IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security White Papers (View All Report Types)
1 - 25 of 439 Matches Previous Page  |  Next Page
6 Ways a CASB Makes Cloud Apps Safe for Business
sponsored by Symantec
WHITE PAPER: By 2022, 65% of business productivity tools are expected to have moved to the cloud, according to the Symantec Internet Security Threat Report. This resource offers 6 ways a cloud access security broker (CASB) enables cloud control across all apps and data.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Symantec

8 Essential Secure Web Gateway Characteristics
sponsored by Symantec
WHITE PAPER: According to Symantec's Shadow Data Report, most CIOs think their organizations use around 30 to 40 cloud apps; in reality, the average number is 1,2321. This resource offers 8 essential characteristics of secure web gateways to ensure effective cloud security.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Symantec

Endpoint Detection and Response
sponsored by CrowdStrike
WHITE PAPER: Utilize this white paper as a guide to understanding EDR, where it fits in your security strategy and what is involved in maturing EDR capabilities so that your organization can derive the greatest benefit.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

CrowdStrike

Access Control is Easy
sponsored by One Identity
WHITE PAPER: Effective access control is a matter of well-managed groups. This resource uncovers how to implement and manage Active Directory (AD) groups and dives into why they are at the center of the access control and governance universe.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

One Identity

2018 Security Predictions
sponsored by Splunk
WHITE PAPER: This resource offers predictions of 2018 and how machine learning and DevSecOps will impact and benefit security strategies.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Splunk

Why Externalize?
sponsored by Axiomatics
WHITE PAPER: This resource provides insight into the attribute based access control (ABAC) model, explores how it impacts authentication and application security, and reveals 4 common misconceptions.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Axiomatics

3 Reasons: Why DevOps is a Game-Changer for Security
sponsored by Tenable, Inc.
WHITE PAPER: Oftentimes, security teams have struggled with keeping pace with DevOps. This resource explores the intersection of DevOps and InfoSec and offers 3 reasons why security organizations will benefit by combining these 2 practices.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Tenable, Inc.

Use Case: Application Delivery Controller
sponsored by ADLINK Technology
WHITE PAPER: The application delivery controller (ADC), can improve the resource utilization and reliability of an application server deployed in a data center. This paper discusses the challenges an ADC will face in cloud computing, as well as how to design and build a platform that will enable you to meet today's cloud computing requirements.
Posted: 05 Feb 2018 | Published: 05 Feb 2018

ADLINK Technology

Future of Device Fingerprinting
sponsored by Simility
WHITE PAPER: A crucial part of fraud detection in the virtual world has been assigning an identity to every laptop, tablet and mobile device that accesses websites or apps. Explore this white paper to gain insight into an advanced device fingerprinting strategy and how it can boost your current authentication approach.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Simility

Shedding Light on the Cloud App Visibility Blind Spot
sponsored by Forcepoint
WHITE PAPER: In this white paper, learn how the risk posed by shadow IT has grown, as well as why traditional controls and security policies don't address account-centric threats. Then explore 3 criteria organizations should consider to address the visibility blind spots between themselves and their cloud providers.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Forcepoint

4 Essential Strategies for Endpoint Security and Protection
sponsored by Absolute
WHITE PAPER: Endpoint devices are the single largest group of devices inside your network today. Disruption of endpoints can have a serious impact on your day to day business operations. This resource offers 4 essential strategies to improve your endpoint security and protection.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

Absolute

Maintaining Business Continuity & Security for Your Organization
sponsored by Citrix
WHITE PAPER: Whether planned or unplanned, business disruptions that aren't managed effectively come at a high cost. This white paper offers strategies for keeping your company productive during unplanned security incidents.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Citrix

Secure Cloud Collaboration without the Complication
sponsored by Citrix
WHITE PAPER: There are still some lingering doubts about the cloud's ability to maintain high security standards, but you can put them to rest. Read this white paper to learn how cloud-based collaboration tools are securing the apps, data, files, and services you depend on every day to provide a safe collaboration space for your employees.
Posted: 24 Jan 2018 | Published: 19 Dec 2017

Citrix

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 24 Jan 2018 | Published: 28 Sep 2017

SyncDog

SAP Cloud Platform Solution Brief: Build Applications to Meet Individual Business Needs
sponsored by SAP
WHITE PAPER: Learn about the SAP Cloud Platform and find out how to take a PaaS-based approach to building, testing, and integrating personalized, mobile-enabled cloud apps quickly.
Posted: 23 Jan 2018 | Published: 31 Dec 2017

SAP

Design Secure Software from the First Line of Code
sponsored by Whitehat Securities
WHITE PAPER: Explore 6 benefits for developers of a fully automated static analysis security testing (SAST) tool that can bring a focus on security into the beginning of the software development lifecycle.
Posted: 22 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

A WhiteHat Sentinel Product Family Overview
sponsored by Whitehat Securities
WHITE PAPER: In this white paper learn how WhiteHat Sentinel, a SaaS product suite combines application scanning with one of the world's largest threat research team to provide you with 3 different types of analysis to ensure your apps are safe, no matter where they live.
Posted: 19 Jan 2018 | Published: 30 Dec 2016

Whitehat Securities

Discover Static Applications Security Testing for Microservices
sponsored by Whitehat Securities
WHITE PAPER: In the race to get to market, the last thing you want is to overlook the security of your microservices architecture. Don't leave your development process vulnerable. Click inside to learn about a Static Applications Security Testing (SAST) offering that allows you to ensure your microservices are as safe as possible.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Whitehat Securities

NEAT Evaluation for Applause Crowdtesting
sponsored by Applause
WHITE PAPER: Learn about Applause's crowdtesting platform for web, mobile, and IoT apps and find out if crowdtesting suits your development projects.
Posted: 19 Jan 2018 | Published: 31 Dec 2017

Applause

A Strategic Approach to Web Application Security
sponsored by Whitehat Securities
WHITE PAPER: App vulnerabilities originate with the source code, and you'll want to secure more of your source code in both development and production. But it's easier said than done for security pros to review source code continuously. Uncover a new static application security testing subscription service to address this problem.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Getting the Board on Board with Application Security
sponsored by Whitehat Securities
WHITE PAPER: CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Whitehat's Recent Offerings Put Security Expertise at the Developer's Fingertips
sponsored by Whitehat Securities
WHITE PAPER: Read through 451 Research's assessment of WhiteHat Scout and how the product broadens WhiteHat Security's capabilities.
Posted: 17 Jan 2018 | Published: 06 Dec 2017

Whitehat Securities

Privilege Manager Tool
sponsored by Thycotic
WHITE PAPER: Targeted attacks are always after accounts with highly elevated privileges on sensitive and critical systems: privileged accounts. Explore this resource to gain insight into least privilege management and endpoint security strategies.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Thycotic

Don't Switch To Windows 10 Without An Endpoint Security Plan
sponsored by Thycotic
WHITE PAPER: According to the Thycotic 2017 BlackHat Report, 73% of hackers report that traditional anti-virus tools are irrelevant or obsolete, and don't adapt quickly enough to block emerging threats. This resource offers endpoint and application security strategies as well as tactics to enhance your Windows 7 and 10 security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic

Top 10 Keys to Successful Least Privilege Adoption
sponsored by Thycotic
WHITE PAPER: According to Thycotic, 85% of breaches involve compromised endpoints. Explore this resource to learn about endpoint attacks and strategies for enhanced endpoint and application security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic
1 - 25 of 439 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement