Application Security White Papers

Application Security encompasses measures taken to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, or deployment of the application.
Results 1 - 25 of 493Sort Results By: Published Date | Title | Company Name
By: Actuate     Published Date: Sep 25, 2014

This webinar on the 5 Best Practices for Designing Data-Driven Apps is hosted by Allen Bonde, VP of Product Marketing & Innovation, Actuate.

Tags : best practices for app design, app design webinar, designing data-driven apps, actuate, enterprise applications, application security
    
By: Arbor     Published Date: Sep 15, 2014

DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.

Tags : ddos attacks, it security, application layer attacks, application security, firewalls, hacker detection, intrusion detection, intrusion prevention
    
By: Arbor     Published Date: Sep 15, 2014

In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.

Tags : cyber defenses, threat actors, it security, security analytics, application security, firewalls, hacker detection, security management
    
By: Arbor     Published Date: Sep 15, 2014

Sicherheitsanalysen stellen eine neue Anforderung im laufenden Wettrüsten zwischen Angegriffenen und Angreifern dar

Tags : security analytics, it security, cyber defenses, application security, firewalls, hacker detection, security management, secure content management
    
By: NaviSite     Published Date: Sep 02, 2014

This paper defines seven steps - sequentially - that have been tested and refined, to help you develop a cloud security plan.

Tags : cloud security, developing a cloud security plan, cloud security steps, managed cloud services, application security, disaster recovery, high availability, internet security
    
By: Neustar     Published Date: Aug 27, 2014

DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening — attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property.

Tags : ddos attacks, it security, data breaches, ddos impact report, application security, ddos, security management
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app.

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, web service security, mobile computing
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, network security, application security, web service security
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, web service security, mobile computing
    
By: Box     Published Date: Aug 15, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: Box     Published Date: Aug 13, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, enterprise applications, application security, identity management, internet security
    
By: Box     Published Date: Aug 13, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, identity management, network security appliance
    
By: Box     Published Date: Aug 13, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: IBM     Published Date: Aug 08, 2014

Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.

Tags : technology, fraud prevention, finance, fraud loss reduction, application security, intrusion detection, intrusion prevention, web service security
    
By: McAfee     Published Date: May 22, 2014

FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.

Tags : security, software, network security, evasion technique, aet testing environment, cyberattacks, evader, application security
    
By: Turn     Published Date: Mar 27, 2014

In this study from Forbes Insights and Turn, learn what privacy means to marketers and consumers.

Tags : turn, forbes insights, privacy, big data, marketing, advertising, marketing solutions, security
    
By: Global Knowledge     Published Date: Feb 14, 2014

Amazon Web Services (AWS) offers increased agility, developer productivity, pay-as-you-go pricing, and overall cost savings. Learn what you need to know and where to start before launching an AWS-hosted service.

Tags : global knowledge, speed aws, aws deployment, amazon web service, developer productivity, cloudformation, aws resources, collaboration engines
    
By: Imprivata     Published Date: Dec 06, 2013

A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Imprivata     Published Date: Dec 06, 2013

This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: IBM     Published Date: Aug 08, 2014

Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.

Tags : security, mobile risk mitigation, mobile baking, detect fraud, application security, hacker detection, identity management, intrusion detection
    
By: IBM     Published Date: Aug 08, 2014

The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.

Tags : fraud detection, finance, account takeover, cybercrime, fraud prevention, application security, hacker detection, intrusion detection
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

.NET
49 Documents
Access Control
811 Documents
Anti Spam
546 Documents
Anti Spyware
588 Documents
Anti Virus
647 Documents
Application Integration
393 Documents
Application Integration
698 Documents
Application Performance Management
681 Documents
Authentication
352 Documents
Biometrics
103 Documents
Business Continuity
378 Documents
Business Integration
403 Documents
C++
39 Documents
Content Management System
263 Documents
Data Integration
336 Documents
Data Protection
767 Documents
Database Development
95 Documents
Database Development
270 Documents
Database Security
352 Documents
DDoS
171 Documents
Disaster Recovery
496 Documents
EDI
62 Documents
Email Security
612 Documents
Encryption
462 Documents
Firewalls
391 Documents
Hacker Detection
502 Documents
Identity Management
599 Documents
Internet Security
941 Documents
Intrusion Detection
643 Documents
Intrusion Prevention
705 Documents
IPSec
155 Documents
Java
60 Documents
Linux
86 Documents
Load Balancing
170 Documents
Microsoft Exchange
129 Documents
Middleware
44 Documents
Network Security
516 Documents
Network Security Appliance
382 Documents
Oracle
84 Documents
Password Management
226 Documents
PCI Compliance
276 Documents
PKI
112 Documents
Risk Management
294 Documents
Search And Retrieval
97 Documents
Secure Content Management
173 Documents
Security Management
1072 Documents
Security Policies
431 Documents
Service Oriented Architecture
281 Documents
SOAP
30 Documents
SOAP
65 Documents
Solaris
9 Documents
SSL
211 Documents
Storage Area Networks
281 Documents
TCP/IP Protocol
173 Documents
Visual Basic
28 Documents
Vulnerability Management
583 Documents
Web Development
97 Documents
Web Service Management
234 Documents
Web Service Security
80 Documents
Web Service Security
367 Documents
Web Services
128 Documents
Web Sphere
38 Documents
Wireless Security
250 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.