Application Security White Papers

Application Security encompasses measures taken to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, or deployment of the application.
Results 1 - 25 of 608Sort Results By: Published Date | Title | Company Name
By: AlienVault     Published Date: Aug 13, 2015

Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.

Tags : alienvault, security, soc, hacking, threat detection, application security, hacker detection, intrusion detection
    
By: AlienVault     Published Date: Aug 13, 2015

AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM.

Tags : alienvault, security, siem, hacking, threat detection, monitoring, anti virus, application security
    
By: Venafi     Published Date: Aug 10, 2015

This whitepaper reveals how Security Operations teams can eliminate these outages.

Tags : security, security operations, outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection
    
By: Venafi     Published Date: Aug 10, 2015

This whitepaper reveals why enterprises are vulnerable to trust-based attacks.

Tags : cyberattacks, security, data security, cryptographic keys, digital certificates, authenticity, anti spam, anti spyware
    
By: Venafi     Published Date: Aug 10, 2015

The need for authentication and assurance is great and options are few; therefore, we have come to rely on encrypted SSL/TLS certificates for almost every new application, appliance, device and cloud service.

Tags : security controls, security, security applications, ssl/tls certificates, secure connection, security network, access control, anti spam
    
By: Venafi     Published Date: Aug 07, 2015

Most organisations lack the ability to decrypt and inspect SSL communications to detect threats. The ability to quickly decrypt and inspect SSL traffic in real time to detect threats is imperative.

Tags : eliminate blind spots, ssl, security, security application, anti spam, anti spyware, anti virus, application security
    
By: Venafi     Published Date: Aug 07, 2015

Public key infrastructure (PKI) is the foundation of today’s enterprise security. But most PKI lacks central visibility, consistent processes, and refresh progress validation.

Tags : pki refresh, public key infrastructure, system errors, system updates, automated key securit, certificate security, anti spam, anti spyware
    
By: Venafi     Published Date: Aug 07, 2015

It was recently found that most Global 2000 organisations have failed to completely remediate Heartbleed. This leaves these organisations vulnerable to cyberattacks, future brand damage, and intellectual property loss.

Tags : cyberattacks, security, cybercriminals, security application, access control, anti spam, anti spyware, anti virus
    
By: Venafi     Published Date: Aug 07, 2015

This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.

Tags : security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls
    
By: Viavi Solutions     Published Date: Aug 05, 2015

With increasingly creative exploits, it is important to stay ahead of the curve when it comes to data protection. Performance monitoring tools that do not keep pace can leave your information vulnerable.

Tags : apm, security, hacking, performance monitoring, anti virus, application security, hacker detection, intrusion detection
    
By: Vectra Networks     Published Date: Aug 03, 2015

Learn how Vectra empowers IT and security analysts with insights to stop attacks, even while they’re happening.

Tags : network security management, it security, intrusion prevention, security analysis, cyberattacks, cybercriminals, adaptive protection, intrusion prevention systems
    
By: Vectra Networks     Published Date: Aug 03, 2015

The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.

Tags : post intrusion report, metadata, network threats, network security management, it security, botnet monetization, data exfiltration, security management
    
By: Vectra Networks     Published Date: Aug 03, 2015

Learn how Vectra protects Tri-State’s corporate and subscriber data and prevents cyberattacks to the power grid.

Tags : utilities provider, cyberattack detection, vulnerability management, security management, it security, security solution, network breaches, false threats
    
By: IBM     Published Date: Jul 31, 2015

Danger of the web.

Tags : application security, hacker detection, internet security, productivity
    
By: IBM     Published Date: Jul 31, 2015

Guide to security intelligence.

Tags : security, data, application security, business continuity, compliance, infrastructure
    
By: Entrust PKI     Published Date: Jul 21, 2015

Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems.

Tags : internet of things, authentication, security, identity, safety, technology, security technology, security infrastructure
    
By: Citrix Systems     Published Date: Jul 17, 2015

Why app and desktop virtualization should be the foundation for your layered approach.

Tags : information security, layered approach, mobility, application, desktop virtualization, application security, compliance, application integration
    
By: Citrix Systems     Published Date: Jul 17, 2015

Adoption of mobile devices continues to expand.

Tags : windows, applications, platform, security, performance, application security, business intelligence, employee performance
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Understand that hybrid cloud can provide the best.

Tags : disaster recovery, applications, development, testing, cloud, application security, application integration, cloud computing
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Forge Ahead with Hybrid Cloud Plans

Tags : applications, systems integration, cloud, development, application security, productivity, cloud computing, infrastructure
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Evaluating hybrid cloud for workloads.

Tags : reliability, application, security, compliance, application, application security, high availability, application integration
    
By: CDW     Published Date: Jul 08, 2015

It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.

Tags : security, vulnerability management, analytics, mobile security, byod, mdm, application security, policy based management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

.NET
51 Documents
Access Control
699 Documents
Anti Spam
593 Documents
Anti Spyware
637 Documents
Anti Virus
687 Documents
Application Integration
504 Documents
Application Integration
903 Documents
Application Performance Management
847 Documents
Authentication
381 Documents
Biometrics
116 Documents
Business Continuity
412 Documents
Business Integration
490 Documents
C++
40 Documents
Content Management System
331 Documents
Data Integration
426 Documents
Data Protection
899 Documents
Database Development
323 Documents
Database Development
126 Documents
Database Security
441 Documents
DDoS
191 Documents
Disaster Recovery
566 Documents
EDI
65 Documents
Email Security
591 Documents
Encryption
470 Documents
Firewalls
429 Documents
Hacker Detection
518 Documents
Identity Management
533 Documents
Internet Security
979 Documents
Intrusion Detection
643 Documents
Intrusion Prevention
710 Documents
IPSec
155 Documents
Java
62 Documents
Linux
86 Documents
Load Balancing
180 Documents
Microsoft Exchange
134 Documents
Middleware
51 Documents
Network Security
571 Documents
Network Security Appliance
372 Documents
Oracle
101 Documents
Password Management
214 Documents
PCI Compliance
244 Documents
PKI
125 Documents
Risk Management
334 Documents
Search And Retrieval
97 Documents
Secure Content Management
197 Documents
Security Management
1137 Documents
Security Policies
451 Documents
Service Oriented Architecture
287 Documents
SOAP
31 Documents
SOAP
68 Documents
Solaris
10 Documents
SSL
240 Documents
Storage Area Networks
290 Documents
TCP/IP Protocol
178 Documents
Visual Basic
29 Documents
Vulnerability Management
627 Documents
Web Development
108 Documents
Web Service Management
253 Documents
Web Service Security
78 Documents
Web Service Security
392 Documents
Web Services
135 Documents
Web Sphere
40 Documents
Wireless Security
294 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.