Application Security White Papers

Application Security encompasses measures taken to prevent exceptions in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, or deployment of the application.
Results 1 - 25 of 487Sort Results By: Published Date | Title | Company Name
By: Neustar     Published Date: Aug 27, 2014

DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening — attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property.

Tags : ddos attacks, it security, data breaches, ddos impact report, application security, ddos, security management
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app.

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, web service security, mobile computing
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, network security, application security, web service security
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, web service security, mobile computing
    
By: Box     Published Date: Aug 15, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: Box     Published Date: Aug 13, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, enterprise applications, application security, identity management, internet security
    
By: Box     Published Date: Aug 13, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, identity management, network security appliance
    
By: Box     Published Date: Aug 13, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: IBM     Published Date: Aug 08, 2014

Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.

Tags : security, mobile risk mitigation, mobile baking, detect fraud, application security, hacker detection, identity management, intrusion detection
    
By: IBM     Published Date: Aug 08, 2014

The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.

Tags : fraud detection, finance, account takeover, cybercrime, fraud prevention, application security, hacker detection, intrusion detection
    
By: IBM     Published Date: Aug 08, 2014

Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.

Tags : technology, fraud prevention, finance, fraud loss reduction, application security, intrusion detection, intrusion prevention, web service security
    
By: McAfee     Published Date: May 22, 2014

FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.

Tags : security, software, network security, evasion technique, aet testing environment, cyberattacks, evader, application security
    
By: Turn     Published Date: Mar 27, 2014

In this study from Forbes Insights and Turn, learn what privacy means to marketers and consumers.

Tags : turn, forbes insights, privacy, big data, marketing, advertising, marketing solutions, security
    
By: Global Knowledge     Published Date: Feb 14, 2014

Amazon Web Services (AWS) offers increased agility, developer productivity, pay-as-you-go pricing, and overall cost savings. Learn what you need to know and where to start before launching an AWS-hosted service.

Tags : global knowledge, speed aws, aws deployment, amazon web service, developer productivity, cloudformation, aws resources, collaboration engines
    
By: Kaspersky     Published Date: Feb 14, 2014

Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable?

Tags : cybersecurity, hackers, data protection, secure networks, antivirus, virus, firewall, anti spam
    
By: F5 Networks Inc     Published Date: Jan 03, 2014

Today, the shift to a cloud-based enterprise IT architecture is a foregone conclusion for a variety of organizations. As a result, cloud-based security has become a top priority. Read this whitepaper to learn about the challenges of cloud-based security and identity and access management as well as how your business can overcome these challenges with best-in-class solutions.

Tags : idc, cloud, cloud federation, identity and access management, iam, security, silos, deployment
    
By: F5 Networks Inc     Published Date: Jan 03, 2014

In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.

Tags : security, cloud, application delivery, authentication, access control, application security, silos, password fatigue
    
By: F5 Networks Inc     Published Date: Jan 03, 2014

Turning on firewall features can sometimes result in a significant performance hit, creating an obstacle for network architects. In this Network World Clear Choice test, learn about a firewall solution that can help your business overcome these performance challenges by maxing our network capacity while also offering filtering and attack protection capabilities.

Tags : network world, data center, firewall, load balancer, scalability, data center management, dos protection, security
    
By: Imprivata     Published Date: Dec 06, 2013

A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Imprivata     Published Date: Dec 06, 2013

This whitepaper serves as a guide in choosing the right combination of Strong Authentication methods that best fits your business, your organization and your employees’ different roles and responsibilities.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Qualys     Published Date: Aug 08, 2014

An Introduction to Defending Your Business Against Today’s Most Common Cyber Attacks

Tags : cyber attacks, defense, web application, business data, application security, anti spyware, anti virus, internet security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

.NET
49 Documents
Access Control
829 Documents
Anti Spam
549 Documents
Anti Spyware
595 Documents
Anti Virus
652 Documents
Application Integration
686 Documents
Application Integration
393 Documents
Application Performance Management
657 Documents
Authentication
354 Documents
Biometrics
104 Documents
Business Continuity
380 Documents
Business Integration
403 Documents
C++
39 Documents
Content Management System
260 Documents
Data Integration
336 Documents
Data Protection
759 Documents
Database Development
269 Documents
Database Development
96 Documents
Database Security
344 Documents
DDoS
172 Documents
Disaster Recovery
496 Documents
EDI
62 Documents
Email Security
619 Documents
Encryption
463 Documents
Firewalls
389 Documents
Hacker Detection
507 Documents
Identity Management
615 Documents
Internet Security
953 Documents
Intrusion Detection
648 Documents
Intrusion Prevention
709 Documents
IPSec
156 Documents
Java
60 Documents
Linux
87 Documents
Load Balancing
170 Documents
Microsoft Exchange
129 Documents
Middleware
44 Documents
Network Security
511 Documents
Network Security Appliance
385 Documents
Oracle
84 Documents
Password Management
225 Documents
PCI Compliance
279 Documents
PKI
114 Documents
Risk Management
291 Documents
Search And Retrieval
96 Documents
Secure Content Management
170 Documents
Security Management
1080 Documents
Security Policies
435 Documents
Service Oriented Architecture
281 Documents
SOAP
32 Documents
SOAP
65 Documents
Solaris
9 Documents
SSL
212 Documents
Storage Area Networks
280 Documents
TCP/IP Protocol
174 Documents
Visual Basic
28 Documents
Vulnerability Management
584 Documents
Web Development
97 Documents
Web Service Management
233 Documents
Web Service Security
80 Documents
Web Service Security
369 Documents
Web Services
126 Documents
Web Sphere
38 Documents
Wireless Security
250 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.