PDF Document Download Document: Securing Your Applications: Three Ways to PlayYou must be a logged in to view this document.
|
Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology! |
Excerpt: The process of developing secure software applications has many strong parallels with the principles of quality in manufacturing. But based on current practices, we still have far to go in terms of establishing a clear definition of secure applications, setting the standard of performance for application security as zero vulnerabilities, and establishing the primary means of achieving secure applications as prevention rather than inspection or additional layers of protection. In a series of three follow-on Research Briefs planned for publication in Fall 2010, Aberdeen will examine in greater detail the three high-level strategies which companies have adopted for securing their Internet-facing enterprise applications. |