Application Security definition

Application Security. Refers to protecting data processed by an application, as well as the integrity and availability of services provided by the application.
Application Security has the meaning set forth in the Recitals.
Application Security. Data importer has developed and implemented a strict, secure development program, based on Open Web Application Security Project (OWASP), and Microsoft Security Development Lifecycle. From the earliest phases of product design and planning, the security team takes an active role in how our products are built. Following completion, sensitive product developments are tested to ensure that application security has been thoroughly and properly addressed Vulnerability monitoring through penetration testing: Data importer performs at least two annual Information Security penetration tests, which are conducted by accredited and completely independent information security companies. Vulnerabilities, if found, are addressed as part of our Risk Management Policy. AppsFlyer performs vulnerability assessment scanning using third-party tools at least twice a month, and after any major infrastructure change in our production environment Data transfer security: Data transferred to data importer through its services are encrypted in transit by default on all supporting browsers. In addition, data recorded on HTTPS pages is fully encrypted and transferred to servers over a TLS connection Networks security: AppsFlyer implements multiple and varied infrastructure security measures to protect customer information from unauthorized access, loss, alteration, viruses, Trojans and other similar harmful code. This includes: • Swift and regular updates of operating systems, hardware, and any third party software to avoid security vulnerabilities. Critical updates are deployed within one week from release on corporate as well as production systems. • Use of firewalls and Intrusion Prevention Systems (IPS) systems to limit access and protect AppsFlyer servers. • Hardening of all external-facing servers according to industry best practices. • Implementing anti-malware controls to prevent entry of malicious software. • Securing remote access communication using multifactor authentication. • Backing up customer data on a daily basis, on a rotating schedule.

Examples of Application Security in a sentence

  • Contractor shall adhere to all relevant FSSA Application Security policies located at xxxx://xx.xxx/fssa/4979.htm for any related activities provided to FSSA under this contract.

  • Application Security Developer training and awareness: Software developers are trained on foundational concepts for building secure software including secure design, threat modelling, secure coding, security testing, and best practices surrounding privacy.

  • Application Security Developer training and awareness: Software Developers are trained on foundational concepts for building secure software including secure design, threat modelling, secure coding, security testing, and best practices surrounding privacy.

  • Applications must implement controls that protect against known vulnerabilities and threats, including Open Web Application Security Project (OWASP) Top 10 Risks and denial of service (DDOS) attacks.

  • Application Security Testing Dynamic Application Security Testing (DAST) are run against all our applications on a regular basis.

  • As of the Execution Date Seller shall deliver to Buyer, and thereafter maintain with Buyer until such time as Seller delivers the Delivery Date Security, Collateral in the amount of the Application Security.

  • Licensor will follow a cyber-security framework of current standards and controls against relevant criteria such as those outlined by International Standards Organization (“ISO”) 27001/27001, National Institute of Standards and Technology (“NIST”), Center for Internet Security (“CIS”) Critical Security Controls, Control Objectives for Information and Related Technologies (“COBIT”), Open Web Application Security Project (“OWASP”) or other acceptable industry standards, as approved by K-C in writing.

  • Vendor’s web applications must meet OWASP Application Security Verification Standards (ASVS).

  • Contractor further agrees, at Contractor’s expense, to test and remediate for all publicly disclosed software vulnerabilities posted to the National Vulnerability Database (xxxx://xxx.xxxx.xxx/) and by Open Web Application Security Project (xxx.xxxxx.xxx) within thirty (30) days of being posted.

  • SharpSpring Application Security Features Access to SharpSpring services requires access to a unique API key, and access to a customer’s account portal requires a login and password.


More Definitions of Application Security

Application Security means Collateral equal to $15,000 per MW of Guaranteed Base Electrical Output.
Application Security. Data importer has developed and implemented a strict, secure development program, based on Open Web Application Security Project (OWASP), and Microsoft Security Development Lifecycle. From the earliest phases of product design and planning, the security team takes an active role in how our products are built. Following completion, sensitive product developments are tested to ensure that application security has been thoroughly and properly addressed Vulnerability monitoring through penetration testing: Data importer performs at least two annual Information Security penetration tests, which are conducted by accredited and completely independent information security companies. Vulnerabilities, if found, are addressed as part of our Risk Management Policy. RedTrack performs vulnerability assessment scanning using third-party tools at least twice a month, and after any major infrastructure change in our production environment Data transfer security: Data transferred to data importer through its services are encrypted in transit by default on all supporting browsers. In addition, data recorded on HTTPS pages is fully encrypted and transferred to servers over a TLS connection Networks security: RedTrack implements multiple and varied infrastructure security measures to protect customer information from unauthorized access, loss, alteration, viruses, Trojans and other similar harmful code. This includes:
Application Security. All user access to the data importer’s services is protected by granular user privileges, including distinct read/write privileges. These privileges are packaged into reusable and customizable roles. Individual users are granted any number of roles, thus providing the capability to control specific responsibilities and access levels within a customer’s organization.
Application Security. Security will be added enabling any solution or statement to be removed from the end user's view by setting a security attribute controlling their visibility. A single security attribute will be added to the SolutionBuilder and SolutionExplorer applications for the purpose of controlling access to solutions. The site administrator will be able to create up to 64 user security groups via SolutionAdmin. The security attribute will have a pull down list of all of the user security groups (defined in SolutionAdmin). When the value of the attribute is set to a group, only users added to that group will have access to that solution. A users denied access to a secured solution will be denied access in the following ways: the solution will not be returned in a solution search, the solution will not be returned in a query, the solution will not be available if opened by ID, no statements that exist exclusively in solutions to which a user has no access will be returned in a statement matching operation.

Related to Application Security

  • Transaction Security means the Security provided for the Secured Obligations pursuant to the Security Documents.

  • Information Security shall have the same meanings as the terms “information technology” and “information security”, respectively, in §24-37.5-102, C.R.S. Capitalized terms used herein and not otherwise defined herein or in the HIPAA Rules shall have the meanings ascribed to them in the Contract.

  • Coupon Security means any Bearer Security authenticated and delivered with one or more Coupons appertaining thereto.

  • Application Unit means such number of Units or whole multiples thereof as specified in this Prospectus or such other whole multiple of Units determined by the Manager, approved by the Trustee and notified to the Participating Dealers.

  • Corporation Security or “Corporation Securities” means (i) Common Shares, (ii) shares of preferred stock issued by the Corporation (other than preferred stock described in Section 1504(a)(4) of the Code), (iii) warrants, rights, or options (including options within the meaning of Treasury Regulation §§ 1.382-2T(h)(4)(v)) and 1.382-4 to purchase Securities of the Corporation, and (iv) any Shares.

  • Transaction Security Documents means each of the documents listed as being a Transaction Security Document in paragraph 2(e) of Part I of Schedule 2 (Conditions Precedent) of the 2009 Financing Agreement and any document required to be delivered to the Administrative Agent under paragraph 3(d) of Part II of Schedule 2 (Conditions Precedent) of the 2009 Financing Agreement together with any other document entered into by any Obligor creating or expressed to create any Security over all or any part of its assets in respect of the obligations of any of the Obligors under any of the Finance Documents (and any other Debt Documents).

  • Second Lien Security Agreement means the Second Lien Security Agreement, dated as of the date hereof, among the Initial Borrower, the Parent Borrower, certain Subsidiaries of the Parent Borrower from time to time party thereto and the Second Lien Notes Collateral Agent, as amended, restated, waived, restructured, renewed, extended, supplemented or otherwise modified from time to time or as replaced in connection with any Refinancing, extension, refunding or replacement of the Second Lien Notes Indenture.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • L/C Application means an application and agreement for the issuance or amendment of a Letter of Credit in the form from time to time in use by the L/C Issuer.

  • Registration Application means an application for registration of this Agreement as a planning agreement on the title of the Land pursuant to Section 7.6 of the Act in a form approved by the Registrar General;

  • Application Money shall have the meaning ascribed to it in Clause 1.11; “Association” shall mean the body to be created by the Apartment Acquirers;

  • Bid Security (BS) means Earnest Money Deposit / monetary or financial guarantee to be furnished by a bidder along with its tender.

  • First Lien Security Agreement means the “Security Agreement” as defined in the First Lien Credit Agreement.

  • Application packet means the information, documents, and fees required by the Department for the:

  • Term Loan Priority Collateral as defined in the Intercreditor Agreement.

  • Debt Prepayment Application means, with respect to any asset disposition, the application by the Company or any Subsidiary thereof of cash in an amount equal to the Net Proceeds Amount (or portion thereof) with respect to such asset disposition to pay Senior Indebtedness of the Company or such Subsidiary.

  • Second Priority Collateral means any “Collateral” as defined in any Second Priority Debt Document or any other assets of the Borrower or any other Grantor with respect to which a Lien is granted or purported to be granted pursuant to a Second Priority Collateral Document as security for any Second Priority Debt Obligation.

  • Additional First Lien Secured Party means the holders of any Additional First-Lien Obligations and any Authorized Representative with respect thereto, and shall include the Initial Additional First-Lien Secured Parties.

  • Application Process means the online application process under which the Applicant applies for Hospitality Packages on the Webshop.

  • UK Security Agreement means each of the security documents expressed to be governed by the laws of England (as modified, supplemented, amended or amended and restated from time to time) covering certain of such UK Loan Party’s present and future UK Collateral.

  • Borrower Security Agreement means the Security Agreement, dated as of the date hereof, between Borrower and the Agent.

  • Application Package means the forms, schedules, checklists, exhibits, computer disks and instructions thereto obtained from the Agency, which shall be completed and submitted to the Agency in accordance with all regulations in order to apply for the HTC Program.

  • Russian Security means a Security issued by a Russian issuer.

  • Request regarding a list of collateral means a record authenticated by a debtor requesting that the recipient approve or correct a list of what the debtor believes to be the collateral securing an obligation and reasonably identifying the transaction or relationship that is the subject of the request.

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.