IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
151 - 175 of 845 Matches Previous Page  |  Next Page
Comprehensive Data Security In The Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017

Palo Alto Networks

Mobile, Cloud & Desktop Security: 3 Keys to Digital Success
sponsored by MobileIron
WHITE PAPER: What's holding so many organizations back from using mobile to its full potential? Mobile, cloud, and desktop security. Access this white paper to learn how to protect your critical data on any device, network, or cloud service so you can focus on delivering business value instead of reacting to security threats and fighting fires.
Posted: 05 May 2017 | Published: 30 Dec 2016

MobileIron

The Top 6 WAF Essentials to Achieve Application Security Efficacy
sponsored by Citrix
WHITE PAPER: Due to the nature of web security and how it constantly evolves, it is increasingly difficult to integrate comprehensive security into applications and keep them up-to-date. In this white paper, learn the 6 essential features your web application firewall (WAF) needs to maintain a high degree of security,
Posted: 27 Apr 2017 | Published: 27 Apr 2017

Citrix

Virtual Load Balancer Case Study: County of Maui
sponsored by Array Networks
CASE STUDY: The County of Maui needed to grant users access to consolidated geographical information, without disruptive downtime or bogged-down application throughput. Download this case study to find out how they updated and centralized their GIS, gaining flexible, versatile and easy-to-use load balancers that will serve their needs now and in the future.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Array Networks

Focus ANZ: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

ComputerWeekly.com

4 Market Trends Driving Mobile Banking
sponsored by HID Global
EBRIEF: Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

HID Global

Top 5 Considerations: What to Look For in Mobile Banking Security
sponsored by HID Global
RESOURCE: Uncover 5 IAM considerations for choosing a mobile banking security tool. Also discover a concise market overview of mobile banking apps, including a look at opportunities for growth and major obstacles.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID Global

The Definitive Guide to Data Protection and Disaster Recovery on Enterprise Clouds
sponsored by Nutanix
EBOOK: Access this e-book to examine important challenges and trends in availability and data protection. You will learn about a simple, cost-effective approach that works with enterprise cloud computing that helps you not only catch up, but future-proof your data protection.
Posted: 21 Mar 2017 | Published: 30 Jun 2016

Nutanix

IT Project ANZ: App Development
sponsored by ComputerWeekly.com
EGUIDE: In this guide, we show you some of the technologies helping in-house IT teams to release and deploy new applications as swiftly as possible, without disrupting business operations. From Software as a Service to DevOps and containers, Australia/New Zealand-based organisations are beginning to embrace these flexible and agile approaches.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

ComputerWeekly.com

IT Project ASEAN: App Development
sponsored by ComputerWeekly.com
EGUIDE: In this guide, we show you some of the technologies helping businesses to release and deploy new applications as swiftly as possible, without disrupting business operations. From containers to microservices and DevOps, many organizations are now embracing these flexible and agile approaches.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ComputerWeekly.com

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Avoid Human Error with AWS CodeDeploy
sponsored by Splunk
EGUIDE: Want to avoid human error in code deployment? This e-guide covers how you can effectively use AWS CodeDeploy to automate code deployment to your servers and committing avoid manual errors.
Posted: 18 May 2017 | Published: 11 May 2017

Splunk

DevSecOps: Putting the Security in DevOps
sponsored by Sonatype
EGUIDE: Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
Posted: 08 May 2017 | Published: 04 May 2017

Sonatype

End Web Application Security Risks with WAF
sponsored by F5 Networks
EGUIDE: In this expert e-guide, educate yourself on all things WAF by discovering how a WAF works, the best WAF features and more. Additionally, learn how to further resolve web application vulnerabilities.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

How to Manage Oracle E-Business Suite Apps and Databases
sponsored by Data Intensity
ESSENTIAL GUIDE: In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.
Posted: 26 Apr 2017 | Published: 20 Apr 2017

Data Intensity

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

How mobile remote desktop apps work
sponsored by LogMeIn Rescue Lens
EGUIDE: Mobile remote desktop apps can be an important tool for enterprises in keeping up with today's on-the-go workforce. The benefits of greater accessibility mean they could be a strategic fit in a variety of enterprise environments. Learn how to select the right mobile remote desktop products for your business, and how they work.
Posted: 13 Mar 2017 | Published: 10 Mar 2017

LogMeIn Rescue Lens

Solution Brief - Securing the mobile enterprise
sponsored by IBM
WHITE PAPER: Discover a comprehensive portfolio of mobile security systems that address four key mobile security challenges: protecting devices, securing content and collaboration, safeguarding applications and data, and managing access and fraud. The portfolio also includes a layer of security intelligence for advanced threat detection.
Posted: 08 Mar 2017 | Published: 06 Mar 2017

IBM

The New BYOD: 5 Best Practices for a Productive BYOD Program
sponsored by vmware airwatch
WHITE PAPER: Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Posted: 08 Mar 2017 | Published: 07 Mar 2017

vmware airwatch

EMM Real Benefits in Today's Mobile World
sponsored by vmware airwatch
WHITE PAPER: The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

The Massive Mobile Migration
sponsored by IBM
WHITE PAPER: The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.
Posted: 03 Mar 2017 | Published: 27 Apr 2016

IBM

UBM Dark Reading & VMware AirWatch® Webinar
sponsored by vmware airwatch
WEBCAST: In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.
Posted: 03 Mar 2017 | Premiered: Mar 3, 2017

vmware airwatch

Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: In this analyst report, learn about how 19 application security testing (AST) vendors fared in a comparison of their strengths and cautions. Discover which one is right for your organization.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

IBM
151 - 175 of 845 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement