application

Results 1 - 25 of 6512Sort Results By: Published Date | Title | Company Name
Published By: Kaspersky Lab     Published Date: Aug 27, 2015
As networks increase in complexity, keeping them secure is more challenging. With users connecting to unsecured public networks, running multiple applications on both company-owned and personal devices, corporate data can now be accessed – and lost – from more endpoints than ever. This guide provides simple, practical advice to help simplify these issues.
Tags : 
    
Kaspersky Lab
Published By: F5 Networks Singapore Pte Ltd     Published Date: Mar 04, 2020
Application security is hard. We see headlines about data breaches almost daily. According to F5 Labs, web application attacks are the #1 single source entry point of successful data breaches. Additionally, the fallout from application attacks come with high costs. Insecure software makes web applications so precarious. Always-on, always-connected apps can help power and transform your business–but they can also act as gateways to the data beyond the protections of your firewalls. With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. Read this eBook to review the OWASP Top 10 Injection attacks and how to protect your enterprise.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Secure Code Warrior     Published Date: Mar 10, 2020
Economic growth today is largely based on digital technology, which means that every major business has become a software company in some form. With 23 million software developers around the world today, software developers are now the primary architects underpinning the success of many public and private organizations. Download this report to find out more.
Tags : 
    
Secure Code Warrior
Published By: VMware     Published Date: Mar 12, 2020
With more choice and purchasing power than ever before, customer experience has become everything. For CIOs, this means leveraging technology to win, serve, and retain customers year over year. It also means that end customer experience (CX), both internal and consumer - facing, can either be enriched or degraded by the quality and performance of software applications. For enterprise companies, their business now and in the future will depend on how effective, easy, and meaningful that application experience is -- a critical juncture as CIOs take over more responsibility for revenue generation and innovation. In October 2019, Forrester, in conjunction with VMware, surveyed more than 650 enterprise CIOs and technology SVPs throughout North America, Europe, and Asia - Pacific on the impact of applications on today's customer experience. Those findings have been distilled into a robust, data - driven report with insights and analysis on what's holding enterprise companies from improving t
Tags : 
    
VMware
Published By: AppDirect     Published Date: Mar 23, 2020
In today's fast-paced, ever-changing digital economy, application marketplaces are being recognized as a powerful solution to help companies source, deliver, and manage SaaS and other as-a-service offerings. But what is the return on investment for a marketplace platform? The Forrester Total Economic Impact(TM) of AppMarket* shows the benefits of AppDirect's marketplace solution. Forrester Total Economic Impact™ of AppMarket *A commissioned study conducted by Forrester Consulting on behalf of AppDirect. Fill out the form to download the full TEI study.
Tags : 
    
AppDirect
Published By: Telstra - APAC     Published Date: Mar 05, 2020
The evolving landscape of enterprise applications in multi-cloud and software-defined networks is changing the parameters for enterprise network connectivity. Network architects and managers are being challenged to review and update their network configurations to meet the needs of agile business processes. They are under pressure to do 'more with less' yet also have to ensure successful transitions to the cloud and high performance for business-critical applications. Register to receive 'The Buyer Guide' developed for Telstra by Ovum to address your current and future connectivity needs.
Tags : 
    
Telstra - APAC
Published By: Telstra - APAC     Published Date: Mar 05, 2020
A software-defined wide area network (SD-WAN) doesn’t just improve on traditional WAN—it redefines it, simplifying branch office networking and assuring reliable application performance.
Tags : 
    
Telstra - APAC
Published By: Telstra - APAC     Published Date: Mar 05, 2020
Software-Defined Wide Area Networking (SD-WAN) enables organizations to more efficiently utilize bandwidth and improve application performance, availability and visibility on their WAN. It simplifies the delivery of WAN services to branch sites by orchestrating a range of underlying networking technologies (such as the Internet, IP VPN and LTE) for transport-agnostic connectivity, simpler deployment and central management. Critically, it adds the intelligence to automatically adjust traffic flows between multiple links based on application and link performance.
Tags : 
    
Telstra - APAC
Published By: TIBCO Software     Published Date: Mar 17, 2020
Your business teams need to manage and share vast amounts of data assets—master data, reference data, conformed dimensions, hierarchies, and metadata. The dynamism and sophistication of your data means you can no longer rely on simple office automation tools or outdated data management tools to manage these assets. You need TIBCO EBX™ software because it makes it so much easier to manage your data assets: Custom applications and purpose-built master data management (MDM) solutions are hard to change, but EBX software is flexible and agile. It uses a unique what-you-model-is-what-you-get design approach, with applications generated on-the-fly and fully configurable, eliminating the need for long, costly, and endless development projects. It includes all the enterprise-class capabilities you need to create data-driven applications. Data stewardship, workflow, data quality, and data integration are built right in. Get this whitepaper to explore all the features of EBX™ software and how i
Tags : 
    
TIBCO Software
Published By: CheckMarx     Published Date: Mar 04, 2020
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Mar 04, 2020
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: Group M_IBM Q1'20     Published Date: Feb 10, 2020
Do you have a cohesive data strategy and architecture to derive insights from all your data sources? Watch the webinar to learn about the new IBM Cloud Pak for Data System, a cloud-native Data and AI platform-in-a-box that provides a pre-configured, governed and secure environment to collect, organize and analyze data. Built on the Red Hat® OpenShift® Container Platform, IBM Cloud Pak for Data System enables you to take advantage of a broad set of data and AI services and integrate them quickly into applications to accelerate innovation."
Tags : 
    
Group M_IBM Q1'20
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: Hitachi Vantara     Published Date: Jan 28, 2020
To remain competitive, organizations need an IT infrastructure that is agile and protected to meet their ever-changing needs, while also leveraging their most valuable asset—their data. Many organizations have a variety of siloed tools (server tools, virtual machine tools, event monitoring tools, etc.) along with networks and storage. How does IT look across their application's data path and determine whether it's optimized? These scenarios are driving the need for intelligent operations that leverage emerging technologies, such as artificial intelligence (AI) and machine learning (ML), to help IT administrators more efficiently do their jobs. Read this ESG whitepaper to learn how investing in AI and ML can help improve operational efficiency and get the most value out of corporate data.
Tags : 
    
Hitachi Vantara
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : 
bell micro, sap application, best practices, ibm xiv, storage system
    
Bell Micro
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Akamai Technologies     Published Date: Apr 26, 2010
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
Tags : 
akamai, collaboration, collaboration software, firewall, enterprise software, web conferencing, travel costs, twitter
    
Akamai Technologies
Published By: Coyote Point Systems     Published Date: Aug 25, 2010
Application Delivery Controllers understand applications and optimize server performance - offloading compute-intensive tasks that prevent servers from quickly delivering applications. Learn how ADCs have taken over where load balancers left off.
Tags : 
coyote point, systems, slbs, server load balancers, adc, adcs, ssl, load balancing
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: NEC     Published Date: Aug 26, 2009
This is a case study which shows how Leicester Theatre Trust (LTT) implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC.
Tags : 
curve, nec, ltt, unified communications, architecture, service oriented architecture, soa, soc
    
NEC
Published By: Simba by Magnitude     Published Date: Jan 28, 2020
Siloed data has become the Achilles heel of marketing insights –especially in the world of B2B and B2B2C marketing. Today’s marketing and sales departments sit on a goldmine of data derived from the dozens of applications and data sources in their MarTech stack. Still, the real opportunity for insights is hidden in the combined data across applications. Combining data in a comprehensive way delivers a full picture of marketing efficacy and efficiency. In this eBook, learn about the origins of siloed data, and how data has emerged and evolved, as well as review the benefits that marketing can realize with connected data. Along the way, we’ll share some action items you can take to assess your current situation and build a plan to unify your data and fuel great marketing insights.
Tags : 
    
Simba by Magnitude
Published By: Simba by Magnitude     Published Date: Feb 28, 2020
When it comes to developing applications capable of connecting to the data sources customers demand, software providers face the following top of mind challenges: • Connecting applications to data sources, h • Having adequate resources to do so, • Applying an effective maintenance strategy and • Addressing scalability. This eBook from the connectivity experts with 100s of person-years of data adapter experience is your how-to guide on the journey toward addressing these challenges to accelerate adoption of your application.
Tags : 
    
Simba by Magnitude
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.