Application Security White Papers

Application Security encompasses measures taken to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, or deployment of the application.
Results 1 - 25 of 484Sort Results By: Published Date | Title | Company Name
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: IBM     Published Date: Aug 08, 2014

Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.

Tags : technology, fraud prevention, finance, fraud loss reduction, application security, intrusion detection, intrusion prevention, web service security
    
By: Global Knowledge     Published Date: Feb 14, 2014

Amazon Web Services (AWS) offers increased agility, developer productivity, pay-as-you-go pricing, and overall cost savings. Learn what you need to know and where to start before launching an AWS-hosted service.

Tags : global knowledge, speed aws, aws deployment, amazon web service, developer productivity, cloudformation, aws resources, collaboration engines
    
By: Imprivata     Published Date: Dec 06, 2013

A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Imprivata     Published Date: Dec 06, 2013

This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Websense     Published Date: Oct 06, 2014

This paper provides the seven stages of advanced threats and helps in the understanding the cyber attack kill chain

Tags : apts, understanding apts, apt security strategy, stages of advanced threats, anti spam, anti spyware, anti virus, application security
    
By: Arbor     Published Date: Sep 15, 2014

DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.

Tags : ddos attacks, it security, application layer attacks, application security, firewalls, hacker detection, intrusion detection, intrusion prevention
    
By: Arbor     Published Date: Sep 15, 2014

In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.

Tags : cyber defenses, threat actors, it security, security analytics, application security, firewalls, hacker detection, security management
    
By: Arbor     Published Date: Sep 15, 2014

Sicherheitsanalysen stellen eine neue Anforderung im laufenden Wettrüsten zwischen Angegriffenen und Angreifern dar

Tags : security analytics, it security, cyber defenses, application security, firewalls, hacker detection, security management, secure content management
    
By: NaviSite     Published Date: Sep 02, 2014

This paper defines seven steps - sequentially - that have been tested and refined, to help you develop a cloud security plan.

Tags : cloud security, developing a cloud security plan, cloud security steps, managed cloud services, application security, disaster recovery, high availability, internet security
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app.

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, web service security, mobile computing
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, network security, application security, web service security
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, web service security, mobile computing
    
By: Box     Published Date: Aug 15, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: Box     Published Date: Aug 13, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, enterprise applications, application security, identity management, internet security
    
By: Box     Published Date: Aug 13, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, identity management, network security appliance
    
By: Box     Published Date: Aug 13, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: IBM     Published Date: Aug 08, 2014

Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.

Tags : security, mobile risk mitigation, mobile baking, detect fraud, application security, hacker detection, identity management, intrusion detection
    
By: IBM     Published Date: Aug 08, 2014

The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.

Tags : fraud detection, finance, account takeover, cybercrime, fraud prevention, application security, hacker detection, intrusion detection
    
By: Citrix     Published Date: Jul 25, 2014

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.

Tags : network security, application security, compliance, email security, hacker detection, best practices, software compliance, pci compliance
    
By: Websense     Published Date: Jul 08, 2014

A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.

Tags : detecting unknown threats, websense, next-generation firewall, anti spam, anti spyware, anti virus, application security, encryption
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

.NET
49 Documents
Access Control
801 Documents
Anti Spam
544 Documents
Anti Spyware
584 Documents
Anti Virus
646 Documents
Application Integration
703 Documents
Application Integration
401 Documents
Application Performance Management
689 Documents
Authentication
357 Documents
Biometrics
109 Documents
Business Continuity
380 Documents
Business Integration
405 Documents
C++
39 Documents
Content Management System
266 Documents
Data Integration
341 Documents
Data Protection
763 Documents
Database Development
273 Documents
Database Development
95 Documents
Database Security
349 Documents
DDoS
176 Documents
Disaster Recovery
500 Documents
EDI
65 Documents
Email Security
604 Documents
Encryption
462 Documents
Firewalls
389 Documents
Hacker Detection
501 Documents
Identity Management
596 Documents
Internet Security
935 Documents
Intrusion Detection
641 Documents
Intrusion Prevention
704 Documents
IPSec
159 Documents
Java
60 Documents
Linux
86 Documents
Load Balancing
171 Documents
Microsoft Exchange
129 Documents
Middleware
44 Documents
Network Security
509 Documents
Network Security Appliance
382 Documents
Oracle
84 Documents
Password Management
231 Documents
PCI Compliance
275 Documents
PKI
118 Documents
Risk Management
300 Documents
Search And Retrieval
96 Documents
Secure Content Management
176 Documents
Security Management
1058 Documents
Security Policies
428 Documents
Service Oriented Architecture
284 Documents
SOAP
30 Documents
SOAP
68 Documents
Solaris
9 Documents
SSL
227 Documents
Storage Area Networks
281 Documents
TCP/IP Protocol
174 Documents
Visual Basic
28 Documents
Vulnerability Management
587 Documents
Web Development
99 Documents
Web Service Management
238 Documents
Web Service Security
75 Documents
Web Service Security
369 Documents
Web Services
129 Documents
Web Sphere
38 Documents
Wireless Security
248 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.