IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
51 - 75 of 846 Matches Previous Page  |  Next Page
Succeeding with Static Code Analysis: An Implementation Guide
sponsored by Programming Research
WHITE PAPER: Static code analysis can help you rapidly ensure the safety and security of embedded software, but it isn't a one-size-fits-all solution. Discover the biggest challenges that can prevent static code analysis from effectively detecting issues early on.
Posted: 19 May 2016 | Published: 19 May 2016

Programming Research

Unified Identity Governance - A Business Overview
sponsored by Oracle Corporation
WHITE PAPER: Application proliferation has created renewed identity fragmentation, as users are inconsistently managed across apps in the enterprise. Learn how to create a converged identity governance process—managing access privileges across all business applications and platforms by unifying identity governance.
Posted: 19 May 2016 | Published: 31 May 2015

Oracle Corporation

Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform
sponsored by Gemalto
WHITE PAPER: With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

Mobilize Your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Static Code Analysis: A Buyer's Guide
sponsored by Programming Research
WHITE PAPER: How can you select the right static code analysis solution to deliver reliable, safe, and secure software? Explore the major benefits and pitfalls of static code analysis tools, and discover best practices to optimize embedded software development.
Posted: 18 May 2016 | Published: 18 May 2016

Programming Research

Six steps to control the uncontrollable
sponsored by Microsoft
WHITE PAPER: Your employees need to be productive where and when they want to be. If you don't provide ways for them to accomplish this, they'll do it themselves. So how sure are you that you're in full control of your company? Explore six key focus areas to managing your enterprise's mobility and empowering your employees while ensuring security.
Posted: 18 May 2016 | Published: 04 May 2016

Microsoft

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM MaaS360
WHITE PAPER: Your goal is to make BYOD policies feasible by seamlessly securing corporate data on the device while providing logical separation from personal activities. Learn five key steps you should consider before putting your BYOD program in place.
Posted: 18 May 2016 | Published: 31 Dec 2012

IBM MaaS360

Controlling the uncontrollable
sponsored by Microsoft
WHITE PAPER: 29% of workers use three or more devices, work from many locations, and use many apps, and this number is growing. The problem is enabling employees without compromising security throughout the enterprise. Read on to learn about an enterprise mobile management solution that will make the process easier than you may realize.
Posted: 18 May 2016 | Published: 11 May 2016

Microsoft

The State of Mobile Application Insecurity - Ponemon Institute Research Report
sponsored by IBM MaaS360
RESOURCE: This Ponemon Institute study, which encapsulates 640 individuals involved in the application development and security process, will help you understand how organizations are reducing the risk of unsecured mobile apps used in their business practices.
Posted: 18 May 2016 | Published: 28 Feb 2015

IBM MaaS360

Benefits of Building a Digital Business on an Integration Foundation
sponsored by Axway
TRANSCRIPT: As the number of connected "things" increases, enterprise data is becoming more vulnerable and waiting to be exploited. All this data needs to be managed and integrated into business processes to secure the future of your digital ecosystem.
Posted: 17 May 2016 | Published: 26 Apr 2016

Axway

Enterprise Mobile Management
sponsored by IBM MaaS360
RESOURCE: Are you sure that your mobility solution is keeping you competitive? The future of business is becoming increasingly focused on mobility and shaping the mobile worker's experience. Access this report to compare the top eleven enterprise mobile management vendors and gain an understanding of what to look for in a solution.
Posted: 17 May 2016 | Published: 04 Dec 2015

IBM MaaS360

Understanding How IBM Spectrum Protect Enables Hybrid Data Protection
sponsored by IBM
WHITE PAPER: Moving to a hybrid cloud infrastructure is a no-brainer for many organizations as it provides greater efficiency and cost effectiveness. But, choosing a cloud services provider who provides the best data protection isn't as clear. Learn what to look for when architecting your hybrid cloud solution and how to best protect your backups.
Posted: 16 May 2016 | Published: 31 Aug 2015

IBM

Practical Guide to IT Security Breach Prevention Part II
sponsored by Kaspersky Lab
EBOOK: With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.
Posted: 16 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Barracuda NextGen Firewalls protect the ever-expanding operation of Georgia’s leading telecoms provider, Geocell
sponsored by Barracuda Networks
RESOURCE: Geocell chose a next-generation firewall that fit every criteria and beyond. Within only two months, business-critical apps were running smoothly and network management controls were centralized. Learn more about how Geocell's experiences could benefit your network.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Jump start mobile productivity with MDM and secure file sharing
sponsored by Citrix
WHITE PAPER: Mobile device management is only a piece of the mobility puzzle. With mobile workers' demands rising, it is hard to ensure the quality of service they need and the security they may not realize they need. Learn more about challenges to empowering mobile workers and how to ensure your critical data stays safe.
Posted: 13 May 2016 | Published: 30 Jun 2014

Citrix

Customer Story - Broward Health
sponsored by Citrix
VIDEO: Watch this video to learn how one of the largest healthcare systems in the United States was able to adopt a suite of products that enabled improved efficiency, mobility and security, the three most important aspects to the industry.
Posted: 13 May 2016 | Premiered: 08 Oct 2013

Citrix

13 Questions You Must Ask Your Bot Mitigation Vendor
sponsored by Distil Networks
WHITE PAPER: Discover 13 tips to help you differentiate between vendors to make a fully informed decision when it comes to your web application security.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

Top 6 Security Measures for the Enterprise Campus Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover a next-generation security model that moves away from traditional security tools. Learn how you can bring together all critical network security elements to provide an integrated security framework for your cloud-enabled enterprise.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

Customer Spotlight | blinkbox
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about a VOD service called blinkbox and their struggles finding solid cloud security for their platform. Watch now to see how they remediated their security issues and how they now operate without breach concerns.
Posted: 11 May 2016 | Premiered: 28 Oct 2014

Barracuda Networks

Evaluating Your Application Portfolio: 5 Key Steps
sponsored by CAST Software
WHITE PAPER: As your company grows, how can you decide which applications to keep, merge, or retire? This resource reveals 5 key steps to evaluate your application portfolio. Discover how you can mitigate software risks, reduce maintenance costs, optimize agility for resource allocation, and more.
Posted: 11 May 2016 | Published: 11 May 2016

CAST Software

4 Strategies for Keeping Critical Networks Secure
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn four major criteria for selecting the right long term security partner. Access now to find a security provider who can satisfy these major areas of concern and other areas of need for your organization.
Posted: 10 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

Enhancing the security and performance of your cloud-based applications
sponsored by Verizon
VIDEO: This video shows you how you can securely connect to a variety of leading cloud providers through advanced network services, giving you a reliable end-to-end experience for all your cloud-based applications. Watch now to discover secure, on-demand connectivity to drive growth, improve business performance and gain a competitive advantage.
Posted: 10 May 2016 | Premiered: 25 Feb 2015

Verizon

Schuberg Philis accelerates application deployment using network virtualization
sponsored by VMware
CASE STUDY: This case study presents an IT outsourcing company that sought to deploy new environments centrally using software APIs in order to guarantee its clients 100% functional uptime for their mission-critical applications. Access now to see how they were able to use network virtualization to make major strides toward this goal.
Posted: 10 May 2016 | Published: 31 Dec 2014

VMware

Modern Snapshot Management: Enhancing Application Protection and Recovery
sponsored by Commvault
WHITE PAPER: This white paper discusses integrating array-based snapshot technologies with an existing data protection approach to improve manageability, recovery, and protection. Discover how you can deliver faster and more granular application-aware data recovery performance with less effort, complexity, and cost.
Posted: 09 May 2016 | Published: 31 Dec 2015

Commvault

Identity and Access Management for the Real World: The Fundamentals
sponsored by Dell Software
EBOOK: This e-book discusses the most pressing IAM issues faced by most organizations and offers actionable and sustainable approaches to the IAM challenges you encounter. Access now to learn what IAM for the real world can and should look like.
Posted: 09 May 2016 | Published: 31 Dec 2014

Dell Software
51 - 75 of 846 Matches Previous Page    1 2 3 4 5 6    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement