app services

Results 126 - 150 of 590Sort Results By: Published Date | Title | Company Name
Published By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : 
hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance, it management, enterprise applications
    
BMC Software
Published By: BMC Software     Published Date: May 12, 2015
This guide provides a primer on the essentials of the Service Operation framework and highlights the key elements and important concepts from BMC Software ITIL experts.
Tags : 
it service management, practiced approaches, it organizations, it services management, strategy, design, key elements, it management
    
BMC Software
Published By: CA Technologies     Published Date: Jun 04, 2015
Are dev and test constraints holding back your digital transformation? Today, just about all businesses are scrambling to add digital components to their products and services with the hopes of capturing—and maintaining—the interest of an increasingly demanding customer base. As you undergo this digital transformation, your IT teams face tremendous pressure to not only develop innovative new experiences, but do so at an accelerated rate—lest competitors beat you to market with the next big thing. Take a new approach to solving the familiar challenge of doing more with less—and doing it faster than ever before -- remove the constraints holding you back. At its core, Service Virtualization is all about removing constraints within the SDLC by simulating dependent systems, services and behaviors. In order to understand the true depth and breadth of this concept, however, it helps to see how Service Virtualization can be utilized in different development scenarios.
Tags : 
    
CA Technologies
Published By: NetApp     Published Date: Nov 13, 2017
This paper desribes key ways to accelerate business transformation by using the cloud for more workloads and controlling your data to keep critical data secure and compliant.
Tags : 
    
NetApp
Published By: MobileIron     Published Date: Feb 15, 2017
The third edition of the Mobile Security and Risk Review is a must read and provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. The report also includes a list of the most popular business apps, Apple VPP and DEP adoption metrics, top blacklisted mobile apps and information about healthcare and financial services industries.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Mar 21, 2017
Over the past few years, organizations have used a variety of tools and technologies to enable basic mobile device management (MDM) and essential apps like email and calendar. But those capabilities are inadequate for companies that want to move beyond the basics and transform their business processes by securely moving apps and data to the cloud. For AirWatch customers, this means they should start evaluating leading enterprise mobility management (EMM) platforms like MobileIron in order to achieve their mobile transformation goals. Our platform is 100% focused on building today’s modern enterprise architecture, which is quickly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
    
MobileIron
Published By: Okta     Published Date: May 09, 2016
Have you ever wondered which enterprise cloud apps are most popular? Or which industries tend to use Office 365 versus Google Apps? Did you know that 43% of Okta customers have enabled deprovisioning? From where we sit, Okta has a unique view into the adoption and utilization of cloud apps in the enterprise. Our Businesses @ Work report takes an in-depth look into how organizations and people work today, and the apps and services they use to be productive.
Tags : 
    
Okta
Published By: Okta     Published Date: May 09, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
    
Okta
Published By: Dynatrace     Published Date: Jul 29, 2016
Gap free data helps you create and manage high-performing applications that deliver flawless end-user experience and customer loyalty. To be gap free, you must capture data from every single method in your application infrastructure, end-to-end, including timing and code-level context for all transactions, services and tiers, and make the data available for analysis. This eBook gives you technical and business case details that will show you why gap free data is a critical part of your application management strategy.
Tags : 
dynatrace, gap free data, applications, application performance, development, devops, application infrastructure, application performance management, user experience, application management, software development, enterprise applications, business technology
    
Dynatrace
Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 10, 2016
What digital trends are forcing CDN services to evolve? CDN services are changing, and web and application delivery professionals are navigating the evolving CDN landscape. Read the Forrester Research Report, "CDNs Extend to Web Performance Optimization and End-To-End Cloud Services" to learn what new capabilities are required from the Next Generation CDN.
Tags : 
cdns, akamai technology, web performance optimization, cloud services
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Manufacturers, in an effort to succeed with digital transformation, are relying on the Internet and public cloud to deliver key enterprise applications and processes. As manufacturers continue to become more digital enterprises, their network architecture must as well. Read this paper to learn key considerations for architects to create a holistic network that takes today’s, and tomorrow’s, requirements into consideration.
Tags : 
network management, manufacturing, network optimization, network applications, cloud services, enterprise applications
    
Akamai Technologies
Published By: Amazon Web Services     Published Date: Jun 15, 2016
The cloud is now the center of most enterprise IT strategies. Many enterprises find that a well-planned “lift and shift” move to the cloud results in an immediate business payoff. This whitepaper is intended for IT pros and business decision makers in Microsoft-centric organizations who want to take a cloud-based approach to IT and must modernize existing business-critical applications built on Microsoft Windows Server and Microsoft SQL Server. This paper covers the benefits of modernizing applications on Amazon Web Services (AWS) and how to get started on the journey.
Tags : 
    
Amazon Web Services
Published By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
    
CA Technologies
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
The workplace is changing. Are you taking advantage of new technology to improve your productivity? Learn how far modern tech can take you. Read the e-book to learn how you can: • Integrate new work routines • Improve client relationships • Eliminate barriers to collaboration
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Citrix ShareFile
Published By: FinancialForce     Published Date: Dec 01, 2017
The #1 Accounting App on the Salesforce Platform. FinancialForce Accounting is a simple, yet powerful accounting application that is straightforward to learn, easy to implement and trouble-free to maintain. The perfect complement to Salesforce CRM, it brings back office data to the front, allowing companies to align sales, services and finance on a single cloud.
Tags : 
    
FinancialForce
Published By: FinancialForce     Published Date: Dec 01, 2017
This IDC Vendor Profile describes FinancialForce.com, a cloud applications company with financial management, ordering and billing, human capital management (HCM), professional services automation (PSA), and supply chain management (SCM) solutions built on the Salesforce1 platform and a 36-year heritage of building financial management solutions at UNIT4 (the former Agresso and CODA products). FinancialForce.com's accounting solution, launched in 2008 as CODA 2go, was the first on - demand financial system built entirely on the Salesforce1 Platform. Backed by Technology Crossover Ventures, Advent International, Salesforce Ventures, and UNIT4, FinancialForce.com's applications continue to be the leading finance and professional services solutions available as native Salesforce1 applications on the AppExchange.
Tags : 
    
FinancialForce
Published By: CA Technologies     Published Date: Aug 22, 2017
Data is the most valuable asset a business has, and the most important data lives on the mainframe. This critical information fuels the new apps and services that differentiate your business. And it’s rapidly growing, with each new app creating a new source of data. What’s more, usage demands are increasing as developers seek access to mainframe-based data to promote innovation.
Tags : 
database, administration, management, performance optimization, sla, ca technologies, security
    
CA Technologies
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Organizations face onboarding risks of BYOS (Bring Your Own Service) as they hire new employees that bring their own cloud services into the work environment. Risks facing IT and security teams include protecting corporate data and defending against modern threats. While IT and Security teams want to adopt modern cloud applications and increase business agility, they also want to implement visibility and monitoring to protect corporate data and comply to security policies. This session will highlight how new methodologies available today enable organizations to discover sanctioned and un-sanctioned cloud services that are being used within their organization, and how they can apply consistent security policies across the public and private cloud to protect corporate data and conform to compliance policies.
Tags : 
    
Oracle Security Solutions
Published By: VMWare EMEA     Published Date: Oct 23, 2017
Today, applications facilitate commerce on a global scale. They play a key role in delivering products and services to customers, a role that directly affects the success of the business. Companies that rapidly deploy, update, and manage business applications have a competitive advantage. To maintain this fast pace, many organizations have adopted a hybrid cloud—a combination of private and public clouds—to become more agile. But true agility isn’t easy
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: VMWare EMEA     Published Date: Oct 23, 2017
VMware vRealize® Suite is the market-leading cloud management platform* purpose-built for heterogeneous, multi-cloud environments. It provides a comprehensive management stack for IT services on VMware vSphere® and other hypervisors, physical infrastructure, OpenStack, and external clouds such as VMware vCloud® Air™ and Amazon Web Services, all with a unified management experience. With vRealize Suite, IT can provision and manage at scale—compute, storage, network, and application services across multiple private and public cloud environments.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: athenahealth     Published Date: Apr 30, 2013
Our web-based patient communication system and services go well beyond medical scheduling software by improving all patient interactions outside of the office. Learn how physicians can communicate with patients online and improve their bottom lines with our unique approach to medical scheduling software and other automated messaging services.
Tags : 
healthcare, medical, hitech act, ehr, patient engagement, practice efficiency, self-pay collections
    
athenahealth
Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks
    
Arbor
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.