IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
26 - 50 of 773 Matches Previous Page  |  Next Page
Top 5 Benefits of Modernizing and Mobilizing Enterprise Apps
sponsored by PowWow
RESOURCE CENTER: This custom article explores how to modernize key enterprise apps to focus on a more seamless experience for completing tasks and managing workflows. Find out how to boost employee productivity and efficiency, and uncover the top 5 benefits that are motivating the move towards modernization.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

PowWow

How Mobile Application Platform Integration Can Boost Security
sponsored by Red Hat
WEBCAST: In this video, learn how you can mitigate security threats across your mobile application platforms by integrating your systems for data on the backend, as well as how middleware applications run in the cloud helps, and more.
Posted: 12 Apr 2017 | Premiered: Dec 15, 2016

Red Hat

Native Hybrid Cloud: A Turnkey Pivotal Cloud Foundry Developer Platform
sponsored by Dell EMC
WHITE PAPER: Access now to learn how to boost app developer productivity, empower developers with self-service, and eliminate the cost, time, and complexity of building and maintaining an in-house cloud infrastructure while navigating the cultural shift to DevOps with a native hybrid cloud platform.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Dell EMC

Array Networks Virtual Load Balancer Case Study: County of Maui
sponsored by Array Networks
CASE STUDY: The County of Maui needed to grant users access to consolidated geographical information, without disruptive downtime or bogged-down application throughput. Download this case study to find out how they updated and centralized their GIS, gaining flexible, versatile and easy-to-use load balancers that will serve their needs now and in the future.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Array Networks

Array Networks Secure Remote Access Case Study: City of Santa Barbara
sponsored by Array Networks
CASE STUDY: The City of Santa Barbara needed a way to provide anytime, anywhere access to documents, files and email from any device, while maintaining the security of confidential information, regardless of the device used to access it. Download this case study to find out how the City of Santa Barbara solved these challenges.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Array Networks

Focus ANZ: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

ComputerWeekly.com

Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

What is Enterprise Mobile Security?
sponsored by Lookout
EBOOK: Download this eBook to find out why EMM and MDM are not enough to ensure a secure mobile enterprise and understand where the fault lies in today's EMM/MDM initiatives.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

Lookout

Improving Application Security and Performance With Cloud Firewalls
sponsored by Akamai
WHITE PAPER: This whitepaper dives into the biology of web and DDoS attacks. Learn how a suite of systems can provide you with a cloud-based web application firewall to protect your infrastructure from any threat.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Akamai

4 Market Trends Driving Mobile Banking
sponsored by HID
WHITE PAPER: Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

HID

Top 5 Considerations: What to Look For in Mobile Banking Security
sponsored by HID
RESOURCE: Uncover 5 IAM considerations for choosing a mobile banking security tool. Also discover a concise market overview of mobile banking apps, including a look at opportunities for growth and major obstacles.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID

The Definitive Guide to Data Protection and Disaster Recovery on Enterprise Clouds
sponsored by Nutanix
EBOOK: Access this e-book to examine important challenges and trends in availability and data protection. You will learn about a simple, cost-effective approach that works with enterprise cloud computing that helps you not only catch up, but future-proof your data protection.
Posted: 21 Mar 2017 | Published: 30 Jun 2016

Nutanix

Maximizing IT Security with Configuration Management
sponsored by Puppet
WHITE PAPER: This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including the creation of a Standard Operating Environment (SOE), reporting on and control of configuration drift, enhanced change remediation, and more.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Puppet

2017 Annual Cybersecurity Report
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: This 2017 Annual Cybersecurity Report explores how to implement an integrated security architecture by connecting your security tools to work together in an automated, streamlined environment.
Posted: 28 Feb 2017 | Published: 31 Jan 2017

Cisco Systems, Inc.

The Ultimate Guide to Cybersecurity to Drive Innovation
sponsored by Cisco Systems, Inc.
WHITE PAPER: Many developers may find themselves hesitant to build digital products and services for the cloud, web, and mobile because strict federal regulations and the rise of cyberattacks make this a risky endeavor. Discover how to accelerate innovation while still protecting your data and uncover several business cases for cybersecurity.
Posted: 24 Feb 2017 | Published: 31 Dec 2016

Cisco Systems, Inc.

Tracker Corp Modernizes I-9 Compliance App to Streamline Mobile Onboarding
sponsored by PowWow
CASE STUDY: This case study explores how Tracker Corp leveraged a mobile development platform to modernize and extend their custom web app out to mobile users with no disruptions to their business. Learn how they overcame their lack of experienced in-house mobile developers to create a seamless and secure user experience.
Posted: 21 Feb 2017 | Published: 21 Feb 2017

PowWow

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

How mobile remote desktop apps work
sponsored by LogMeIn Rescue Lens
EGUIDE: Mobile remote desktop apps can be an important tool for enterprises in keeping up with today's on-the-go workforce. The benefits of greater accessibility mean they could be a strategic fit in a variety of enterprise environments. Learn how to select the right mobile remote desktop products for your business, and how they work.
Posted: 13 Mar 2017 | Published: 10 Mar 2017

LogMeIn Rescue Lens

Solution Brief - Securing the mobile enterprise
sponsored by IBM
WHITE PAPER: Discover a comprehensive portfolio of mobile security systems that address four key mobile security challenges: protecting devices, securing content and collaboration, safeguarding applications and data, and managing access and fraud. The portfolio also includes a layer of security intelligence for advanced threat detection.
Posted: 08 Mar 2017 | Published: 06 Mar 2017

IBM

The New BYOD: 5 Best Practices for a Productive BYOD Program
sponsored by vmware airwatch
WHITE PAPER: Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Posted: 08 Mar 2017 | Published: 07 Mar 2017

vmware airwatch

EMM Real Benefits in Today's Mobile World
sponsored by vmware airwatch
WHITE PAPER: The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

The Massive Mobile Migration
sponsored by IBM
WHITE PAPER: The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.
Posted: 03 Mar 2017 | Published: 27 Apr 2016

IBM

UBM Dark Reading & VMware AirWatch® Webinar
sponsored by vmware airwatch
WEBCAST: In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.
Posted: 03 Mar 2017 | Premiered: Mar 3, 2017

vmware airwatch
26 - 50 of 773 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement