Application Security

Displaying 1-22 of 22 results

  • White Papers // Sep 2011

    Integrated Methods for Web Server Access Control

    This paper introduces methods for web server access control framework for web security, which protects against illegal computer access to resources by granting different layers of privileges to different user roles. The role-based access control features are analyzed and implemented in the most recent versions of Java Application server and...

    Provided By Application Security

  • White Papers // Sep 2010

    An Examination of Database Breaches at Higher Education Institutions

    Data breaches are dominating the headlines. Institutions and individuals are at increased risk of having their information compromised by hackers, insider malicious activity, or insider mistakes. Higher Education (Higher Ed) institutions have experienced a substantially large number of data breaches nearly 160 breaches and more than 2.3 million records breached...

    Provided By Application Security

  • White Papers // Aug 2009

    DbProtect and HIPAA Compliance

    The Health Insurance Portability and Accountability Act (HIPAA), passed by Congress in 1996, is designed to safeguard all forms of personal health information (PHI) to include patient identities, medical records, and health insurance information. By defending the patients' rights to have their health information kept private and provide control over...

    Provided By Application Security

  • White Papers // Jul 2009

    Defending Against New and Emerging Database Threats for 2009

    IT Security is constantly evolving and threats increasingly target the database. Organizations must be diligent in understanding these threats and mitigating their risk. Application Security, Inc., and their SHATTER research team have developed the industry's largest knowledgebase of database vulnerabilities. Relying on their extensive research, experience and knowledge enables company...

    Provided By Application Security

  • White Papers // Jul 2009

    Reviewing Database User Rights: Addressing Security, Risk and Compliance Challenges With Comprehensive Planning

    Today's business environment demands that a broad range of internal and external users require access to data. Users include internal employees, as well as external consultants, partners, and clients. New projects often require committees or teams, and employee roles are constantly changing. Organizations are faced with new and growing data...

    Provided By Application Security

  • White Papers // Jul 2009

    Addressing the Top 5 Database Vulnerabilities Plaguing Federal Agencies

    According to the recently released Verizon 2009 Data Breach Report, 285 million records were compromised in 2008. Agencies of the U.S. government such as The Pentagon, NASA, FAA, The Army, The Veterans Administration, and the Los Alamos National Laboratory have suffered data losses - either through inadvertent human error, insider...

    Provided By Application Security

  • White Papers // Jun 2009

    SQL Server Anti-Forensics: Techniques and Countermeasures

    This paper attempts to get ahead of the curve by discussing the techniques security professionals can use to perform forensics analysis after a database attack. It focus specifically on Microsoft SQL Server 2005, however the information presented is also relevant to other database versions. A discussion of forensics is not...

    Provided By Application Security

  • Webcasts // Jan 2009

    Roundtable Series-HIPAA: Protecting Electronic Health Records

    The presenters of this webcast discuss the critical issues organizations are facing around securing sensitive health information. The attendee will see what organizations like Humana, KPMG and CaseNet are doing to meet today's protection requirements and regulatory mandates!

    Provided By Application Security

  • Webcasts // Jan 2009

    AppDetectivePro User Rights Review Best Practices Product Demo

    This webcast covers best practices for assessing vulnerabilities and reviewing user entitlements.

    Provided By Application Security

  • Webcasts // Jan 2009

    Segregating Duties in the Database to Achieve Compliant Status

    Automated solutions, like Application Security, Inc.'s newly released AppDetectivePro User Rights Review save organizations upward of 80 man-hours per database when preparing for an audit as well as save time from a typically tenuous manual process.

    Provided By Application Security

  • Webcasts // Jan 2009

    Addressing Risk and Compliance With Integrated Data Protection

    The 2009 economy is forcing organizations to cut IT costs, and CISOs are being forced to make difficult decisions relative to which systems to secure and how best to secure them. As the market shifts, best-of-breed offerings stand out and are the most sensible to deploy in enterprise environments. The...

    Provided By Application Security

  • Webcasts // Jan 2009

    Protecting Information Assets While Complying With Today's

    Global organizations and federal agencies house some of the country's most sensitive and confidential information in their database systems. Given the increased regulation around data, Application Security, Inc. and Telos presented a webcast that outlined federal regulations and how to comply with them in the database.

    Provided By Application Security

  • Webcasts // Jan 2009

    Integrated Database GRC: Increasing ROI Through Automation

    Despite the mounting and mandatory regulatory environment, organizations cannot afford to waste valuable resources in order to achieve database compliance. Manual processes bootstrap organizations, and AppSec and Archer present an automated Database GRC solution for the enterprise.

    Provided By Application Security

  • Webcasts // Jan 2009

    User Rights Review Separation of Duties in the Database

    Organizations struggle to determine who internally has rights to the most sensitive data. When they're audited, there's often a disconnect between knowing who can access which data. As database systems become dramatically more vulnerable without a detailed view of an organization's data ownership, access controls, and rights to sensitive information,...

    Provided By Application Security

  • Webcasts // Jan 2009

    Enterprise Class Database Security Risk and Compliance

    What are the largest and most successful organizations doing to safeguard their critical and most confidential information? And how are these organizations demonstrating compliance in mapping their data protection initiatives directly at regulatory requirements? This webcast shows how.

    Provided By Application Security

  • Webcasts // Jan 2009

    Comprehensive Vulnerability Management at the Database Level

    Organizations face increasing challenges in securing sensitive data as threats continue to mount. This webcast outlines a methodology to tackle database security, risk and compliance issues.

    Provided By Application Security

  • Webcasts // Jan 2009

    Advance Your Organization's Database Security, Risk & Compliance Posture With DbProtect

    Protecting sensitive data and complying with regulatory initiatives has become more critical for global organizations. The presenter of this webcast shows how to advance the organizations security.

    Provided By Application Security

  • Webcasts // Jan 2009

    Best Practices - Database Security and Enterprise GRC

    The attendee of this webcast will learn how to discover and automate database compliance by integrating database security into enterprise governance, risk and compliance initiatives.

    Provided By Application Security

  • Webcasts // Jan 2009

    AppSecInc and Ntirety - Protecting and Managing Enterprise Database Threats

    The attendee will learn technical best practices on how to create a comprehensive database inventory leveraging DbProtect's discovery capabilities.

    Provided By Application Security

  • Webcasts // Jan 2009

    2009 Outlook - Bridging the Gap Between Data Security & Compliance

    The attendee of this webcast will get an eye-opening viewpoint on just how vulnerable enterprise data systems are and how the threats will only increase in 2009.

    Provided By Application Security

  • Webcasts // Jan 2009

    Best Practices - Database Security and Enterprise GRC Integration

    The attendee of this webcast will learn how to discover and automate database compliance by integrating database security into enterprise governance, risk and compliance initiatives.

    Provided By Application Security

  • White Papers // Oct 2007

    Intrusion Detection and Security Auditing in Oracle

    Monitoring the database applications is a critical component of achieving a strong defense-in-depth around the sensitive data. However, to be efficient and effective one must use the right combination of tools. Monitoring should never replace other layers in the security stack, instead it should complement the existing pieces. Database intrusion...

    Provided By Application Security

  • White Papers // Oct 2007

    Intrusion Detection and Security Auditing in Oracle

    Monitoring the database applications is a critical component of achieving a strong defense-in-depth around the sensitive data. However, to be efficient and effective one must use the right combination of tools. Monitoring should never replace other layers in the security stack, instead it should complement the existing pieces. Database intrusion...

    Provided By Application Security

  • Webcasts // Jan 2009

    Roundtable Series-HIPAA: Protecting Electronic Health Records

    The presenters of this webcast discuss the critical issues organizations are facing around securing sensitive health information. The attendee will see what organizations like Humana, KPMG and CaseNet are doing to meet today's protection requirements and regulatory mandates!

    Provided By Application Security

  • Webcasts // Jan 2009

    AppDetectivePro User Rights Review Best Practices Product Demo

    This webcast covers best practices for assessing vulnerabilities and reviewing user entitlements.

    Provided By Application Security

  • Webcasts // Jan 2009

    Segregating Duties in the Database to Achieve Compliant Status

    Automated solutions, like Application Security, Inc.'s newly released AppDetectivePro User Rights Review save organizations upward of 80 man-hours per database when preparing for an audit as well as save time from a typically tenuous manual process.

    Provided By Application Security

  • Webcasts // Jan 2009

    Addressing Risk and Compliance With Integrated Data Protection

    The 2009 economy is forcing organizations to cut IT costs, and CISOs are being forced to make difficult decisions relative to which systems to secure and how best to secure them. As the market shifts, best-of-breed offerings stand out and are the most sensible to deploy in enterprise environments. The...

    Provided By Application Security

  • Webcasts // Jan 2009

    Protecting Information Assets While Complying With Today's

    Global organizations and federal agencies house some of the country's most sensitive and confidential information in their database systems. Given the increased regulation around data, Application Security, Inc. and Telos presented a webcast that outlined federal regulations and how to comply with them in the database.

    Provided By Application Security

  • Webcasts // Jan 2009

    Integrated Database GRC: Increasing ROI Through Automation

    Despite the mounting and mandatory regulatory environment, organizations cannot afford to waste valuable resources in order to achieve database compliance. Manual processes bootstrap organizations, and AppSec and Archer present an automated Database GRC solution for the enterprise.

    Provided By Application Security

  • Webcasts // Jan 2009

    User Rights Review Separation of Duties in the Database

    Organizations struggle to determine who internally has rights to the most sensitive data. When they're audited, there's often a disconnect between knowing who can access which data. As database systems become dramatically more vulnerable without a detailed view of an organization's data ownership, access controls, and rights to sensitive information,...

    Provided By Application Security

  • Webcasts // Jan 2009

    Enterprise Class Database Security Risk and Compliance

    What are the largest and most successful organizations doing to safeguard their critical and most confidential information? And how are these organizations demonstrating compliance in mapping their data protection initiatives directly at regulatory requirements? This webcast shows how.

    Provided By Application Security

  • Webcasts // Jan 2009

    Comprehensive Vulnerability Management at the Database Level

    Organizations face increasing challenges in securing sensitive data as threats continue to mount. This webcast outlines a methodology to tackle database security, risk and compliance issues.

    Provided By Application Security

  • Webcasts // Jan 2009

    Advance Your Organization's Database Security, Risk & Compliance Posture With DbProtect

    Protecting sensitive data and complying with regulatory initiatives has become more critical for global organizations. The presenter of this webcast shows how to advance the organizations security.

    Provided By Application Security

  • Webcasts // Jan 2009

    Best Practices - Database Security and Enterprise GRC

    The attendee of this webcast will learn how to discover and automate database compliance by integrating database security into enterprise governance, risk and compliance initiatives.

    Provided By Application Security

  • Webcasts // Jan 2009

    AppSecInc and Ntirety - Protecting and Managing Enterprise Database Threats

    The attendee will learn technical best practices on how to create a comprehensive database inventory leveraging DbProtect's discovery capabilities.

    Provided By Application Security

  • Webcasts // Jan 2009

    2009 Outlook - Bridging the Gap Between Data Security & Compliance

    The attendee of this webcast will get an eye-opening viewpoint on just how vulnerable enterprise data systems are and how the threats will only increase in 2009.

    Provided By Application Security

  • White Papers // Jul 2009

    Defending Against New and Emerging Database Threats for 2009

    IT Security is constantly evolving and threats increasingly target the database. Organizations must be diligent in understanding these threats and mitigating their risk. Application Security, Inc., and their SHATTER research team have developed the industry's largest knowledgebase of database vulnerabilities. Relying on their extensive research, experience and knowledge enables company...

    Provided By Application Security

  • White Papers // Jul 2009

    Reviewing Database User Rights: Addressing Security, Risk and Compliance Challenges With Comprehensive Planning

    Today's business environment demands that a broad range of internal and external users require access to data. Users include internal employees, as well as external consultants, partners, and clients. New projects often require committees or teams, and employee roles are constantly changing. Organizations are faced with new and growing data...

    Provided By Application Security

  • White Papers // Jun 2009

    SQL Server Anti-Forensics: Techniques and Countermeasures

    This paper attempts to get ahead of the curve by discussing the techniques security professionals can use to perform forensics analysis after a database attack. It focus specifically on Microsoft SQL Server 2005, however the information presented is also relevant to other database versions. A discussion of forensics is not...

    Provided By Application Security

  • White Papers // Jul 2009

    Addressing the Top 5 Database Vulnerabilities Plaguing Federal Agencies

    According to the recently released Verizon 2009 Data Breach Report, 285 million records were compromised in 2008. Agencies of the U.S. government such as The Pentagon, NASA, FAA, The Army, The Veterans Administration, and the Los Alamos National Laboratory have suffered data losses - either through inadvertent human error, insider...

    Provided By Application Security

  • White Papers // Aug 2009

    DbProtect and HIPAA Compliance

    The Health Insurance Portability and Accountability Act (HIPAA), passed by Congress in 1996, is designed to safeguard all forms of personal health information (PHI) to include patient identities, medical records, and health insurance information. By defending the patients' rights to have their health information kept private and provide control over...

    Provided By Application Security

  • Webcasts // Jan 2009

    Best Practices - Database Security and Enterprise GRC Integration

    The attendee of this webcast will learn how to discover and automate database compliance by integrating database security into enterprise governance, risk and compliance initiatives.

    Provided By Application Security

  • White Papers // Sep 2011

    Integrated Methods for Web Server Access Control

    This paper introduces methods for web server access control framework for web security, which protects against illegal computer access to resources by granting different layers of privileges to different user roles. The role-based access control features are analyzed and implemented in the most recent versions of Java Application server and...

    Provided By Application Security

  • White Papers // Sep 2010

    An Examination of Database Breaches at Higher Education Institutions

    Data breaches are dominating the headlines. Institutions and individuals are at increased risk of having their information compromised by hackers, insider malicious activity, or insider mistakes. Higher Education (Higher Ed) institutions have experienced a substantially large number of data breaches nearly 160 breaches and more than 2.3 million records breached...

    Provided By Application Security