IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
126 - 150 of 843 Matches Previous Page  |  Next Page
Banish Bad Bots By Asking These 13 Questions
sponsored by Distil Networks
WHITE PAPER: With bots being such a hot topic in web security, vendors are claiming they have the ability to effectively identify and mitigate bots. Discover 13 tips to help you differentiate between vendors to make a fully informed decision when it comes to your web application security.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

Customer Spotlight | blinkbox
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about a VOD service called blinkbox and their struggles finding solid cloud security for their platform. Watch now to see how they remediated their security issues and how they now operate without breach concerns.
Posted: 11 May 2016 | Premiered: 28 Oct 2014

Barracuda Networks

4 Strategies for Keeping Critical Networks Secure
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn four major criteria for selecting the right long term security partner. Access now to find a security provider who can satisfy these major areas of concern and other areas of need for your organization.
Posted: 10 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

Modern Snapshot Management: Enhancing Application Protection and Recovery
sponsored by Commvault
WHITE PAPER: Integrating array-based snapshot technologies with an existing data protection approach can greatly improve data manageability, recovery, and protection. Discover how you can deliver faster and more granular application-aware data recovery performance with less effort, complexity, and cost.
Posted: 09 May 2016 | Published: 31 Dec 2015

Commvault

Automate email encryption to best protect corporate data
sponsored by ZixCorp
WHITE PAPER: This white paper provides an overview of why it's important to encrypt every corporate email you send and receive. Access now to learn how you can automatically encrypt emails eliminating the risk of interception and allowing your business peace of mind.
Posted: 09 May 2016 | Published: 01 Apr 2016

ZixCorp

Simplifying Enterprise Application and Recovery
sponsored by Commvault
EGUIDE: This e-guide highlights a snapshot management solution that automates snapshot management and application-aware recovery across multiple storage arrays and servers. See how this solution can improve your enterprise's efficiency and enable you to unleash the true potential of snapshots for simplified application recovery.
Posted: 09 May 2016 | Published: 09 May 2016

Commvault

Controlling Data Center Security
sponsored by Barracuda Networks
WHITE PAPER: Learn how you can strengthen your data center perimeter firewall protection while enabling flexibility to allow for change in the future. Discover how to centrally control your data center security system to prevent it from weakening over time.
Posted: 06 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Disrupting Targeted Attacks Solution Guide
sponsored by Intel Security
WHITE PAPER: Reduce complexity, response time and operational costs while simultaneously improving your security posture in the face of growing risks. Access now and find out how to synthesize your IT operations and security controls to form an agile, increasingly automated (and rock-solid) security architecture.
Posted: 05 May 2016 | Published: 01 Apr 2016

Intel Security

Comprehensive data protection for physical, virtual and cloud infrastructures
sponsored by IBM
WHITE PAPER: What steps should you take to best protect your virtualized cloud data? Find out inside.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

Protect Your APIs
sponsored by MuleSoft
WHITE PAPER: APIs have become a key part of business strategy for many organizations. But how can you ensure APIs provide the agility you want without risking costly data breaches? Discover how you can ensure your API is highly available while guaranteeing integrity and confidentiality of your information.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

MuleSoft

Expert Advice for Software Security Testing (Including Embedded Systems)
sponsored by Programming Research
EGUIDE: What's the difference between security for embedded software and regular software testing? This two-part e-guide reveals best practices for security-testing embedded software. Inside, discover how threat modeling can ensure a secure embedded system.
Posted: 20 Apr 2016 | Published: 18 Apr 2016

Programming Research

SD-WAN: Application Performance Routing
sponsored by Fatpipe, Inc.
WHITE PAPER: SD-WAN is becoming increasingly vital to everyday operations, especially application functionality. Access this white paper to learn how the need to reduce costs surrounding applications is changing traffic patterns and how SD-WAN is providing solutions.
Posted: 19 Apr 2016 | Published: 06 Apr 2016

Fatpipe, Inc.

The Benefits of Turning Mobile Devices into Security Tokens
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn about two-factor user authentication by leveraging passwords and users' devices. Access now and learn how to reduce associated operational costs and increase productivity with a modern authentication system.
Posted: 18 Apr 2016 | Published: 02 Mar 2016

BlackBerry

Securing Mobility Management in the Cloud
sponsored by BlackBerry
WHITE PAPER: Discover how to securely manage mobile devices and other endpoints across different operating systems ownership models. Learn how to manage your mobile workers' access to apps, data and content, all from a single, easy-to-use console.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

BlackBerry

The Mobile Enterprise: Is Ease of Use Overriding Security?
sponsored by BlackBerry
WHITE PAPER: Enterprises are relying on native applications to mobilize their Microsoft environments despite major security threats. A recent survey displays the decision-making process when balancing the advantages and trade-offs associated with the four primary methods of mobilizing those apps.
Posted: 15 Apr 2016 | Published: 31 Mar 2016

BlackBerry

The CIO’s Guide to EMM
sponsored by BlackBerry
WHITE PAPER: Developing and evolving a proper mobile strategy can spell the difference between success and failure in today's business landscape. Are you sure your mobile strategy is meeting the requirements for success in the evolving enterprise mobility landscape?
Posted: 14 Apr 2016 | Published: 04 Apr 2016

BlackBerry

Market Overview: Customer Identity and Access Management Solutions
sponsored by Gigya
WHITE PAPER: How can you balance a seamless customer experience with a strong security strategy to protect customers' privacy? This Forrester report evaluates 7 customer identity and access management (CIAM) solution vendors, revealing the major strengths of each choice. Discover the key features to look for when deciding on a CIAM solution.
Posted: 21 Mar 2016 | Published: 04 Aug 2015

Gigya

The Evolution of Consumer Identity: 5 Biggest Trends
sponsored by Gigya
WHITE PAPER: This resource reveals the 5 biggest trends currently influencing the customer identity and access management space. Learn how to prepare for upcoming developments regarding traditional usernames and passwords vs biometric authentication, regional data privacy regulations, IoT, and more.
Posted: 18 Mar 2016 | Published: 31 Dec 2015

Gigya

Getting a handle on mobile devices – securely, reliably and tidily
sponsored by Matrix42
WHITE PAPER: Mobile access to data and applications is now the rule rather than the exception. This trend has notably spurred thegenesis of both web and SaaS applications, which are used on a daily basis by allcompanies of all sizes nowadays. This technological progress is confronting both IT professionals and ordinary users with new problems.
Posted: 18 Mar 2016 | Published: 30 Dec 2015

Matrix42

Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

TechTarget's Top 6 Security Measures for the Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover a next-generation security model that moves away from traditional security tools. Learn how you can bring together all critical network security elements to provide an integrated security framework for your cloud-enabled enterprise.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

Three ways AirWatch secures mobile Office365 applications
sponsored by VMware
EGUIDE: This e-guide shows how you can better manage business applications on BYOD and corporate-owned mobile devices. Learn how to encrypt important organizational information and lock down apps across all personal, mobile devices.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

VMware

The Next Step in Mobility: Virtual Mobile Infrastructure
sponsored by Sierraware
EGUIDE: Virtual mobile infrastructure (VMI) is an emerging technology with a promising future that is going to change the way that mobile apps are run and utilized across different platforms. This exclusive guide, Brian Madden discusses what you need to know about VMI and what it means for the future of mobile devices.
Posted: 15 Apr 2016 | Published: 06 Apr 2016

Sierraware

Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper provides business planners with informative details on how to maintain strong security and PCI DSS compliance in a distributed retail environment. Access now for tools on how to keep applications, data and networks safe and PCI DSS compliant.
Posted: 15 Apr 2016 | Published: 01 Jan 2014

WatchGuard Technologies, Inc.

Illuminate Shadow IT and Securely Manage BYOX
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper discusses BYOX and explores strategies and solutions for embracing the business productivity aspects of a BYOX workforce culture. Access now to learn how you can promote a faster, flexible and mobile workforce while protecting your organization from security pitfalls.
Posted: 14 Apr 2016 | Published: 01 Apr 2013

WatchGuard Technologies, Inc.
126 - 150 of 843 Matches Previous Page    4 5 6 7 8 9    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement