IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security White Papers (View All Report Types)
51 - 75 of 437 Matches Previous Page  |  Next Page
Your Checklist for a Cloud-Native Development Platform
sponsored by Red Hat
WHITE PAPER: Find out how to evaluate cloud-native app development platforms and access a checklist that will help you choose the one that's best suited for your business.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Red Hat

Increasing Application Availability
sponsored by Silver Peak
WHITE PAPER: In this white paper, learn how to overcome the challenges of poor application availability and performance with the help of an SD-WAN architecture.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Silver Peak

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec
WHITE PAPER: Cloud apps introduce a new threat vector, with lots of credentials floating around that provide direct access to business critical data. This white paper provides planning strategies for adopting cloud apps as well as information on managing the human factor.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Symantec

European Businesses: You have a BYOD programme whether you like it or not
sponsored by Lookout
WHITE PAPER: 18% of federal employees with smartphones report encountering malicious software or malware. This white paper reveals how to secure your mobile devices from malware and protect your business as a whole from data loss.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

AWS Best Practices for DDoS Resiliency
sponsored by Amazon Web Services
WHITE PAPER: Do not let your website or application become unavailable to end users - protect against DDoS attacks once and for all. Explore this white paper and learn how to improve resiliency of your applications against DDoS attacks with these best practices.
Posted: 10 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services

Overview of AWS Security - Application Services
sponsored by Amazon Web Services
WHITE PAPER: Amazon Web Services offers a variety of managed services to use with your applications, including services that provide application streaming, queueing, push notification, email delivery, search, and transcoding. Learn more inside.
Posted: 10 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services

Overview of AWS Security - Network Security
sponsored by Amazon Web Services
WHITE PAPER: Explore this white paper to learn more about AWS cloud monitoring tools designed to protect your network architecture from threats like DDoS attacks, IP spoofing, and more.
Posted: 10 Oct 2017 | Published: 31 Aug 2016

Amazon Web Services

AWS Security Best Practices
sponsored by Amazon Web Services
WHITE PAPER: Is your data protected from accidental or deliberate theft, leakage, integrity compromise, and deletion? In this white paper, explore best practices that you can leverage to build and define an Information Security Management System (ISMS) and learn how to protect your mission-critical information.
Posted: 09 Oct 2017 | Published: 31 Aug 2016

Amazon Web Services

Overview of AWS Security - Analytics Services, Mobile and Applications Services
sponsored by Amazon Web Services
WHITE PAPER: Cloud-based analytics services can help your organization process and analyze any volume of data. Download this resource to learn how your organization can benefit from a variety of cloud based analytics and mobile application services, ranging from identity and access management to mobile analytics, and deployment and management services.
Posted: 09 Oct 2017 | Published: 01 Jun 2016

Amazon Web Services

Encrypting Data at Rest
sponsored by Amazon Web Services
WHITE PAPER: This white paper provides an overview of different methods for encrypting your data at rest. Uncover 3 approaches on how encryption keys are managed and where they are used, so you can decide which approach is best for you.
Posted: 09 Oct 2017 | Published: 30 Nov 2014

Amazon Web Services

Security at Scale: Logging in AWS
sponsored by Amazon Web Services
WHITE PAPER: The logging and monitoring of API calls in the AWS cloud are key components in security and operational best practices, as well as requirements for industry and regulatory compliance. This white paper explores how to achieve compliance in AWS with common logging requirements.
Posted: 09 Oct 2017 | Published: 31 Oct 2015

Amazon Web Services

Secure Content Delivery with Amazon CloudFront
sponsored by Amazon Web Services
WHITE PAPER: As companies respond to cybercrime, compliance requirements, and a commitment to securing customer data, their adoption of SSLs and TLSs increases. Gain insight into how you can improve the security and performance of your APIs and applications (hint: Amazon CloudFront) while lowering your content delivery costs.
Posted: 09 Oct 2017 | Published: 30 Nov 2016

Amazon Web Services

Strategies for API Security
sponsored by Akamai Technologies
WHITE PAPER: APIs provide transparency to the internal structure of applications and provide granular access to an application's backend, making online businesses more vulnerable than ever before to cyberattack threats. This white paper outlines the most common types of cyberattacks and offers strategies for protecting APIs.
Posted: 09 Oct 2017 | Published: 31 Dec 2016

Akamai Technologies

The Next Generation of Cloud App Security
sponsored by Symantec
WHITE PAPER: By 2020, 85% of large enterprises will use a cloud access security broker (CASB) platform for their cloud services which is up from less than 5% today, according to Gartner. This white paper offers benefits of CASB and how to increase efficacy, avoid incidents and more.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Symantec

Next Generation Secure Web Gateway: The Cornerstone of Your Security Architecture
sponsored by Symantec
WHITE PAPER: Explore this white paper to uncover whether a web proxy would be beneficial in protecting your organization from sophisticated web-based attacks.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Symantec

Top 3 Ways HyperScale for OpenStack Protects your Applications and Data
sponsored by Veritas
WHITE PAPER: Ensuring adequate data protection is critical before placing workloads (and the corresponding data that they operate upon) into production. This tip sheet outlines the 3 ways in which Veritas HyperScale for OpenStack keeps your applications and data safe.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veritas

6 Things That Will Accelerate Enterprise Mobility Security Adoption
sponsored by SyncDog
WHITE PAPER: According to a recent Gartner press release, 75% of mobile applications do not include basic security testing. Are you equipped to handle a massive cybersecurity breach from mobile device vulnerability? Security experts believe the marketplace isn't prepared.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

SyncDog

ActivID Authentication Appliance for Enterprise
sponsored by HID Global
WHITE PAPER: While it's a necessity to provide employees, contractors, partners, and customers anytime, anywhere access to appropriate resources, it's also imperative that enterprises are able to maintain their security. Take a look at this white paper to reveal an authentication platform that can help you deliver access to the right users at the right time.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID Global

Security for your Cloud-based Web Applications
sponsored by Alert Logic
WHITE PAPER: This Aberdeen Research paper explores the complexity and change in security of cloud-based Web applications and how a "stacked" security approach can prevent DDoS attacks.
Posted: 11 Sep 2017 | Published: 30 Apr 2017

Alert Logic

Solving API Performance, Reliability, and Security Challenges
sponsored by Akamai Technologies
WHITE PAPER: In this white paper, find out the top questions you should be asking when you review existing and future APIs.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Akamai Technologies

The New Economics of Cloud Security
sponsored by Alert Logic
WHITE PAPER: In this white paper, learn the 4 principles of a fully managed Security-as-a-Service (SECaaS) to help protect cloud applications without breaking the bank or compromising customer satisfaction.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Alert Logic

Don't Let your Cloud-First Strategy Get Stuck in Traffic
sponsored by Verizon
WHITE PAPER: In this white paper, learn how to overcome SaaS challenges to help build a cloud-first network that fits your business needs.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

Verizon

What You SIEM is What You Get
sponsored by AlienVault
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services
WHITE PAPER: You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.
Posted: 16 Oct 2017 | Published: 31 May 2017

Amazon Web Services

Cloud Solution Enables Security for Highly Regulated Industries
sponsored by TeraGo Networks
WHITE PAPER: Explore this case study to uncover how Virtual StrongBox was able to implement a technology to revolutionize cloud security and protect its customers.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

TeraGo Networks
51 - 75 of 437 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement