IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityReports
51 - 75 of 612 Matches Previous Page  | Next Page
Information Security Magazine – March 2014
sponsored by SearchSecurity.com
EZINE: In this issue, we look at the security debate shadowing cloud deployments, and explain how to assess the threats, vulnerabilities and consequences using a simple risk equation.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

SearchSecurity.com

Five Common Web Application Vulnerabilities and How to Avoid Them
sponsored by Imperva
EGUIDE: In this E-Guide, expert Michael Cobb details the five most common Web application vulnerabilities and provides methods to help enterprises fix the original problems.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Imperva

5 Easy steps to adopting an enterprise app store
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines five easy steps that your organization can take to adopt a secure and effective enterprise app store that will help you empower your workers and reap the benefits of enterprise mobility.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

Cloud Testing Production Applications: CloudTest Strategy and Approach
sponsored by SOASTA, Inc
WHITE PAPER: This white paper discusses the three most frequently discussed topics about testing in production (security, test data, and potential live customer impact), and describes how the methodology helps to achieve high confidence testing in production.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

SOASTA, Inc

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

Does Application Security Pay?
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce application vulnerabilities, speed recovery time, and minimize delays. Read on to learn more.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

Case Study: SEEK Protects Sites with Web Application Security Firewall
sponsored by Imperva
WEBCAST: This case study features one organization's experience with a Web application security solution that tackled technical, logic, denial-of-service, and fraud attacks to reduce risk and save its reputation.
Posted: 21 Feb 2014 | Premiered: Mar 19, 2013

Imperva

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications
sponsored by Imperva
WHITE PAPER: Read this white paper to unveil the top 6 recommended features for Web application security that next-generation firewalls and an intrusion prevention system (IPS) often miss.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Imperva

Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents as 7-step guide to help you prepare for and prevent these motivated threats.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

IBM Acquires Fibrelink to Bloster its Mobile First Portfolio
sponsored by IBM
WHITE PAPER: This informative white paper discusses how the mobile management trend is shifting away from simply "managing the device" and moving instead towards all-encompassing solutions suites that provide management for applications, data, analytics, and security.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

IBM

Mitigating the OWASP Top 10 2013 with Imperva SecureSphere
sponsored by Imperva
WHITE PAPER: This resource offers a Web application firewall solution that addresses the Open Web Application Security Project (OWASP) Top 10 security risks.
Posted: 19 Feb 2014 | Published: 31 Dec 2013

Imperva

TicketNetwork Selects SecureSphere to Secure Transactions
sponsored by Imperva
CASE STUDY: This white paper highlights a quick-to-deploy Web application firewall that offers the scalability needed to handle a large number of online transactions, as well as a malicious IP address blocking feature to ensure data access and security.
Posted: 19 Feb 2014 | Published: 31 Dec 2011

Imperva

The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012

Imperva

Monitor and Protect Critical Web Applications with a Web Application Firewall
sponsored by Imperva
WEBCAST: While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

Imperva

Collaboration gives GE more dynamic, secure mobile workforce
sponsored by Hewlett-Packard Limited
VIDEO: Take 30 seconds out of your day to see why GE is securely penetrating their emerging markets and enabling customers to take advantage of their services. Watch this video to learn more.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

Learn How PGi Addresses Security, Resilience and Business Continuity
sponsored by Premiere Global Services
WHITE PAPER: Consult the following case study to hear from a global provider of advanced virtual meetings, PGi, as they reveal their best practices for security, integrity, and business continuity.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Premiere Global Services

IT Security Challenges: Interview with Brian Glick and HP
sponsored by Hewlett-Packard Limited
WEBCAST: In this webcast, learn how to deal with security threats proactively and better understand the importance of becoming familiar with your IT's own vulnerabilities in infrastructure and applications so you're able to monitor and manage security optimally.
Posted: 07 Feb 2014 | Premiered: Feb 7, 2014

Hewlett-Packard Limited

Do You Really Need A SAN-Based Cluster? Ten Essential Questions to Ask Before Choosing a Cluster Solution
sponsored by SIOS Technology Corp
WHITE PAPER: Businesses today are deploying applications in physical, virtual, and cloud environments, and as such, clusters based on storage SANs are no longer the go-to choice for application security. SAN-less clusters offer increased flexibility and cost savings without sacrificing performance -- but will they work for your IT environment?
Posted: 05 Feb 2014 | Published: 05 Feb 2014

SIOS Technology Corp

Patch Management Best Practices
sponsored by LabTech Software
WHITE PAPER: A top priority for IT service providers is to keep clients' critical systems free from known vulnerabilities. This is where patch management comes into play. Access this white paper today to find best practices for various kinds of patches so you can keep critical systems safer.
Posted: 31 Jan 2014 | Published: 31 Dec 2012

LabTech Software

Does Application Security Pay? Measuring the Business Impact of Software Security Assurance Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce applications vulnerabilities, speed recovery time and minimize delays. Read on to learn more.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Hewlett-Packard Company

Know the big three: Top three mobile application threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive paper examines you how to prevent sensitive data leakage over insecure channels or stolen devices. Read on to discover the top three threats to mobile applications and how to mitigate their potential impact.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Hewlett-Packard Company

Designing a defense for mobile application
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper you will learn about the various considerations for defending mobile applications—from the mobile application architecture itself to the myriad testing technologies.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

Hewlett-Packard Company

Protecting Your APIs Against Attack & Hijack
sponsored by CA Technologies.
WHITE PAPER: Even though application programming interfaces (APIs) experience the same threats as the Web, thanks to architecture differences, existing Web security methods aren't enough to keep them protected. Read on to unveil 5 best practices to secure your API architectures.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

PaaS Platform as a Service: Powering a New Era of Business IT
sponsored by OutSystems
WHITE PAPER: There's a lot of buzz surrounding Platform-as-a-Service (PaaS) these days. Why has it become so irresistible? Find out in this white paper, which explains why PaaS has become increasingly relevant to today's IT organizations.
Posted: 05 Feb 2014 | Published: 05 Feb 2014

OutSystems

Defending Against Insider Threats in the “Snowden Era”
sponsored by CA Technologies.
WHITE PAPER: Security breaches are a significant threat for organizations in the age of big data: broken privacy laws, reputational damage, and loss of classified information are very real possibilities. What's worse is one of the most commonplace and damaging causes of security breaches can come from the inside of your business.
Posted: 28 Jan 2014 | Published: 31 Dec 2013

CA Technologies.
51 - 75 of 612 Matches Previous Page    1 2 3 4 5 6    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement