IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: The OWASP Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws. OWASP (Open Web Application Security Project) is an organization that provides unbiased and practical, cost-effective information about computer and Internet applications. Project members include a variety of security experts from around the world who  … 
Definition continues below.
Web Application SecurityReports
1 - 25 of 234 Matches Previous Page  | Next Page
How Alert Logic Enabled bfw Advertising to Better Secure Clients' Websites
sponsored by Alert Logic
WHITE PAPER: This white paper describes how bfw Advertising, an agency that builds and manages websites and applications for B2B clients, worked with Alert Logic to implement a Web Application Firewall (WAF) to filter out suspicious web traffic.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

Build a more-secure web infrastructure with DataPower
sponsored by IBM
WHITE PAPER: This white paper explains the importance of building a highly secure web application infrastructure, due to the growing amount of confidential business information accessible through devices.
Posted: 22 Oct 2014 | Published: 01 Aug 2012

IBM

Comparing 6 Web Application Firewall Solutions
sponsored by Fortinet, Inc.
WHITE PAPER: This helpful resource from NSS Labs provides detailed comparisons and analyses of web application firewalls from Barracuda, Citrix, F5, Fortinet, Imperva, and Sangfor.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Fortinet, Inc.

Solution Brief API Management Version 2.0
sponsored by IBM
WHITE PAPER: Access this white paper to learn about a better way to design, manage, socialize, and secure your APIs. You'll learn how this approach provides you with a complete set of web API capabilities to encourage innovation.
Posted: 10 Oct 2014 | Published: 30 Nov 2013

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

WAF or IPS - Why you need more than a Firewall and IPS to protect your applications
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains the importance of using more than just a firewall and IPS to protect your applications from malicious attacks.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Affinity Credit Union Chooses HP Fortify On Demand - Cloud-Based Security Assessment Service for Mobile Remote Deposit Capture Application
sponsored by Hewlett-Packard Company
CASE STUDY: In this case study, explore how this company used a cloud-based security assessment service to improve banking applications.
Posted: 10 Sep 2014 | Published: 30 Nov 2013

Hewlett-Packard Company

5 Simple Strategies for Securing APIs
sponsored by CA Technologies.
WHITE PAPER: APIs share many of the same threats as the traditional web; however, they have an entirely unique risk profile that needs to be managed. View this resource now to discover an analysis of what an API truly is, and how they expose enterprises to new threats.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

CA Technologies.

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 18 Aug 2014 | Published: 01 Sep 2013

Hewlett-Packard Company

The Allure Behind Risk-Based Authentication
sponsored by CA Technologies.
EGUIDE: This expert e-guide reveals the draw to risk-based authentication, how to ensure secure API use occurs within the enterprise, and cyber threats moving to critical infrastructure.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

CA Technologies.

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

KAS BANK Discovers a Better Way to Secure High-value Transactions
sponsored by HID
CASE STUDY: This case study examines security challenges for a European bank with the shift to on line transactions. Read on to find out how they implemented a solution that delivered the highest level of security with a reusable infrastructure.
Posted: 04 Aug 2014 | Published: 25 Mar 2013

HID

Accelerating Web Applications: 3 Essential Principles
sponsored by F5 Networks
WHITE PAPER: This webcast gives tips on how organizations can accelerate their web applications by sending less data, sending data less frequently, and sending it more efficiently.
Posted: 31 Jul 2014 | Published: 30 Jun 2014

F5 Networks

Web Application Firewalls vs. Next-Generation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper compares the ability of two different types of firewalls—Web Application Firewalls (WAFs) and Next-Generation Firewalls (NGFWs)—to protect web applications from security threats.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

Fortinet, Inc.

eGuide: Patching Vulnerabilities with Web Application Firewalls
sponsored by Alert Logic
EGUIDE: This eGuide explains how web application firewalls can help to patch vulnerabilities in web applications and protect your enterprise from current and future threats.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

Five Tips to Improve a Threat and Vulnerability Management Program
sponsored by Alert Logic
EGUIDE: This expert e-guide explains how to improve your enterprise's threat and vulnerability management program in 5 simple steps.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

Providing a single source for secure identity solutions
sponsored by HID
BROCHURE: Access this brochure to find 6 product lines that provide a foundation for multi-layered security, as well as several key benefits of having complete access control for your organization.
Posted: 11 Jul 2014 | Published: 05 Dec 2012

HID

Mitigating the OWASP Top 10 2013 with Imperva SecureSphere
sponsored by Imperva
WHITE PAPER: This informative guide outlines an effective tool designed to help mitigate the OWASP top 10 and how it can greatly enhance your enterprise security.
Posted: 08 Jul 2014 | Published: 31 Dec 2013

Imperva

Web Attack Survival Guide Infographic
sponsored by Imperva
WHITE PAPER: This brief infographic provides 7 essential steps for Web attack survival.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Imperva

Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Protect Your Brand with Alert Logic PCI DSS Compliance Solutions
sponsored by Alert Logic
WHITE PAPER: This product brief outlines Alert Logic's cloud-powered solutions and the unique benefits offered to help eliminate the burden of PCI compliance.
Posted: 13 Jun 2014 | Published: 30 Jun 2012

Alert Logic

A Computer Weekly buyer's guide to testing and code quality
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

HP Fortify on Demand
sponsored by Hewlett-Packard Company
DATA SHEET: Access this data sheet to discover an on-demand solution that tests the security of software quickly, accurately, and affordably.
Posted: 18 Aug 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
Posted: 05 May 2014 | Published: 25 Sep 2013

IBM
1 - 25 of 234 Matches Previous Page    1 2 3 4    Next Page
 
WEB APPLICATION SECURITY DEFINITION (continued): …  share their knowledge of vulnerabilities, threats, attacks and countermeasures.Here are the OWASP Top Ten:Unvalidated input: Information from web requests is not validated before being used by a web application. Attackers can use these flaws to attack backend components through a web application.Broken access control:Restrictions on what authenticated users are allowed to do are not properly enforced. Attackers can exploit these flaws to access other users' accounts, view sensitive files, or use unauthorized functions.Broken authentication and session management:Account credentials and session … 
Web Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement