IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityReports
126 - 150 of 599 Matches Previous Page  | Next Page
Five Pillars for Controlling Firewall ACLs and Rules
sponsored by Infoblox
WHITE PAPER: Read this white paper to learn how to leverage automation to shorten time to deploy, improve staff efficiency and maintain a secure network.
Posted: 11 Sep 2013 | Published: 31 Jan 2013

Infoblox

Top Three Mobile Application Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper reveals the top three mobile application threats enterprises today are facing and offers advice on how to mitigate the potential risks. View now to learn more!
Posted: 06 Sep 2013 | Published: 30 Nov 2012

Hewlett-Packard Limited

Why you Need a Next-Generation Firewall
sponsored by Dell Software
PRODUCT OVERVIEW: The Dell™ SonicWALL™ SuperMassive™ Next-Generation Firewall (NGFW) platform is built to meet the needs of enterprise, government, university and service provider deployments and gives you uncompromising, high-performance firewall protection. Learn how to protect against today's emerging threats in this SuperMassive NGFW datasheet.
Posted: 23 Aug 2013 | Published: 31 Jul 2013

Dell Software

How to Build a Massively Scalable Next-Generation Firewall
sponsored by Dell Software
WHITE PAPER: Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Dell Software

The ABC's of Mobile Device Management
sponsored by Fiberlink
WHITE PAPER: Are you ready to learn your ABCs? The ABCs of mobile device management (MDM), that is! View this whitepaper to find out more!
Posted: 05 Aug 2013 | Published: 05 Aug 2013

Fiberlink

Swisscomm Uses HP Security to Provide Superior and Secure Client Services
sponsored by Hewlett-Packard Limited
VIDEO: Providing superior – and secure – services to clients is Swisscom's greatest goal. This quick video reveals how they have achieved the security needed, and who provides it. View now to learn more!
Posted: 02 Aug 2013 | Premiered: 02 Aug 2013

Hewlett-Packard Limited

Decode MDM Solution Features: Must haves for security management
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Question #3 featured in SearchSecurity.com's IT Decision Center on MDM asks top vendors in the space if their products support mobile security management features
Posted: 31 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

MDM & MAM: Feature must haves for success
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This expert resource allows you to evaluate some of the leading mobile solutions on the market to find out if they support MAM and how effective their support is so you can decide which solution would be a best fit into both your environment and your overall mobility strategy.
Posted: 30 Jul 2013 | Premiered: 30 Jul 2013

SearchSecurity.com

Mobile Device Management IT Decision Center: Operating Systems
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: SearchSecurity.com’s expert resource asks: Does your product support any OEM extensions (e.g., Samsung SAFE)? Do you require or offer agent applications installed on managed devices? Find out what top vendors have to say by accessing their answers to these questions now.
Posted: 29 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Endpoint Security Suites Take Center Stage in the Enterprise
sponsored by Symantec Corporation
ANALYST REPORT: This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other.
Posted: 29 Jul 2013 | Published: 04 Jan 2013

Symantec Corporation

MDM Decision Time: TechTarget's Must Have Guide to Purchasing Decisions
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Visit SearchSecurity.com's IT Decision Center that focuses on MDM solutions in the marketplace today. Not only can you find the expert's take in this center but you will also have access to answers to the top 5 questions your peers have around MDM solutions directly from the top vendors in the space in one place.
Posted: 26 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

The Platform for Mobile IT
sponsored by MobileIron
WHITE PAPER: This exclusive white paper examines a highly-scalable solution, either on-premise or cloud-based, that provides a platform for mobile IT and can help you manage your mobile content and devices securely and efficiently.
Posted: 12 Sep 2013 | Published: 12 Sep 2013

MobileIron

How The Burgiss Group Manages Business Risk with AppFirst
sponsored by AppFirst
CASE STUDY: This case study reveals which solution the Burgiss Group trusts to help them monitor the behavior of their applications and systems and – in turn – ensure an optimal experience for their clients. View now to learn more!
Posted: 04 Sep 2013 | Published: 04 Sep 2013

AppFirst

Ensuring application security in mobile device environments
sponsored by IBM
WHITE PAPER: This crucial paper examines mobile application security in the age of BYOD, discussing common threats and what your organization can do to seal up vulnerabilities.
Posted: 03 Sep 2013 | Published: 03 Sep 2013

IBM

Video: Amazon Web Services API Security Overview
sponsored by Intel
WEBCAST: Animation that shows how enterprise APIs can be managed using AWS hosted API management infrastructure that allows you to scale security along with apps in the cloud. Learn how public cloud apps can be quickly secured and expose for rapid mobile access. Learn about API management from the AWS cloud.
Posted: 27 Aug 2013 | Premiered: Aug 27, 2013

Intel

Voice over IP (VoIP) Growth and the Strain on Network Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Explore how VoIP can expose your organization to numerous risks and uncover why traditional firewalls often cannot thwart the many challenges VoIP presents.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

WatchGuard Technologies, Inc.

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Computer Weekly special report: Corporate application access through employee-owned mobile devices
sponsored by BlackBerry
WHITE PAPER: Your employees are accessing the corporate network from mobile devices—learn how to be prepared.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

BlackBerry

NetScaler White Paper: A Foundation for Next-Generation Datacenter Security
sponsored by Citrix
WHITE PAPER: Uncover how an application delivery controller (ADC) can provide the core capabilities you need to achieve next-generation datacenter security in your enterprise.
Posted: 13 Aug 2013 | Published: 28 Sep 2012

Citrix

How Citrix NetScaler Supports Virtualized Multi-tenant Datacenters
sponsored by Citrix
WHITE PAPER: Explore how expanding virtualization to your application delivery controllers (ADCs) can help you facilitate the journey to the cloud.
Posted: 12 Aug 2013 | Published: 29 Apr 2011

Citrix

9 Reasons Why NetScaler Beats F5
sponsored by Citrix
WHITE PAPER: This whitepaper compares two market-leading application delivery controllers (ADCs) to help your organizations find the one that best aligns with your business needs.
Posted: 12 Aug 2013 | Published: 31 May 2013

Citrix

Averail Access Demo: Employee App
sponsored by Averail
WEBCAST: This informative yet concise webcast examines a mobile content solution that givesyour field teams the ability to access, manage and share business documents without sacrificing security, compliance or IT control.
Posted: 07 Aug 2013 | Premiered: Aug 7, 2013


Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution
sponsored by F5 Networks
WHITE PAPER: This informative resource discusses a solution that can control access, implement challenge/response and anomaly detection engines, and apply the ability to understand application behavior to defend against malicious connections to keep attackers from overwhelming applications.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

F5 Networks

Protect Identities in the Cloud Secure access to SaaS applications made easier
sponsored by McAfee, Inc.
WHITE PAPER: This informative paper examines how your organization can best manage and protect your SaaS applications, discussing common management problems and an advanced security solution that can help secure all aspects of web traffic.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

McAfee, Inc.

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM
126 - 150 of 599 Matches Previous Page    4 5 6 7 8 9    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement