X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 software application security


Security in the Software Development Lifecycle
Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to

software application security  in the Software Development Lifecycle Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to IBM 's Rational Unified Process environment. It was developed by Secure Software, and gives organizations a structured way to address security concerns during the software development lifecycle.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Information Security Selection Software Evaluation Report

Based on a wide range of security-related issues, the Information Security Knowledge Base covers both solution suites and individual software packages. Organizations can evaluate the capabilities of different vendors' firewall, intrusion detection, anti-virus, virtual private network, public key infrastructure, cryptography, and other enterprise security solutions. 

Evaluate Now

Documents related to » software application security

How to Avoid the Pitfalls of Shipping Your Software Application as an Appliance


For independent software vendors (ISVs), software delivery creates big operational challenges. Integrating an application with the latest operating system and service pack causes headaches for customers and suppliers. However, pre-built server devices or appliances contain one convenient, ready-to-go system, minimizing configuration glitches and letting customers and suppliers step back while the appliance does the work.

software application security   Read More

Security Risk Assessment and Management in Web Application Security


Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk assessments that mitigate risk by applying security risk management policies designed to protect a company’s data.

software application security   Read More

Enabling Security in the Software Development Life Cycle


When companies discover new security vulnerabilities, they must retrofit the affected software with an appropriate patch and fend off the wrath of customers. Each newly discovered vulnerability results in a frantic patch, halfway deployed, and potentially opens up another hole. That’s why you should address security vulnerabilities during the software development process—before you get locked into a game of catch-up.

software application security   Read More

Why Application Security Is the New Business Imperative -- and How to Achieve It


Businesses are being held increasingly accountable for their business application security—by customers, partners, and government. Unfortunately, most businesses are playing catch-up with security. What’s really needed are processes that fix the software development cycle by weaving security expertise into software acquisition, development, and deployment. Businesses that don’t take a process-oriented approach today may end up chasing application security forever.

software application security   Read More

Security Breach: Now What?


When people's lives or financial transactions are at risk, proper Security Incident handling is of extreme importance.

software application security   Read More

TOWER Software


TOWER Software provides enterprise content management (ECM) solutions to government and regulated industries, as well as electronic document and records management (EDRM) solutions. TOWER Software is a privately held company with operations in North America, Europe, and Asia Pacific, and maintains strategic partnerships with technology and information management companies including Microsoft, Hewlett Packard, Adobe Systems, and Kofax. The vendor is headquartered in Canberra (Australia).

software application security   Read More

Spire Security


Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics.

software application security   Read More

Standard & Poor's Announces Security Certification


After exposing numerous customers to embarrassing security vulnerabilities, S&P announces a security certification program.

software application security   Read More

Executive Brief: Mobility, Security Concerns, and Avoidance


Data drives business today, as IT managers and security executives face enormous pressure to use data effectively and securely. They require quick, agile transmission of data via a wide number of communication channels and devices, with smartphones and tablets being an increasingly prevalent data consumption device. Read this report and know the mobile challenges, as well as the elements for securing your corporate mobile strategy.

software application security   Read More

Security Stocks Burn Rubber


Security technology stocks are burning rubber as they peel out in front of swaggering technology blue chips. Who are some of these security market leaders and what kinds of security products do they offer?

software application security   Read More