IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application Security Reports
51 - 75 of 715 Matches Previous Page  |  Next Page
IBM InfoSphere Guardium: Manage the Entire Data Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: This white paper introduces a robust solution from IBM capable of safeguarding your enterprise's data across all enterprise systems and data center environments.
Posted: 03 Feb 2015 | Published: 31 Oct 2013

IBM

Application Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn about new app security tools you can use to vet open source libraries and manage security vulnerabilities.
Posted: 03 Feb 2015 | Premiered: 02 Dec 2014

SearchSecurity.com

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 01 Feb 2015 | Published: 01 Sep 2013

Hewlett-Packard Company

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 01 Feb 2015 | Published: 18 Aug 2014

Hewlett-Packard Company

Not Your Father’s IPS: SANS Survey on Network Security Results
sponsored by Hewlett-Packard Company
ANALYST REPORT: Access this analyst report by SANS to uncover how the integration of next-generation IPS with security information and event management (SIEM) tools is changing IT pros approach to security, and how this shift enables improved functions and potential for efficient alert and reporting.
Posted: 01 Feb 2015 | Published: 18 Nov 2013

Hewlett-Packard Company

SANS - Securing Web Applications Made Simple and Scalable
sponsored by Hewlett-Packard Company
ANALYST REPORT: This SANS report features an automated application security testing solution that identifies known vulnerabilities across multiple sources to keep your networks fully protected.
Posted: 01 Feb 2015 | Published: 30 Sep 2013

Hewlett-Packard Company

Reducing security risks from open source software
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper highlights how your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Posted: 01 Feb 2015 | Published: 01 Oct 2013

Hewlett-Packard Company

Know the Big Three: Top three mobile application threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive paper examines how to prevent sensitive data leakage over insecure channels or stolen devices. Read on to discover the top three threats to mobile applications and how to mitigate their potential impact.
Posted: 01 Feb 2015 | Published: 26 Aug 2014

Hewlett-Packard Company

Does App Security Pay? The Business Impact of Security Tools
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce applications vulnerabilities, speed recovery time and minimize delays. Read on to learn more.
Posted: 01 Feb 2015 | Published: 20 Jan 2014

Hewlett-Packard Company

SANS - Survey on Application Security Programs and Practices
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues.
Posted: 01 Feb 2015 | Published: 28 Feb 2014

Hewlett-Packard Company

Enterprise Software Security Strategies Pulse Report (SSA)
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey report by Gatepoint Research explores the extent to which IT organizations employ application security testing and remediation solutions.
Posted: 01 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company

Assess Database Vulnerabilities and Eliminate Risk
sponsored by IBM
VIDEO: This video introduces a vulnerability assessment solution that utilizes in-depth evaluations to examine patch levels and database configurations, highlighting vulnerabilities in your environment so you can quickly remediate problems and safeguard your critical data.
Posted: 30 Jan 2015 | Premiered: 11 Nov 2014

IBM

Identity is the Center of Always-On Connectivity
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper examines the advantages organizations stand to gain by using an identity and access management platform to federate access control across all applications and create a centralized view of all your users' information, allowing you to dramatically improve your customer experience.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

Ping Identity Corporation

Managing Identity as the New Perimeter
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides a comprehensive overview of how mobility and virtualization trends are impacting identity and access management (IAM), what solutions are available to address potential challenges, and how to future-proof your identity management strategy for any business scenario.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

Ping Identity Corporation

How an endpoint management project reduced server security risk and improved efficiency
sponsored by IBM
CASE STUDY: Inside this case study, learn about an organization that benefitted from using an endpoint management tool to improve security compliance and minimize operation costs. Discover the main activities that were accomplished during the project by examining the proof of concept.
Posted: 29 Jan 2015 | Published: 03 Jul 2014

IBM

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Providing Security and Compliance for an Ever-Growing Number of Endpoints
sponsored by IBM
WHITE PAPER: This white paper introduces you to an easy-to-manage, quick-to-deploy solution that supports security for a large variety and large numbers of endpoints — from servers to desktop PCs, Internet-connected laptops, smartphones and other mobile devices, as well as specialized equipment such as point-of-sale devices, ATMs and self-service kiosks.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

IBM

Learn why NSS Labs Recommends NetScaler AppFirewall
sponsored by Citrix
WEBCAST: This exclusive webcast takes an in-depth look at application firewalls and includes a study of how one web application firewall (WAF) was able to toe the line and meet industry standards. Read on to learn more.
Posted: 28 Jan 2015 | Premiered: Jan 26, 2015

Citrix

SAML Identity Federation: Security for an Increasingly Connected World
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language - SAML. It describes why standards like SAML are necessary for implementing federated identity across organizations.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Ping Identity Corporation

DDoS Attack Mitigation Technologies Demystified
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper dives into the technologies used traditionally to detect and mitigate DDoS attacks, and how they evolved to the stands they're at today. Read on to learn more.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Fortinet, Inc.

Cloud Readiness: Securing Access to Your Private Cloud
sponsored by Ping Identity Corporation
EBOOK: This eBook explains the benefits of moving enterprise applications to the cloud and describes how to keep your applications and data secure during this process.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Ping Identity Corporation

Web Application Security for Dummies
sponsored by Qualys
EBOOK: This e-book explains how to quickly locate and remediate vulnerabilities in order to prevent attackers from gaining control over the application and obtaining access to the server, database, and other back-end IT resources.
Posted: 26 Jan 2015 | Published: 30 Dec 2011

Qualys

Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys

SSL Offloading and Acceleration in Virtualized Environments
sponsored by Array Networks
WHITE PAPER: Access this white paper to find out how you can ensure high performance in both virtualized cloud and data center environments.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Array Networks
51 - 75 of 715 Matches Previous Page    1 2 3 4 5 6    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement