IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityReports
226 - 250 of 701 Matches Previous Page  | Next Page
CLOUD API SECURITY RISKS: HOW TO ASSESS CLOUD SERVICE PROVIDER APIS
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchCloudSecurity.com takes an in-depth look at API security, answering critical questions and providing helpful tips for securing your cloud APIs.
Posted: 19 Sep 2013 | Published: 19 Sep 2013

SearchSecurity.com

SuperMassive Series data sheet
sponsored by Dell Software
PRODUCT OVERVIEW: The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.
Posted: 23 Aug 2013 | Published: 31 Jul 2013

Dell Software

Unchain Your Network with Application Intelligence and Control
sponsored by Dell Software
WHITE PAPER: Learn about the new risks that organizations face due to the prevalence of Web-based applications, and how to take secure control of applications, data and bandwidth.
Posted: 23 Aug 2013 | Published: 31 Jul 2012

Dell Software

A Foundation for Next-Generation Data Center Security
sponsored by Citrix
WHITE PAPER: This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing data center infrastructure.
Posted: 13 Aug 2013 | Published: 28 Sep 2012

Citrix

9 Reasons Why NetScaler Beats F5
sponsored by Citrix
WHITE PAPER: This whitepaper compares two market-leading application delivery controllers (ADCs) to help your organizations find the one that best aligns with your business needs.
Posted: 12 Aug 2013 | Published: 31 May 2013

Citrix

Optimize your Network with ADC Clustering
sponsored by Citrix
WHITE PAPER: Discover why active-active clusters of application delivery controllers (ADCs) are critical to not only improve app performance but also reduce waste, heighten potential ROI, simplify management, and improve reliability.
Posted: 12 Aug 2013 | Published: 12 Aug 2013

Citrix

Swisscomm Uses HP Security to Provide Superior and Secure Client Services
sponsored by Hewlett-Packard Limited
VIDEO: Providing superior – and secure – services to clients is Swisscom's greatest goal. This quick video reveals how they have achieved the security needed, and who provides it. View now to learn more!
Posted: 02 Aug 2013 | Premiered: 02 Aug 2013

Hewlett-Packard Limited

Decode MDM Solution Features: Must haves for security management
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Question #3 featured in SearchSecurity.com's IT Decision Center on MDM asks top vendors in the space if their products support mobile security management features
Posted: 31 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

MDM & MAM: Feature must haves for success
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This expert resource allows you to evaluate some of the leading mobile solutions on the market to find out if they support MAM and how effective their support is so you can decide which solution would be a best fit into both your environment and your overall mobility strategy.
Posted: 30 Jul 2013 | Premiered: 30 Jul 2013

SearchSecurity.com

Mobile Device Management IT Decision Center: Operating Systems
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: SearchSecurity.com’s expert resource asks: Does your product support any OEM extensions (e.g., Samsung SAFE)? Do you require or offer agent applications installed on managed devices? Find out what top vendors have to say by accessing their answers to these questions now.
Posted: 29 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Web Application Security Insider's Edition
sponsored by SearchSecurity.com
EZINE: This Insider Edition will help you understand threats against Web applications, how you can help developers with security tools and training and how to deploy technologies such as Web application firewalls to keep your organization's Web presence safe.
Posted: 19 Sep 2013 | Published: 18 Sep 2013

SearchSecurity.com

AppConnect and AppTunnel: Advanced Security for Mobile Apps
sponsored by MobileIron
WHITE PAPER: This exclusive resource discusses a security solution that prevents data loss as mobile applications become business-critical and widespread tools in the enterprise.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

MobileIron

The Platform for Mobile IT
sponsored by MobileIron
WHITE PAPER: This exclusive white paper examines a highly-scalable solution, either on-premise or cloud-based, that provides a platform for mobile IT and can help you manage your mobile content and devices securely and efficiently.
Posted: 12 Sep 2013 | Published: 12 Sep 2013

MobileIron

Top Three Mobile Application Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper reveals the top three mobile application threats enterprises today are facing and offers advice on how to mitigate the potential risks. View now to learn more!
Posted: 06 Sep 2013 | Published: 30 Nov 2012

Hewlett-Packard Limited

How The Burgiss Group Manages Business Risk with AppFirst
sponsored by AppFirst
CASE STUDY: This case study reveals which solution the Burgiss Group trusts to help them monitor the behavior of their applications and systems and – in turn – ensure an optimal experience for their clients. View now to learn more!
Posted: 04 Sep 2013 | Published: 04 Sep 2013

AppFirst

Ensuring application security in mobile device environments
sponsored by IBM
WHITE PAPER: This crucial paper examines mobile application security in the age of BYOD, discussing common threats and what your organization can do to seal up vulnerabilities.
Posted: 03 Sep 2013 | Published: 03 Sep 2013

IBM

Video: Amazon Web Services API Security Overview
sponsored by Intel
WEBCAST: Animation that shows how enterprise APIs can be managed using AWS hosted API management infrastructure that allows you to scale security along with apps in the cloud. Learn how public cloud apps can be quickly secured and expose for rapid mobile access. Learn about API management from the AWS cloud.
Posted: 27 Aug 2013 | Premiered: Aug 27, 2013

Intel

Voice over IP (VoIP) Growth and the Strain on Network Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Explore how VoIP can expose your organization to numerous risks and uncover why traditional firewalls often cannot thwart the many challenges VoIP presents.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

WatchGuard Technologies, Inc.

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Computer Weekly special report: Corporate application access through employee-owned mobile devices
sponsored by BlackBerry
WHITE PAPER: Your employees are accessing the corporate network from mobile devices—learn how to be prepared.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

BlackBerry

How Citrix NetScaler Supports Virtualized Multi-tenant Datacenters
sponsored by Citrix
WHITE PAPER: Explore how expanding virtualization to your application delivery controllers (ADCs) can help you facilitate the journey to the cloud.
Posted: 12 Aug 2013 | Published: 29 Apr 2011

Citrix

Averail Access Demo: Employee App
sponsored by Averail
WEBCAST: This informative yet concise webcast examines a mobile content solution that givesyour field teams the ability to access, manage and share business documents without sacrificing security, compliance or IT control.
Posted: 07 Aug 2013 | Premiered: Aug 7, 2013


Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution
sponsored by F5 Networks
WHITE PAPER: This informative resource discusses a solution that can control access, implement challenge/response and anomaly detection engines, and apply the ability to understand application behavior to defend against malicious connections to keep attackers from overwhelming applications.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

F5 Networks

Protect Identities in the Cloud Secure access to SaaS applications made easier
sponsored by McAfee, Inc.
WHITE PAPER: This informative paper examines how your organization can best manage and protect your SaaS applications, discussing common management problems and an advanced security solution that can help secure all aspects of web traffic.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

McAfee, Inc.

Endpoint Security Suites Take Center Stage in the Enterprise
sponsored by Symantec Corporation
ANALYST REPORT: This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other.
Posted: 29 Jul 2013 | Published: 04 Jan 2013

Symantec Corporation
226 - 250 of 701 Matches Previous Page    8 9 10 11 12 13    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement