IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityReports
201 - 225 of 696 Matches Previous Page  | Next Page
Secure Web Gateways Decision Center
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Decision Center will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.
Posted: 29 Oct 2013 | Premiered: 23 Sep 2013

SearchSecurity.com

Applying the Four Standards of Security-Based CIA
sponsored by Global Knowledge
WHITE PAPER: High levels of optimization help to ensure that an organization's information security approach is both well-rounded and flexible enough to meet current and future threats.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Global Knowledge

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

Application Hardening: Evolving Techniques for Proactive Enterprise Application Security
sponsored by SearchSecurity.com
EBOOK: This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

SearchSecurity.com

Next-Generation Security for Today's Data Center
sponsored by IBM and Juniper
WHITE PAPER: This crucial resource discusses next-generation security solutions that can offer unparalleled protection against data exfiltration, website outages, and other serious threats against the data center.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

IBM and Juniper

Securing Enterprise Applications
sponsored by IBM and Juniper
WHITE PAPER: This informative resource discusses a comprehensive set of application security solutions that provide highly effective security services for applications on your network, mobile devices, and even in the cloud.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

IBM and Juniper

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork

As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

Exposing the Beast - Custom API Mgt for the Enterprise
sponsored by Intel Corporation
WEBCAST: In this exclusive webcast, explore the key enterprise categories for B2B, internal, and open Web API models and discover sample use cases that highlight how an API platform simplifies API delivery and management.
Posted: 01 Nov 2013 | Premiered: Nov 4, 2013

Intel Corporation

The Evolution of Server Load Balancing
sponsored by Radware
WHITE PAPER: This white paper introduces a solution that not only allows users to measure end-to-end application, network and browser rendering performance data in real-time, but also one that automatically accelerates web sites.
Posted: 30 Oct 2013 | Published: 30 Oct 2013

Radware

Application Control at the Wireless Edge
sponsored by Xirrus
WHITE PAPER: This exclusive paper examines an application control solution that uses next-generation Deep Packet Inspection (DPI) technology to deliver Layer 7 application visibility and policy control.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

Xirrus

Web Application Performance Management
sponsored by Radware
WHITE PAPER: This white paper introduces a solution that not only allows users to measure end-to-end application, network and browser rendering performance data in real-time, but also one that automatically accelerates web sites; optimizing HTML dynamically and reducing web page build times by up to 50% on PC and mobile browsers.
Posted: 24 Oct 2013 | Published: 30 Sep 2013

Radware

Deliver Virtual Apps and Desktops as Mobile Services
sponsored by Citrix
VIDEO: This video details a solution to BYOD that will give users the personalized experience they crave while keeping your data secure.
Posted: 24 Oct 2013 | Premiered: 24 Oct 2013

Citrix

Automated Log Management for Hybrid Cloud Environments
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, discover a log management tool that addresses the needs of today's dynamic environment by providing quality of service, operational efficiency, and compliance features for optimum infrastructure and application service levels.
Posted: 18 Oct 2013 | Published: 13 May 2013

VMware, Inc.

How To: Creating Content Packs
sponsored by VMware, Inc.
WHITE PAPER: In this detailed white paper, explore content packs, the information they store, and best practices for content pack creation within Log Insight 1.0.
Posted: 18 Oct 2013 | Published: 31 Aug 2013

VMware, Inc.

IBM Worklight on IBM.com
sponsored by IBM
PRODUCT OVERVIEW: This resource introduces a mobile application platform that enables you to easily build, run and manage mobile apps. Read now to explore the features, capabilities, and benefits of this technology.
Posted: 15 Oct 2013 | Published: 15 Oct 2013

IBM

Mobile Application Management Primer: Expert Insight
sponsored by Apperian, Inc.
EGUIDE: This expert guide from SeachConsumerization.com examines what MAM really means, how it differs from mobile device management (MDM), how it controls applications, and much more. Read on and learn how MAM can make the difference between success and failure in the mobile age.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Apperian, Inc.

The Use Case for Integrated Vulnerability Management CORE Security
sponsored by Core Security Technologies
WHITE PAPER: This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

Core Security Technologies

Transcript: Rethink Your Strategy with a Network Monitoring Switch
sponsored by Ixia
TRANSCRIPT: Click now for an exclusive searchNetworking.com presentation transcript that covers how a network monitoring switch can provide visibility, control, performance, and security for today's networks. Get information on a five-step process to get the most out of your network monitoring tools.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Ixia

Rethinking Your Enterprise Security
sponsored by Hewlett-Packard Company
WHITE PAPER: If you stop to ask yourself how your security strategy is doing, more likely than not you'd say it's going fine, right? This resource is a prime opportunity to conduct a personal security report card to double check that all of your security i's are dotted and t's crossed.
Posted: 30 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company

10 Best Practices for Microsoft SharePoint Security
sponsored by Thawte Inc.
WHITE PAPER: In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization.
Posted: 27 Sep 2013 | Published: 27 Sep 2013

Thawte Inc.

Mobilizing Windows Apps from a Centralized Data Center
sponsored by Citrix
WHITE PAPER: This test report demonstrates the ability to mobilize Windows apps from a central datacenter and deliver them to mobile devices such as tablets.
Posted: 25 Sep 2013 | Published: 25 Sep 2013

Citrix

6 Key Areas of Mobile Security
sponsored by Appcelerator
WHITE PAPER: In this resource, explore the six different layers of security that must be considered when it comes to mobile applications, and learn how you can minimize the risk to your customers, bottom line, and your brand.
Posted: 25 Sep 2013 | Published: 25 Sep 2013

Appcelerator

Gamania Group tightens security to strengthen game development capability
sponsored by Hewlett-Packard Company
WHITE PAPER: Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
Posted: 25 Sep 2013 | Published: 31 Oct 2012

Hewlett-Packard Company

Mapping Security for your Virtual Environment
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company
201 - 225 of 696 Matches Previous Page    7 8 9 10 11 12    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement