Application Security

Displaying 1-5 of 5 results

  • White Papers // Sep 2011

    Integrated Methods for Web Server Access Control

    This paper introduces methods for web server access control framework for web security, which protects against illegal computer access to resources by granting different layers of privileges to different user roles. The role-based access control features are analyzed and implemented in the most recent versions of Java Application server and...

    Provided By Application Security

  • White Papers // Sep 2010

    An Examination of Database Breaches at Higher Education Institutions

    Data breaches are dominating the headlines. Institutions and individuals are at increased risk of having their information compromised by hackers, insider malicious activity, or insider mistakes. Higher Education (Higher Ed) institutions have experienced a substantially large number of data breaches nearly 160 breaches and more than 2.3 million records breached...

    Provided By Application Security

  • White Papers // Aug 2009

    DbProtect and HIPAA Compliance

    The Health Insurance Portability and Accountability Act (HIPAA), passed by Congress in 1996, is designed to safeguard all forms of personal health information (PHI) to include patient identities, medical records, and health insurance information. By defending the patients' rights to have their health information kept private and provide control over...

    Provided By Application Security

  • Webcasts // Jan 2009

    Integrated Database GRC: Increasing ROI Through Automation

    Despite the mounting and mandatory regulatory environment, organizations cannot afford to waste valuable resources in order to achieve database compliance. Manual processes bootstrap organizations, and AppSec and Archer present an automated Database GRC solution for the enterprise.

    Provided By Application Security

  • White Papers // Oct 2007

    Intrusion Detection and Security Auditing in Oracle

    Monitoring the database applications is a critical component of achieving a strong defense-in-depth around the sensitive data. However, to be efficient and effective one must use the right combination of tools. Monitoring should never replace other layers in the security stack, instead it should complement the existing pieces. Database intrusion...

    Provided By Application Security

  • White Papers // Oct 2007

    Intrusion Detection and Security Auditing in Oracle

    Monitoring the database applications is a critical component of achieving a strong defense-in-depth around the sensitive data. However, to be efficient and effective one must use the right combination of tools. Monitoring should never replace other layers in the security stack, instead it should complement the existing pieces. Database intrusion...

    Provided By Application Security

  • White Papers // Aug 2009

    DbProtect and HIPAA Compliance

    The Health Insurance Portability and Accountability Act (HIPAA), passed by Congress in 1996, is designed to safeguard all forms of personal health information (PHI) to include patient identities, medical records, and health insurance information. By defending the patients' rights to have their health information kept private and provide control over...

    Provided By Application Security

  • Webcasts // Jan 2009

    Integrated Database GRC: Increasing ROI Through Automation

    Despite the mounting and mandatory regulatory environment, organizations cannot afford to waste valuable resources in order to achieve database compliance. Manual processes bootstrap organizations, and AppSec and Archer present an automated Database GRC solution for the enterprise.

    Provided By Application Security

  • White Papers // Sep 2010

    An Examination of Database Breaches at Higher Education Institutions

    Data breaches are dominating the headlines. Institutions and individuals are at increased risk of having their information compromised by hackers, insider malicious activity, or insider mistakes. Higher Education (Higher Ed) institutions have experienced a substantially large number of data breaches nearly 160 breaches and more than 2.3 million records breached...

    Provided By Application Security

  • White Papers // Sep 2011

    Integrated Methods for Web Server Access Control

    This paper introduces methods for web server access control framework for web security, which protects against illegal computer access to resources by granting different layers of privileges to different user roles. The role-based access control features are analyzed and implemented in the most recent versions of Java Application server and...

    Provided By Application Security