IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityReports
26 - 50 of 694 Matches Previous Page  | Next Page
How Telcos Can Outpace Commoditization in the Application Economy
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how telecommunications service providers are uniquely positioned to leverage their infrastructure, expertise, and insights to provide identity management services for the application economy.
Posted: 13 Nov 2014 | Published: 29 Aug 2014

CA Technologies.

How IT Maintains Relevancy In A Cloud World
sponsored by Rackspace
WHITE PAPER: Access this white paper to learn about the main challenges that face today's enterprise IT organizations, and what this means for your organization. Additionally, explore ways to use cloud computing and a service-provider model to transform the IT business model from a cost center to a strategic business partner.
Posted: 13 Nov 2014 | Published: 13 Nov 2014

Rackspace

A Cheat Sheet for Comparing Cloud Encryption Schemes
sponsored by SkyHigh
WHITE PAPER: This cheat sheet provides an overview of cloud encryption schemes and their relative strengths and weaknesses.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SkyHigh

Beyond the Firewall: Protection and Performance
sponsored by Akamai Technologies
WHITE PAPER: Access this exclusive paper that explains how to achieve greater visibility into the global threat landscape and create a more proactive resilient defense against cyberattackers. Additionally, find out how to address the challenge of a changing defense budget in the next few years.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

Web Security: Protecting the Heart of Your Business
sponsored by Akamai Technologies
WHITE PAPER: In this study conducted by Forrester Research, Inc., learn how organizations in the US and Europe understand the impact of cyberattacks and specifically the role DDoS and web application attacks have on their business.
Posted: 11 Nov 2014 | Published: 31 Aug 2014

Akamai Technologies

The Service Innovation Mandate in Telecommunications
sponsored by CA Technologies.
WHITE PAPER: This paper provides an overview of the key strategies telecommunications companies can pursue in order to most fully capitalize on the opportunities afforded by APIs. Read on to learn more.
Posted: 11 Nov 2014 | Published: 31 Oct 2014

CA Technologies.

Selecting an Application Performance Management To Fit Your Business Needs
sponsored by IBM
WHITE PAPER: Check out this resource to access a Decision Matrix on APM for 2014-2015, which reveals 10 of the leading APM solutions in the market.
Posted: 10 Nov 2014 | Published: 18 Feb 2014

IBM

How important is it to have a secure and reliable web application infrastructure?
sponsored by Akamai Technologies
WEBCAST: This exclusive webcast takes an in-depth look at a web security solution that was able to deliver rock solid security without risking performance or cost. View now and take the first step towards a safer enterprise network.
Posted: 10 Nov 2014 | Premiered: Nov 10, 2014

Akamai Technologies

Protect Your Business from DDoS and Web Application Attacks
sponsored by Akamai Technologies
VIDEO: A solution more and more companies are turning to is cloud based service approach. You can scale the service to deal with ever increasing threats in a cost effective manner. Download and view this video to get an inside look at Forrester Research's findings regarding DDoS and application attacks.
Posted: 07 Nov 2014 | Premiered: 30 Oct 2014

Akamai Technologies

The PaaS Payoff: Greater Agility, Less Cost
sponsored by Red Hat
WHITE PAPER: This exclusive report points to research from UBM Tech that reveals how many IT decision makers are addressing these challenges with the help of Platform as a Service (PaaS). Learn more about the top reasons why organizations are harnessing PaaS, and why it is becoming the go-to strategy for modern business.
Posted: 07 Nov 2014 | Published: 31 Aug 2014

Red Hat

Web Application Firewall Buying Guide
sponsored by SearchSecurity.com
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

SearchSecurity.com

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Compare Citrix XenApp and VMware Horizon View
sponsored by Citrix
VIDEO: Access this webinar to compare Citrix XenApp and VMware Horizon View. You'll get an in-depth comparison of the key differences between the new app virtualization capabilities of these two solutions. You'll also get to listen in to a Q&A section to break down the most frequently asked questions surrounding these approaches.
Posted: 03 Nov 2014 | Premiered: 31 Oct 2014

Citrix

How Critical is the Internet for Business Commerce?
sponsored by Akamai Technologies
VIDEO: This short video discusses the critical nature of the internet to all businesses today, from customer-facing websites to business-to-business transactions.
Posted: 31 Oct 2014 | Premiered: 31 Oct 2014

Akamai Technologies

Application-Delivery Options in VMware Horizon 6.0
sponsored by Data#3
WHITE PAPER: If you maintain legacy applications, providing a single pane of glass and self-service is a challenge.To overcome these obstacles, VMware offers Horizon 6 to deliver RDS-based remoting for virtualized application.
Posted: 30 Oct 2014 | Published: 01 Oct 2014

Data#3

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper describes the financial implications of web attacks, DDoS attacks, and other web-based threats, and also introduces one company's web application firewall as a potential solution.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Imperva

Web Applications Under Attack: How Network Security Solutions Leave You Exposed
sponsored by Imperva
RESOURCE: This infographic depicts how two types of firewalls—web application firewalls and next generation firewalls—measure up against the threats considered to be the "top 10" by the Open Web Application Security Project (OWASP).
Posted: 30 Oct 2014 | Published: 31 Dec 2013

Imperva

Secure application delivery for a mobile workforce
sponsored by Citrix
WHITE PAPER: This white paper explores a way to transform your organization by supporting the mobility your workers rely on to get their work down wherever they can be most productive, whether it be in the office or outside of it. Read on to learn how you can facilitate a mobile workforce – without sacrificing security.
Posted: 29 Oct 2014 | Published: 28 Feb 2014

Citrix

Office 365: Strong Authentication and SSO in the Cloud
sponsored by SecureAuth
WHITE PAPER: In this white paper, discover the history behind Office 365 and where it currently stands today. Read on to find out why Microsoft is dealing with security risks and an authentication solution they used to protect the identity of mobile users.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

How Alert Logic Enabled bfw Advertising to Better Secure Clients' Websites
sponsored by Alert Logic
WHITE PAPER: This white paper describes how bfw Advertising, an agency that builds and manages websites and applications for B2B clients, worked with Alert Logic to implement a Web Application Firewall (WAF) to filter out suspicious web traffic.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

Getting to grips with BYOD
sponsored by ComputerWeekly.com
ANALYST REPORT: BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Putting Security on Auto-Pilot: What Works, What Doesn't
sponsored by SearchSecurity.com
EBOOK: As with many human endeavors, the impulse to automate the pen test is seemingly irresistible. But is it a good idea? This technical guide examines the pros, cons and unknowns of automated pen testing.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

SearchSecurity.com

Shavlik Patch: Simplified Application Patch Management for Microsoft System Center
sponsored by Shavlik Technologies
WHITE PAPER: This exclusive whitepaper explores a patch management solution that will reduce your security risks from unpatched, non-Microsoft third-party applications.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Shavlik Technologies

Tesco Uses CA Solutions to Monitor, Manage and Grow Their Business
sponsored by CA Technologies.
WEBCAST: Tesco, a global bank, was looking to implement an easy, customer-friendly authentication manager for their online customers. View this concise video now to find out what benefits Tesco is enjoying with this authentication system, and if a solution like this is right for your company.
Posted: 07 Nov 2014 | Premiered: Nov 7, 2014

CA Technologies.

Overcoming the Challenges of Internal API Programs
sponsored by Intel® Services
WEBCAST: Modernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.
Posted: 04 Nov 2014 | Premiered: Nov 4, 2014

Intel® Services
26 - 50 of 694 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement