IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityReports
76 - 100 of 602 Matches Previous Page  | Next Page
Firewall Buyers Guide for Evaluating Enterprise Network Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: In this resource, uncover a buyers guide for next-generation firewalls that details all the must-have functions in order to ensure optimum network security. Click now to see how to choose the right solution for your organization's needs.
Posted: 26 Dec 2013 | Published: 26 Dec 2013

Palo Alto Networks

BMC Release Lifecycle Management
sponsored by BMC Software
WHITE PAPER: This whitepaper covers a solution that will help ease your management of complex web applications and reduce the risks of failure.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

BMC Software

EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager
sponsored by IBM
WHITE PAPER: Many security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.
Posted: 06 Dec 2013 | Published: 03 Jul 2013

IBM

Social Media Governance & Security: Amplify Your Brand While Protecting Your Assets
sponsored by Hootsuite
WEBCAST: Social media is drastically altering the way businesses interact with clients, and while it provides great opportunity to increase brand awareness, it also brings significant risk. Choosing the right social media platform is paramount to ensuring security and maintaining compliance.
Posted: 21 Nov 2013 | Premiered: Nov 21, 2013

Hootsuite

Secure Your Social Enterprise
sponsored by Hootsuite
WEBCAST: As enterprises become more active in social media, it can become difficult to keep track of all social accounts. Finding new fake or hijacked accounts isn't easy, and false representations of your company can seriously harm your brand. How can you protect your social media accounts from hackers and spammers? Find out in this comprehensive webcast.
Posted: 21 Nov 2013 | Premiered: Nov 21, 2013

Hootsuite

The DDoS Threat Spectrum
sponsored by F5 Networks
WHITE PAPER: This crucial paper takes an in-depth look at the evolution of DDoS attacks, outlining their history, present landscape and potential future so that your organization can understand what may be coming on the horizon and take the necessary precautions to ensure data protection and business continuity.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

F5 Networks

Beating Back Malicious Mobile Apps Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013

SearchSecurity.com

Not Your Father’s IPS: SANS Survey on Network Security Results
sponsored by Hewlett-Packard Company
ANALYST REPORT: Access this analyst report by SANS to uncover how the integration of next-generation IPS with security information and event management (SIEM) tools is changing IT pros approach to security, and how this shift enables improved functions and potential for efficient alert and reporting.
Posted: 18 Nov 2013 | Published: 31 Oct 2013

Hewlett-Packard Company

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett-Packard Company

A Secure Environment to Deploy Software Solutions for Cloud
sponsored by IBM
VIDEO: When it comes to deploying cloud applications, many businesses are concerned about infrastructure, platform choice, and security -- but you don't have to be. Watch this informative video to learn how you can leverage a secure, resilient, multi-tenant platform that allows you to quickly and easily deploy cloud applications.
Posted: 12 Nov 2013 | Premiered: 21 May 2013

IBM

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: In this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.
Posted: 26 Dec 2013 | Published: 31 Aug 2013

Palo Alto Networks

Cloud Based Application Penetration Testing Trial
sponsored by iViZ
WHITE PAPER: Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

iViZ

Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Trend Micro

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Legacy Application Migration to the Cloud and Security
sponsored by IBM
ESSENTIAL GUIDE: Access this resource to gain expert advice on how to plan ahead for a secure migration of legacy applications to the cloud.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

IBM

Endpoint Security IT Decision Center Handbook 2
sponsored by SearchSecurity.com
EGUIDE: Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

SearchSecurity.com

Secure, Optimized Global Access to Corporate Resources
sponsored by F5 Networks
WHITE PAPER: This exclusive paper examines a unified access solution that provides end-to-end availability and optimization with secure unified access, extending the application policy to the client.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

F5 Networks

Secure Mobile Access to Corporate Applications
sponsored by F5 Networks
WHITE PAPER: This exclusive paper discusses how your organization can keep access to mobile business applications secure, analyzing a solution that provides benefits such as user authentication, SSO capability, and saving credentials.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

F5 Networks

Business Impacts on SAP Deployments
sponsored by IBM
WHITE PAPER: In this informative study, find out the real-word impact of deploying SAP on IBM's Power platforms, as opposed to SAP on HP x86, Dell x86 and HP Itanium, all running with Oracle DB.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

IBM

Tracked, Hacked and Attacked
sponsored by IBM
WHITE PAPER: Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

IBM

Secure The Enterprise With Confidence Using A Mainframe Infrastructure
sponsored by IBM
WHITE PAPER: Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.
Posted: 14 Nov 2013 | Published: 31 Mar 2013

IBM

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Next-Generation Security for Today's Data Center
sponsored by IBM and Juniper
WHITE PAPER: This crucial resource discusses next-generation security solutions that can offer unparalleled protection against data exfiltration, website outages, and other serious threats against the data center.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

IBM and Juniper
76 - 100 of 602 Matches Previous Page    2 3 4 5 6 7    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement