> Technology > Security > Application Security

Application Security

Application Security encompasses measures taken to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, or deployment of the application.
Results 1 - 25 of 715Sort Results By: Published Date | Title | Company Name
White Paper Published By: Entrust Datacard     Published Date: Sep 28, 2016
This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.
Tags : 
security, security application, ssl, ssl certificates, sha
    
Entrust Datacard
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Learn why our world-leading, unified solution is relied on by market-leading companies across the planet.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
White Paper Published By: Secunia     Published Date: Oct 12, 2011
This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.
Tags : 
application security, authentication, email security, high availability, identity management
    
Secunia
White Paper Published By: Kaspersky     Published Date: Feb 05, 2015
This Kaspersky guide shows the benefits that only and Integrated Platform Security Solution can bring.
Tags : 
integrated platform security, security solution, integrated security technologies, endpoint protection platforms, epps
    
Kaspersky
White Paper Published By: Diligent     Published Date: Aug 05, 2016
When organizations engage a board portal provider, they are entrusting them to safeguard sensitive documents and provide a system for managing access to those documents. This trust goes beyond technical specifications.
Tags : 
board portal, document management, security management, application security, security policies
    
Diligent
White Paper Published By: Palo Alto Networks     Published Date: Dec 11, 2013
The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. In this free booklet, you'll find an insight and practical advice on: - Considerations for choosing your next firewall - Best practices for implementing safe application enablement policies - Essential firewall capabilities for battling modern threats
Tags : 
firewall, palo alto, security, network security, safe applications
    
Palo Alto Networks
Webinar Published By: McAfee     Published Date: Feb 06, 2013
Protect systems from unknown, advanced persistent threats with centrally managed whitelisting
Tags : 
application control, whitelisting, zero day protection, endpoint security, dynamic whitelisting
    
McAfee
Case Study Published By: Firehost     Published Date: Jan 07, 2015
This Case Study gives information on the 16 Infrastructure Components to pass your next Audit.
Tags : 
firehost, intelligent security, infraestructure, security, network security
    
Firehost
White Paper Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats
    
McAfee
White Paper Published By: Blue Coat Systems     Published Date: Jul 07, 2011
This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jun 30, 2011
This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, anti virus
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat
    
Blue Coat Systems
Webinar Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
Webinar Published By: Lumension     Published Date: Jan 22, 2013
With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
White Paper Published By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : 
security, application security, access control, security policies, anti spyware
    
Cisco
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2015 Cyberthreat Defense Report.”
Tags : 
citrix, cyberthreat, infographic, 2015 report, application security
    
Citrix Systems, Inc.
White Paper Published By: AlienVault     Published Date: Aug 11, 2015
This report talks about Gartner's Magic Quadrant for SIEM in 2015
Tags : 
security information, event management, magic quadrant, gartner report, siem technology
    
AlienVault
White Paper Published By: AlienVault     Published Date: Aug 13, 2015
The 2015 Magic Quadrant summarizes Gartner’s yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. Download the 2015 report.
Tags : 
alienvault, security, siem, hacking, threat detection
    
AlienVault
White Paper Published By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : 
cyber security, application security, risk management, third party applications, endpoint security
    
Lumension
White Paper Published By: Oracle     Published Date: Nov 05, 2015
This white paper discusses how organisations can accomplish these things by moving development of enterprise applications to the cloud by leveraging Platform-as-a-Service (PaaS), and in the process reduce development costs, avoid complexity, and increase developer productivity.
Tags : 
cloud, cloud computing, enterprise applications, paas, it solutions
    
Oracle
White Paper Published By: Oracle     Published Date: Nov 05, 2015
This white paper discusses how organisations can accomplish these things by moving development of enterprise applications to the cloud by leveraging Platform-as-a-Service (PaaS), and in the process reduce development costs, avoid complexity, and increase developer productivity.
Tags : 
cloud, cloud computing, enterprise applications, paas, it solutions
    
Oracle
White Paper Published By: Oracle     Published Date: Nov 05, 2015
This white paper discusses how organisations can accomplish these things by moving development of enterprise applications to the cloud by leveraging Platform-as-a-Service (PaaS), and in the process reduce development costs, avoid complexity, and increase developer productivity.
Tags : 
cloud, cloud computing, enterprise applications, paas, it solutions
    
Oracle
White Paper Published By: Oracle     Published Date: Nov 05, 2015
This white paper discusses how organisations can accomplish these things by moving development of enterprise applications to the cloud by leveraging Platform-as-a-Service (PaaS), and in the process reduce development costs, avoid complexity, and increase developer productivity.
Tags : 
cloud, cloud computing, enterprise applications, paas, it solutions
    
Oracle
White Paper Published By: Oracle     Published Date: Nov 05, 2015
This white paper discusses how organisations can accomplish these things by moving development of enterprise applications to the cloud by leveraging Platform-as-a-Service (PaaS), and in the process reduce development costs, avoid complexity, and increase developer productivity.
Tags : 
cloud, cloud computing, enterprise applications, paas, it solutions
    
Oracle
White Paper Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application
    
Lumension
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Related Topics

Add Resources

Get your company's resources in the hands of targeted business professionals.