Application Security definition

Application Security. Refers to protecting data processed by an application, as well as the integrity and availability of services provided by the application.
Application Security. Data importer has developed and implemented a strict, secure development program, based on Open Web Application Security Project (OWASP), and Microsoft Security Development Lifecycle. From the earliest phases of product design and planning, the security team takes an active role in how our products are built. Following completion, sensitive product developments are tested to ensure that application security has been thoroughly and properly addressed
Application Security has the meaning set forth in the Recitals.

Examples of Application Security in a sentence

  • Web Application scanning that is performed on code and application in compliance with Open Web Application Security project (OWASP) and SANS (SysAdmin, Audit, Network, and Security) Institute standards.

  • Contractor shall adhere to all relevant FSSA Application Security policies located at xxxx://xx.xxx/fssa/4979.htm for any related activities provided to FSSA under this contract.

  • The specification for Imperva Secure Sphere Data Security solutions are limited to security-related Imperva solutions, such as Web Application Security, Database Security, PCI Compliance, Enterprise Application Security, Database Auditing, Cloud Access Security Broker, and Automated Compliance Reporting.

  • MaaS360 Mobile Application Security provides additional data protection for enterprise applications that use the WorkPlace SDK during development, or for iOS apps upload the application (.ipa), provisioning profile, and signing certificate to be automatically integrated.

  • Mobile Application Security integrates the app with the Productivity Suite.

  • Applications must implement controls that protect against known vulnerabilities and threats, including Open Web Application Security Project (OWASP) Top 10 Risks and denial of service (DDOS) attacks.

  • Suite/Bundle of products including MaaS360 Secure Mobile Mail, MaaS360 Mobile Application Management, MaaS360 Mobile Application Security, MaaS360 Content Service, and MaaS360 Secure Mobile Browser.

  • Control: System Classification(s): All Classifications; Compliance: SHOULDAgencies SHOULD follow the documentation provided in the Open Web Application Security Project guide to building secure Web applications and Web services.

  • Vendor’s web applications must meet OWASP Application Security Verification Standards (ASVS).

  • The Contractor (and/or any subcontractor) shall follow secure coding best practice requirements, as directed by United States Computer Emergency Readiness Team (US-CERT) specified standards and the Open Web Application Security Project (OWASP), that will limit system software vulnerability exploits.


More Definitions of Application Security

Application Security. Data importer has developed and implemented a strict, secure development program, based on Open Web Application Security Project (OWASP), and Microsoft Security Development Lifecycle. From the earliest phases of product design and planning, the security team takes an active role in how our products are built. Following completion, sensitive product developments are tested to ensure that application security has been thoroughly and properly addressed Vulnerability monitoring through penetration testing: Data importer performs at least two annual Information Security penetration tests, which are conducted by accredited and completely independent information security companies. Vulnerabilities, if found, are addressed as part of our Risk Management Policy. AppsFlyer performs vulnerability assessment scanning using third-party tools at least twice a month, and after any major infrastructure change in our production environment Data transfer security: Data transferred to data importer through its services are encrypted in transit by default on all supporting browsers. In addition, data recorded on HTTPS pages is fully encrypted and transferred to servers over a TLS connection Networks security: AppsFlyer implements multiple and varied infrastructure security measures to protect customer information from unauthorized access, loss, alteration, viruses, Trojans and other similar harmful code. This includes: • Swift and regular updates of operating systems, hardware, and any third party software to avoid security vulnerabilities. Critical updates are deployed within one week from release on corporate as well as production systems. • Use of firewalls and Intrusion Prevention Systems (IPS) systems to limit access and protect AppsFlyer servers. • Hardening of all external-facing servers according to industry best practices. • Implementing anti-malware controls to prevent entry of malicious software. • Securing remote access communication using multifactor authentication. • Backing up customer data on a daily basis, on a rotating schedule.
Application Security means Collateral equal to $15,000 per MW of Guaranteed Base Electrical Output.
Application Security. Security will be added enabling any solution or statement to be removed from the end user's view by setting a security attribute controlling their visibility. A single security attribute will be added to the SolutionBuilder and SolutionExplorer applications for the purpose of controlling access to solutions. The site administrator will be able to create up to 64 user security groups via SolutionAdmin. The security attribute will have a pull down list of all of the user security groups (defined in SolutionAdmin). When the value of the attribute is set to a group, only users added to that group will have access to that solution. A users denied access to a secured solution will be denied access in the following ways: the solution will not be returned in a solution search, the solution will not be returned in a query, the solution will not be available if opened by ID, no statements that exist exclusively in solutions to which a user has no access will be returned in a statement matching operation.
Application Security. All user access to the data importer’s services is protected by granular user privileges, including distinct read/write privileges. These privileges are packaged into reusable and customizable roles. Individual users are granted any number of roles, thus providing the capability to control specific responsibilities and access levels within a customer’s organization.
Application Security. All user access to the Lotame DMP is protected by granular user privileges, including distinct read/write privileges. These privileges are packaged into reusable and customizable roles. Individual users are granted any number of roles, thus providing the capability to control specific responsibilities and access levels within a customer’s organization.

Related to Application Security

  • Transaction Security means the Security created or expressed to be created in favour of the Security Agent pursuant to the Transaction Security Documents.

  • Information Security (GSN GISN 5) is all the means and functions ensuring the accessibility, confidentiality or integrity of information or communications, excluding the means and functions intended to safeguard against malfunctions. This includes "cryptography", "cryptographic activation", 'cryptanalysis', protection against compromising emanations and computer security.

  • Coupon Security means any Bearer Security authenticated and delivered with one or more Coupons appertaining thereto.

  • Application Unit means such number of Units or whole multiples thereof as specified in this Prospectus or such other whole multiple of Units determined by the Manager, approved by the Trustee and notified to the Participating Dealers.

  • Corporation Security or “Corporation Securities” means (i) Common Shares, (ii) shares of preferred stock issued by the Corporation (other than preferred stock described in Section 1504(a)(4) of the Code), (iii) warrants, rights, or options (including options within the meaning of Treasury Regulation §§ 1.382-2T(h)(4)(v)) and 1.382-4 to purchase Securities of the Corporation, and (iv) any Shares.

  • Transaction Security Documents means each of the documents listed as being a Transaction Security Document in paragraph 2(e) of Part I of Schedule 2 (Conditions Precedent) of the 2009 Financing Agreement and any document required to be delivered to the Administrative Agent under paragraph 3(d) of Part II of Schedule 2 (Conditions Precedent) of the 2009 Financing Agreement together with any other document entered into by any Obligor creating or expressed to create any Security over all or any part of its assets in respect of the obligations of any of the Obligors under any of the Finance Documents (and any other Debt Documents).

  • Second Lien Security Agreement means the “Security Agreement” as defined in the Second Lien Credit Agreement.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • L/C Application means an application and agreement for the issuance or amendment of a Letter of Credit in the form from time to time in use by the L/C Issuer.

  • Registration Application means an application for registration of this Agreement as a planning agreement on the title of the Land pursuant to Section 7.6 of the Act in a form approved by the Registrar General;

  • Bid Security means the bid security provided by the Contractor to the Authority in accordance with the Request for Proposal, and which is to remain in force until substituted by the Performance Security;

  • First Lien Security Agreement means the “Security Agreement” as defined in the First Lien Credit Agreement.

  • Application packet means the information, documents, and fees required by the Department for the:

  • Term Loan Priority Collateral as defined in the Intercreditor Agreement.

  • Debt Prepayment Application means, with respect to any asset disposition, the application by the Company or any Subsidiary thereof of cash in an amount equal to the Net Proceeds Amount (or portion thereof) with respect to such asset disposition to pay Senior Indebtedness of the Company or such Subsidiary.

  • Second Priority Collateral means any “Collateral” as defined in any Second Priority Debt Document or any other assets of the Borrower or any other Grantor with respect to which a Lien is granted or purported to be granted pursuant to a Second Priority Collateral Document as security for any Second Priority Debt Obligation.

  • Additional First Lien Secured Party means the holders of any Additional First-Lien Obligations and any Authorized Representative with respect thereto, and shall include the Initial Additional First-Lien Secured Parties.

  • Application Process means the online application process under which the Applicant applies for Hospitality Packages on the Webshop.

  • UK Security Agreement means each of the security documents expressed to be governed by the laws of England (as modified, supplemented, amended or amended and restated from time to time) covering certain of such UK Loan Party’s present and future UK Collateral.

  • Borrower Security Agreement means the Security Agreement, dated as of the date hereof, between Borrower and the Agent.

  • Application Package means the forms, schedules, checklists, exhibits, computer disks and instructions thereto obtained from the Agency, which shall be completed and submitted to the Agency in accordance with all regulations in order to apply for the HTC Program.

  • Russian Security means a Security issued by a Russian issuer.

  • Request regarding a list of collateral means a record authenticated by a debtor requesting that the recipient approve or correct a list of what the debtor believes to be the collateral securing an obligation and reasonably identifying the transaction or relationship that is the subject of the request.

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • LCR Security means any commercial paper or security (other than equity securities issued to Parent or any Originator that is a consolidated subsidiary of Parent under GAAP) within the meaning of Paragraph .32(e)(viii) of the final rules titled Liquidity Coverage Ratio: Liquidity Risk Measurement Standards, 79 Fed. Reg. 197, 61440 et seq. (October 10, 2014).

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.