IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive data. Once an afterthought in software design, security is becoming an  … 
Definition continues below.
Application SecurityReports
76 - 100 of 704 Matches Previous Page  | Next Page
Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Enhance End-User Productivity While Keeping your Apps and Files Secure
sponsored by NComputing
WHITE PAPER: This exclusive whitepaper details a product that can help you increase end-use productivity while keeping your application and files secure in the increasingly mobile business landscape.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

NComputing

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: With mobility strategies quickly becoming a priority for the majority of organizations, this informative guide provides information on mobile security strategies that every business needs to learn more about.
Posted: 27 Jun 2014 | Published: 22 Nov 2013

CA Technologies.

Closing the Biggest Hole in Web Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper explores a strategy for closing the biggest hole in web application delivery.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

CA Technologies.

The Total Value of Simpana Software
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper gives survey results on a backup software solution that drives additional value not only in terms of costs but also efficiency, risk reduction, and data value.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

CommVault Systems, Inc.

Ensuring Availability and Security with an Enterprise-Class Application Delivery Solution
sponsored by Citrix
WHITE PAPER: Find out which application virtualization and delivery solutions are capable of working together to provide you with both high availability and stellar security.
Posted: 20 Jun 2014 | Published: 31 Dec 2010

Citrix

Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

F5 DDoS Protection: Recommended Practices
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper provides strategies used to combat DDoS attacks, particularly defense mechanisms.
Posted: 19 Jun 2014 | Published: 31 Dec 2012

F5 Networks

5 Pillars of API Management
sponsored by CA Technologies.
WHITE PAPER: Learn about API management solutions that can help your business tackle the security challenges of APIs, and uncover the 5 pillars of API management.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

CA Technologies.

Gartner 2013 Magic Quadrant for Security Information and Event Management Report
sponsored by Hewlett-Packard Limited
ANALYST REPORT: This analysis report measures the adoption of SIEM technology pertaining to specific vendors.
Posted: 11 Jun 2014 | Published: 31 Dec 2013

Hewlett-Packard Limited

Five Simple Strategies for Securing APIs
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper examines security risks unique to APIs and discusses five simple solutions to these issues.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

CA Technologies.

3 Strategies for Proper Data Protection Service Allocation
sponsored by VMware, Inc.
EGUIDE: This expert e-guide from SearchStorage.com offers 3 key tips to proper data protection service allocations.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

VMware, Inc.

Secure Cloud Applications Without Disrupting Your Enterprise Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features an on-premise federated identity service that helps you extent your existing identity and access management (IAM) infrastructures to the cloud.
Posted: 05 Jun 2014 | Published: 31 Dec 2012

Radiant Logic, Inc.

DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
WHITE PAPER: This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Posted: 30 May 2014 | Published: 30 May 2014

FireEye

2013 Magic Quadrant for Application Security Testing
sponsored by Hewlett-Packard Limited
ANALYST REPORT: This exclusive paper examines a set of application security testing solutions that are designed to analyze and test applications for security vulnerabilities using static, dynamic and interactive testing techniques. Read on to find out how you can stay ahead of the market.
Posted: 29 May 2014 | Published: 23 Jul 2013

Hewlett-Packard Limited

Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

Secure by Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix

Magic Quadrant for Application Security Testing
sponsored by Veracode, Inc.
ANALYST REPORT: Choosing the right software security testing tool can be an overwhelming process. In this Gartner report, make your decision a little easier with a comparison of the top app security testing vendors on the market, including IBM, HP, Veracode, Aspect, and more.
Posted: 03 Jul 2014 | Published: 02 Jul 2013

Veracode, Inc.

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

Webinar: Practical Examples for Achieving and Maintaining DevOps Compliance for Financial Institutions
sponsored by WANdisco
WEBCAST: Banking and financial institutions rely heavily on internally developed software to provide new products and services and are faced with an ever-changing regulatory environment that imposes tremendous challenges. This webinar will review specific compliance challenges, and how to automate compliance for open source software.
Posted: 23 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Webinar: Scaling Git for the Enterprise
sponsored by WANdisco
WEBCAST: This webinar answers the most common questions when attempting to scale Git for the enterprise including how to manage thousands of users, monitor performance, and ensure compliance with regulatory standards
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Windows 8 Pro
WHITE PAPER: This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Lenovo and Windows 8 Pro

Secure Access and Continuity in a Virtualized and BYOD World
sponsored by Hewlett-Packard Company
WHITE PAPER: This business whitepaper focuses on the challenges facing midsize businesses who are looking to provide business continuity and minimized downtime. It also highlights the benefits of HP Just Right IT secure access and business continuity solutions.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
76 - 100 of 704 Matches Previous Page    2 3 4 5 6 7    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  increasingly important concern during development as applications become more frequently accessible over networks and are, as a result, vulnerable to a wide variety of threats. Actions taken to ensure application security are sometimes called countermeasures. The most basic software countermeasure is an application firewall that limits the execution of files or the handling of data by specific installed programs. The most common hardware countermeasure is a router that can prevent the IP address of an individual computer from being directly visible on the Internet. Other countermeasures include … 
Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement