IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: The OWASP Top Ten is a list of the 10 most dangerous current Web application security flaws, along with effective methods of dealing with those flaws. OWASP (Open Web Application Security Project) is an organization that provides unbiased and practical, cost-effective information about computer and Internet applications. Project members include a variety of security experts from around the world who  … 
Definition continues below.
Web Application SecurityReports
26 - 50 of 235 Matches Previous Page  | Next Page
2013 MarketScope Report for Web Access Management
sponsored by IBM
ANALYST REPORT: This Gartner MarketScope report compares the top Web access management (WAM) vendors on the market today to help you decide which product will best fit your business needs.
Posted: 15 Apr 2014 | Published: 15 Nov 2013

IBM

Technical Guide on Application Security
sponsored by SearchSecurity.com
EZINE: This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

SearchSecurity.com

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This whitepaper details a security solution to sure up the vulnerabilities associated with web application exposure.
Posted: 06 Mar 2014 | Published: 10 Oct 2013

IBM

Breaking down silos of protection: An integrated approach to managing application security
sponsored by IBM
WHITE PAPER: This resource explores the critical risks created by application growth, why point products are unable to offer adequate protection, and the value of taking an integrated approach to managing application security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Protect people, processes and technology from web application threats
sponsored by IBM
WHITE PAPER: This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
Posted: 05 Mar 2014 | Published: 30 Nov 2013

IBM

Federated Identity & Single Sign‐On Using Layer 7
sponsored by CA Technologies.
WHITE PAPER: In this white paper, learn how separate identity silos create gaps and complexities in security measures. Read on to reveal a solution that federates identity and provides single sign-on (SSO) services for mobile and virtual applications to reduce these challenges.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

Not All SOA Gateways Are Created Equal
sponsored by CA Technologies.
WHITE PAPER: Most service-oriented architecture (SOA) gateways offer similar functionality: they address security and performance issues that arise when using XML-based messaging protocols. However, not all SOA gateways are created equal, as the total cost of ownership (TCO) can vary greatly.
Posted: 06 Feb 2014 | Published: 31 Dec 2011

CA Technologies.

5 Pillars of API Management
sponsored by CA Technologies.
WHITE PAPER: Application programming interfaces (APIs) form the foundation of today's open enterprise, allowing data to be shared between on-premise applications and data with Web apps, smart devices, and the cloud. But APIs open up new concerns for management and security that must be considered for safe, effective API usage.
Posted: 05 Feb 2014 | Published: 31 Dec 2013

CA Technologies.

A How‐to Guide to OAuth & API Security
sponsored by CA Technologies.
WHITE PAPER: When it comes to Web applications, one of the top concerns is security. With OAuth, users can authorize limited access to applications and data. View this white paper for a how-to guide to OAuth and API security.
Posted: 05 Feb 2014 | Published: 31 Dec 2013

CA Technologies.

Web Application Security Insider's Edition
sponsored by SearchSecurity.com
EZINE: This Insider Edition will help you understand threats against Web applications, how you can help developers with security tools and training and how to deploy technologies such as Web application firewalls to keep your organization's Web presence safe.
Posted: 19 Sep 2013 | Published: 18 Sep 2013

SearchSecurity.com

Unchain Your Network with Application Intelligence and Control
sponsored by Dell Software
WHITE PAPER: Learn about the new risks that organizations face due to the prevalence of Web-based applications, and how to take secure control of applications, data and bandwidth.
Posted: 23 Aug 2013 | Published: 31 Jul 2012

Dell Software

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
Posted: 05 May 2014 | Published: 25 Sep 2013

IBM

Web Application Firewalls Are Worth the Investment for Enterprises
sponsored by Imperva
ANALYST REPORT: This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
Posted: 29 Apr 2014 | Published: 28 Feb 2014

Imperva

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys

Using Free Web Application Security Scanning Tools to Secure Web Apps
sponsored by Imperva
EGUIDE: Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Imperva

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER: This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013

IBM

Next-Generation Security for Today's Data Center
sponsored by IBM and Juniper
WHITE PAPER: This crucial resource discusses next-generation security solutions that can offer unparalleled protection against data exfiltration, website outages, and other serious threats against the data center.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

IBM and Juniper

Mapping Security for your Virtual Environment
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company

How The Burgiss Group Manages Business Risk with AppFirst
sponsored by AppFirst
CASE STUDY: This case study reveals which solution the Burgiss Group trusts to help them monitor the behavior of their applications and systems and – in turn – ensure an optimal experience for their clients. View now to learn more!
Posted: 04 Sep 2013 | Published: 04 Sep 2013

AppFirst

Protect Identities in the Cloud Secure access to SaaS applications made easier
sponsored by McAfee, Inc.
WHITE PAPER: This informative paper examines how your organization can best manage and protect your SaaS applications, discussing common management problems and an advanced security solution that can help secure all aspects of web traffic.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

McAfee, Inc.

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

College Board Case Study: Quality Software is Secure Software
sponsored by IBM
WEBCAST: In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.
Posted: 22 Jul 2013 | Premiered: Jul 22, 2013

IBM

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
sponsored by IBM
WEBCAST: This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
Posted: 19 Jul 2013 | Premiered: Jul 19, 2013

IBM
26 - 50 of 235 Matches Previous Page    1 2 3 4 5    Next Page
 
WEB APPLICATION SECURITY DEFINITION (continued): …  share their knowledge of vulnerabilities, threats, attacks and countermeasures.Here are the OWASP Top Ten:Unvalidated input: Information from web requests is not validated before being used by a web application. Attackers can use these flaws to attack backend components through a web application.Broken access control:Restrictions on what authenticated users are allowed to do are not properly enforced. Attackers can exploit these flaws to access other users' accounts, view sensitive files, or use unauthorized functions.Broken authentication and session management:Account credentials and session … 
Web Application Security definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement