PDF Document Download
Securing Your Applications: Three Ways to Play
You must be a logged in to view this document.
The process of developing secure software applications has many strong parallels with the principles of quality in manufacturing. But based on current practices, we still have far to go in terms of establishing a clear definition of secure applications, setting the standard of performance for application security as zero vulnerabilities, and establishing the primary means of achieving secure applications as prevention rather than inspection or additional layers of protection.
In a series of three follow-on Research Briefs planned for publication in Fall 2010, Aberdeen will examine in greater detail the three high-level strategies which companies have adopted for securing their Internet-facing enterprise applications.