IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityReports
26 - 50 of 704 Matches Previous Page  | Next Page
Managing Mobile Application Security in the Age of BYOD and the Cloud
sponsored by Bluebox
WHITE PAPER: In this expert guide, get an inside look at how to improve your organization's mobile app security and how to avoid the common pitfalls of cloud-based MAM.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Bluebox

5 Simple Strategies for Securing APIs
sponsored by CA Technologies.
WHITE PAPER: APIs share many of the same threats as the traditional web; however, they have an entirely unique risk profile that needs to be managed. View this resource now to discover an analysis of what an API truly is, and how they expose enterprises to new threats.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

CA Technologies.

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited

Choosing the Right API Management Solution for the Enterprise User
sponsored by CA Technologies.
WHITE PAPER: Publishing application programming interfaces (APIs) to an external developer community introduces a number of challenges and risks for the enterprise. This informative whitepaper considers a system that regulates security protocols and automates access for APIs, promoting a secure yet intuitive platform for API delivery.
Posted: 22 Aug 2014 | Published: 31 Dec 2013

CA Technologies.

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
EBOOK: Overcoming developer access and secure coding barriers to enable mobile innovation without sacrificing data security are massive blocks for a seamless mobile experience. This e-book discusses best practices for handling the security requirements of different mobile apps.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

CA Technologies.

Analysit Fact Sheet: Who’s Minding your Cloud?
sponsored by CA Technologies.
ANALYST BRIEF: 46% of companies have stopped or slowed adoption of cloud services due to security concerns. View this analyst fact sheet to learn more about how companies are handling software, application, and cloud security.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

CA Technologies.

Large Financial Services Firm Passes Its PCI Audit— and Implements an Ongoing Governance Program
sponsored by Veracode, Inc.
CASE STUDY: A large financial services firm sought help with a one-time project to pass its payment card information (PCI) audit. View this case study now to see how this financial firm decided on continuous analysis, and the advantages they saw as a result. Also learn about a software system that achieves this without acquiring more servers.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

Secure Mobile Devices without Restricting Users
sponsored by Bluebox
VIDEO: In this informativevideo, explore a new mobile security solution which provides mobile security and visibility without forcing users to stop using their preferred apps and devices.
Posted: 20 Aug 2014 | Premiered: 05 Mar 2014

Bluebox

The Impact of Data Breaches: Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

2013 Threat Report
sponsored by Dell Software
WHITE PAPER: This report extensively details and categorizes recent global trends in network threats.
Posted: 19 Aug 2014 | Published: 23 Jan 2014

Dell Software

Webinar: Why Benchmark Application Security?
sponsored by Veracode, Inc.
TRANSCRIPT: Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Veracode, Inc.

Webinar: When is Application Security Done?
sponsored by Veracode, Inc.
TRANSCRIPT: Traditional patchwork approaches to application security does not scale to match these leaps in company needs, resulting in poor security coverage of the application infrastructure. Listen to this webinar to discover the growing needs of modern companies, and which security practices will scale to match what tomorrow holds.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Veracode, Inc.

ROI Case Study: Cloud-Application Security Service
sponsored by Veracode, Inc.
CASE STUDY: A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Veracode, Inc.

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company

Five Program Management Best Practices When Designing App Security
sponsored by Veracode, Inc.
WHITE PAPER: Program management is essential during the early stages of designing an application security program. This whitepaper discusses how a company implemented program management while developing an application security program, and the results they saw.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Hewlett-Packard Company

Addressing the Scalability Challenge with Cloud-Based Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Ad-hoc application security programs have led to inconsistent policies across businesses, as shown in this startling statistic: 93% of companies suffered a data breach in 2013. This whitepaper considers a software system that focuses on scalability and simplicity.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

Reducing security risks from open source software
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper highlights how your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Posted: 18 Aug 2014 | Published: 01 Oct 2013

Hewlett-Packard Company

HP Fortify on Demand
sponsored by Hewlett-Packard Company
DATA SHEET: Access this data sheet to discover an on-demand solution that tests the security of software quickly, accurately, and affordably.
Posted: 18 Aug 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 18 Aug 2014 | Published: 01 Sep 2013

Hewlett-Packard Company

Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
CASE STUDY: A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

The Allure Behind Risk-Based Authentication
sponsored by CA Technologies.
EGUIDE: This expert e-guide reveals the draw to risk-based authentication, how to ensure secure API use occurs within the enterprise, and cyber threats moving to critical infrastructure.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

CA Technologies.

Mobile Security: Getting Past No to Yes
sponsored by Bluebox
WEBCAST: This webcast reveals how focusing on mobile security can improve your organization, specifically because of the booming emergence of the mobile market.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Bluebox

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

Citrix

IBM MobileFirst - ELMEC: Client Success with IBM Worklight
sponsored by IBM
VIDEO: This video case study explains how one organization was able to build secure and flexible mobile apps for their employees to use on their BYOD devices.
Posted: 12 Aug 2014 | Premieres: 05 Oct 2014

IBM
26 - 50 of 704 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement