform solution and three ways organizations use it to deliver the application security and performance to please everyone.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Box

Structured Approach to Migrating Oracle Apps from a Physical to Virtual Environment
sponsored by VCE
WHITE PAPER: This paper presents a structured approach to migrating Oracle apps from a physical to a virtual environment. Inside, discover why this approach meets many of the challenges presented by the virtualization of Oracle databases and applications, and learn how you can get started.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

VCE

HIPAA Compliance: Sign on to Robust Access Controls
sponsored by Imprivata
WHITE PAPER: View this comprehensive white paper to learn how you can reduce the complexities of HIPAA compliance with single sign-on (SSO) technology.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Imprivata

Information Security: Insider edition
sponsored by TechTarget
RESOURCE: Keeping your organization's Web presence safe is a difficult task, especially with recent threats against Web applications. Simply take this 2 min survey and learn how you can help application developers acquire the necessary security tools and training to keep your Web presence protected!
Posted: 18 Apr 2014 | Published: 18 Apr 2014

TechTarget

Gaming Company Uses Cloud Infrastructure for Top Performance
sponsored by IBM
WHITE PAPER: In this brief case study, learn how KUULUU -- an interactive gaming company -- leveraged an Infrastructure-as-a-Service (IaaS) platform that could adjust to their dynamic infrastructure needs, so they didn't have to worry about downtime or security, enabling them to focus on their core mission.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

IBM

Cisco: Scaling Application Vulnerability Management Across the Enterprise
sponsored by IBM
WHITE PAPER: This case study reveals the solution that one organization chose to help improve application security testing efficiencies at a reduced cost.
Posted: 15 Apr 2014 | Published: 28 Feb 2013

IBM

Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Windows 8 Pro
WHITE PAPER: This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Lenovo and Windows 8 Pro

Secure Access and Continuity in a Virtualized and BYOD World
sponsored by Hewlett-Packard Company
WHITE PAPER: This business whitepaper focuses on the challenges facing midsize businesses who are looking to provide business continuity and minimized downtime. It also highlights the benefits of HP Just Right IT secure access and business continuity solutions.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Meeting Demand of High Availability with Advanced Data Protection
sponsored by IBM
WHITE PAPER: This white paper features a series of data protection solutions that help businesses meet the demands for always-on availability for applications while keeping sensitive information secure.
Posted: 19 May 2014 | Published: 31 Jan 2014

IBM

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro

BYOD Happens: How to Secure Mobility
sponsored by Citrix
WEBCAST: View this on-demand webcast for an in-depth look at 10 ways to securely optimize mobility with an architecture that spans micro apps, cloud and data protection.
Posted: 14 May 2014 | Premiered: May 14, 2014

Citrix

Improve Your Mobile Application Security
sponsored by IBM
WHITE PAPER: Mobile applications bring with them a whole slew of security concerns that must be addressed throughout the development and deployment process. This helpful white paper introduces a mobile application development platform that helps you tackle security issues on devices, over the network, in the enterprise, and within the application itself.
Posted: 06 May 2014 | Published: 31 Oct 2012

IBM

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
Posted: 05 May 2014 | Published: 25 Sep 2013

IBM

Pilot Light DR for Amazon Web Services
sponsored by CloudVelocity
DATA SHEET: In this paper, discover why cloud-based DR allows for improved application security, and learn about one solution that automates cloud-based disaster recovery for multi-tier, physical, and virtual production apps.
Posted: 02 May 2014 | Published: 02 May 2014

CloudVelocity

Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper highlights the challenges associated with rapid data growth when it comes to storage. It also gives the benefits of a software solution that makes recovery and managing snapshots easier and more efficient.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

CommVault Systems, Inc.

Web Application Firewalls Are Worth the Investment for Enterprises
sponsored by Imperva
ANALYST REPORT: This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
Posted: 29 Apr 2014 | Published: 28 Feb 2014

Imperva

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys
101 - 125 of 695 Matches Previous Page    3 4 5 6 7 8    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement