IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityReports
226 - 250 of 669 Matches Previous Page  | Next Page
2012 IBM X-Force Annual Trend and Risk Report
sponsored by IBM
WHITE PAPER: Access this informative resource to learn about the latest trends and technology that security pros are taking advantage of in order to provide effective and efficient mobile security.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

SearchSecurity.com

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix
WHITE PAPER: Read on to find an executive checklist that will help you ensure that you are ready to handle both enterprise mobility and bring-your-own-device programs.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Citrix

Consumerization and the Cloud Classroom
sponsored by SearchCloudComputing.com
VIRTUAL ENVIRONMENT: Systems administrators, IT managers and data center professionals need to know how the converging trends of consumerization affect their organizations and how they can maintain control while enabling user needs.
Posted: 18 Jun 2013 | Premiered: 18 Jun 2013

SearchCloudComputing.com

Five security considerations in the mobile age - Strengthen security in mobile environments with WebSphere DataPower appliances
sponsored by IBM
WHITE PAPER: While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.
Posted: 17 May 2013 | Published: 31 Dec 2012

IBM

Top 10 Reasons MDM is just a Fad
sponsored by Fiberlink
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 16 May 2013 | Published: 16 May 2013

Fiberlink

College Board Case Study: Quality Software is Secure Software
sponsored by IBM
WEBCAST: In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.
Posted: 22 Jul 2013 | Premiered: Jul 22, 2013

IBM

Mitigating DDoS Attacks with F5 Technology
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper examines a set of solutions that can securely deliver applications while protecting the network, the session and the user, with mitigation technologies that map directly to individual DDoS attacks.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

F5 Networks

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
sponsored by IBM
WEBCAST: This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
Posted: 19 Jul 2013 | Premiered: Jul 19, 2013

IBM

Defending Against APTs: Do You Have the Complete Picture?
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Hexis Cyber Solutions Inc

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchSecurity.com outlines how to address web app design flaws and fight these weaknesses once and for all.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Thawte Inc.

The Dynamic DNS Infrastructure
sponsored by F5 Networks
WHITE PAPER: This resource details a full-proxy architecture for DNS that provides a complete solution for global, local, and cloud load balancing, helping you overcome all the growth and security challenges the DNS is facing.
Posted: 14 Jun 2013 | Published: 29 Jun 2012

F5 Networks

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Explore the details of an end-to-end mobility solution that simplifies mobile integration into the network and helps you overcome the top challenges enterprise mobility presents, from visibility and management to scalability and security.
Posted: 14 Jun 2013 | Published: 30 Apr 2013

Citrix

Going the Last Mile to Deliver Mobile Apps
sponsored by Apperian, Inc.
CASE STUDY: Read on to find out who D.W. Morgan, a global organization responsible for the transportation of critical inventory for multinational companies, partnered up with to radically optimize its already existing mobile logistics application, ChaninLinq.
Posted: 14 Jun 2013 | Published: 14 Jun 2013

Apperian, Inc.

Citrix Mobile Solutions Bundle - Product Overview
sponsored by Citrix Systems, Inc.
WHITE PAPER: Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.
Posted: 14 Jun 2013 | Published: 06 Jun 2013

Citrix Systems, Inc.

Healthcare Networking Classroom
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

SearchHealthIT.com

Shadow IT - Embrace it
sponsored by Tier 3 and VMware
EGUIDE: This e-guide explores the challenges arising from shadow IT and offers advice for getting ahead of the curve to safely and securely embrace it.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

Tier 3 and VMware

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

Securing Enterprise Data in a BYOD World
sponsored by Globo
WHITE PAPER: Bring-your-own-device (BYOD) initiatives can increase productivity and make for happier employees, but they pose serious security risks. This resource outlines the fundamentals of mobile security that so often go overlooked. Read on to get advice on how to leverage a security strategy to make your enterprise mobilization effective and safe.
Posted: 06 Jun 2013 | Published: 06 Jun 2013

Globo

McAfee Endpoint Protection Suite
sponsored by McAfee, Inc.
WHITE PAPER: This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more.
Posted: 31 May 2013 | Published: 31 May 2013

McAfee, Inc.

The Evolving Landscape of Desktop Security
sponsored by McAfee, Inc.
WHITE PAPER: This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

McAfee Application Control
sponsored by McAfee, Inc.
WHITE PAPER: This whitepaper will help you learn more about a security offering that can provide complete protection from unwanted applications and code, as well as block advanced threats without requiring signature updates. Read on to learn more.
Posted: 29 May 2013 | Published: 31 Dec 2012

McAfee, Inc.

How to Secure Your Microsoft SharePoint Products
sponsored by Thawte Inc.
EGUIDE: This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013

Thawte Inc.

SharePoint Security Should Not Be an Afterthought
sponsored by Thawte Inc.
EGUIDE: This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.
Posted: 20 May 2013 | Published: 20 May 2013

Thawte Inc.
226 - 250 of 669 Matches Previous Page    8 9 10 11 12 13    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement