IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityReports
151 - 175 of 704 Matches Previous Page  | Next Page
How to Deal with Todays Multi-Platform, Multi-Vendor Patch Management Mess
sponsored by Lumension
WHITE PAPER: This exclusive resource discusses a patch management solution that provides endpoint protection that goes well beyond the typical operating system, allowing your organization to ensure that patches run smoothly and that any security holes are plugged up.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Lumension

The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012

Imperva

Monitor and Protect Critical Web Applications with a Web Application Firewall
sponsored by Imperva
WEBCAST: While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

Imperva

Collaboration gives GE more dynamic, secure mobile workforce
sponsored by Hewlett-Packard Limited
VIDEO: Take 30 seconds out of your day to see why GE is securely penetrating their emerging markets and enabling customers to take advantage of their services. Watch this video to learn more.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

API Management: Choosing the Right Tools
sponsored by CA Technologies.
WHITE PAPER: Making application programming interfaces (APIs) available to the general public brings with it a number of challenges and risks. In this white paper, explore the functional and operational requirements in depth and get the key criteria you need to choose the right API management tool for your organization.
Posted: 10 Feb 2014 | Published: 31 Dec 2011

CA Technologies.

5 Oauth Essentials for API Access Control
sponsored by CA Technologies.
WHITE PAPER: View this resource to uncover an application programming interface (API) authentication solution fit for the enterprise. Read on for 5 things to consider before deployment.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

CA Technologies.

Enterprise on the Go: 5 Essentials for BYOD & Mobile Enablement
sponsored by CA Technologies.
WHITE PAPER: To get the most benefits from enterprise mobility and bring-your-own-device (BYOD) policies, businesses need to deploy applications that give employees the same functionality as on-premise apps without sacrificing the security of critical enterprise systems. While this may seem like a tall order, it's possible with the right strategy in place.
Posted: 06 Feb 2014 | Published: 06 Feb 2014

CA Technologies.

Protecting Your APIs Against Attack & Hijack
sponsored by CA Technologies.
WHITE PAPER: Even though application programming interfaces (APIs) experience the same threats as the Web, thanks to architecture differences, existing Web security methods aren't enough to keep them protected. Read on to unveil 5 best practices to secure your API architectures.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

Federated Identity & Single Sign‐On Using Layer 7
sponsored by CA Technologies.
WHITE PAPER: In this white paper, learn how separate identity silos create gaps and complexities in security measures. Read on to reveal a solution that federates identity and provides single sign-on (SSO) services for mobile and virtual applications to reduce these challenges.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

Not All SOA Gateways Are Created Equal
sponsored by CA Technologies.
WHITE PAPER: Most service-oriented architecture (SOA) gateways offer similar functionality: they address security and performance issues that arise when using XML-based messaging protocols. However, not all SOA gateways are created equal, as the total cost of ownership (TCO) can vary greatly.
Posted: 06 Feb 2014 | Published: 31 Dec 2011

CA Technologies.

Do You Really Need A SAN-Based Cluster? Ten Essential Questions to Ask Before Choosing a Cluster Solution
sponsored by SIOS Technology Corp
WHITE PAPER: Businesses today are deploying applications in physical, virtual, and cloud environments, and as such, clusters based on storage SANs are no longer the go-to choice for application security. SAN-less clusters offer increased flexibility and cost savings without sacrificing performance -- but will they work for your IT environment?
Posted: 05 Feb 2014 | Published: 05 Feb 2014

SIOS Technology Corp

Securing Identities and Data Across Mobile Apps
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights the 3 major challenges in protecting user identities through mobile applications. Read on to discover a mobile gateway solution that offers secure access and user protection.
Posted: 05 Feb 2014 | Published: 31 Dec 2013

CA Technologies.

A How‐to Guide to OAuth & API Security
sponsored by CA Technologies.
WHITE PAPER: When it comes to Web applications, one of the top concerns is security. With OAuth, users can authorize limited access to applications and data. View this white paper for a how-to guide to OAuth and API security.
Posted: 05 Feb 2014 | Published: 31 Dec 2013

CA Technologies.

Why You Must Have Cloud Governance Before You Move Your Apps
sponsored by CA Technologies.
WHITE PAPER: Access this resource to explore how you can leverage traditional SOA governance programs and extend practices to your future cloud deployment.
Posted: 04 Feb 2014 | Published: 31 Dec 2011

CA Technologies.

Defending Against Insider Threats in the “Snowden Era”
sponsored by CA Technologies.
EBOOK: Sensitive information - including customer data, credit card numbers, and private communications – has an average cost of $5.4 million per year when breached. This eBook discusses insider attacks, and how employees can compromise otherwise privileged information. Also find out the challenges of defending against insider threats.
Posted: 28 Jan 2014 | Published: 31 Dec 2013

CA Technologies.

Enabling and Protecting the Open Enterprise
sponsored by CA Technologies.
WHITE PAPER: View this informative resource for an overview of the challenges of securing the open enterprise, and learn the steps you can take to enable your business for growth, while protecting it from risk and attack.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

CA Technologies.

Does App Security Pay? The Business Impact of Security Tools
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce applications vulnerabilities, speed recovery time and minimize delays. Read on to learn more.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Hewlett-Packard Company

Know the Big Three: Top three mobile application threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive paper examines you how to prevent sensitive data leakage over insecure channels or stolen devices. Read on to discover the top three threats to mobile applications and how to mitigate their potential impact.
Posted: 20 Jan 2014 | Published: 26 Aug 2014

Hewlett-Packard Company

Designing a defense for mobile application
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper you will learn about the various considerations for defending mobile applications—from the mobile application architecture itself to the myriad testing technologies.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

Hewlett-Packard Company

Mobilizing Windows Applications
sponsored by Citrix
WHITE PAPER: This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

Cyber Security Tips from a Customer like You
sponsored by Palo Alto Networks
WEBCAST: In this webcast, see how your peers are systematically mitigating cybersecurity risks by prioritizing network protection. Click now to explore a network security platform that can help you achieve top defense.
Posted: 27 Dec 2013 | Premiered: Dec 27, 2013

Palo Alto Networks

Accelerating the deployment of a secure mobile enterprise
sponsored by IBM
WHITE PAPER: In this insightful white paper, explore key challenges you'll face in ensuring the security of enterprise mobile devices, learn strategies that will help you reduce risk, and discover new ways that you can be more secure in your use of mobile technology.
Posted: 15 Jan 2014 | Published: 31 Oct 2013

IBM

Securing mobile devices in the business environment
sponsored by IBM
WHITE PAPER: As smartphones and other mobile devices gain traction in consumers' personal lives, they're also being introduced into their work environments. In this white paper, learn how to safely introduce personal or corporate-owned mobile devices into the workplace, identify and prevent the risks to corporate data, and ultimately drive more business value.
Posted: 15 Jan 2014 | Published: 31 Oct 2011

IBM

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Challenging Some of the Myths About Static Code Analysis
sponsored by Klocwork
WHITE PAPER: This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
Posted: 27 Dec 2013 | Published: 30 Nov 2013

Klocwork
151 - 175 of 704 Matches Previous Page    5 6 7 8 9 10    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement