application

Results 1 - 25 of 6417Sort Results By: Published Date | Title | Company Name
Published By: Kaspersky Lab     Published Date: Aug 27, 2015
As networks increase in complexity, keeping them secure is more challenging. With users connecting to unsecured public networks, running multiple applications on both company-owned and personal devices, corporate data can now be accessed – and lost – from more endpoints than ever. This guide provides simple, practical advice to help simplify these issues.
Tags : 
    
Kaspersky Lab
Published By: Dell APAC     Published Date: Nov 20, 2019
Users are on the go, working from almost anywhere and on multiple devices, reshaping the traditional work-place. We know for you as an IT leader this means more: ? devices to provision and deploy ? end points to secure ? applications to support ? systems to manage Which results in more headaches for you and less time to focus on more important, strategic initiatives. And your role has transformed too; you’re now a critical partner of the company’s leadership. You’re thinking about bringing the best experience to your users, accelerating collaboration and maximizing productivity. You’re being tasked to help the company remain innovative. With all of these added responsibilities, thinking about the more repetitive tasks like resetting user passwords and giving access to VPN should be a thing of the past. At Dell Technologies, we understand your top priority is transforming your organization for ultimate value and efficiency.
Tags : 
    
Dell APAC
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"The average cost of a breach is $3.86 million. With so much at stake, why do so many enterprises grant access based on an outdated model of assumed trust? And why do businesses rely on antiquated access technologies such as traditional VPNs and remote proxies to provide this application access? The most successful companies continuously evaluate and refine their technology stack to best enable their organization's imperatives and retain their market share. Read this white paper to explore the five reasons enterprises urgently need a new application access model — one that supports a Zero Trust security framework. The most successful companies continuously evaluate and refine their technology stack to best enable their organization's imperatives and retain their market share. Read this white paper to learn the 5 reasons enterprises need a new application access model that supports a Zero Trust framework."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"While SD-WAN currently enables the corporate network to handle traffic efficiently and move workloads to the cloud, this network model must continue to iterate. The Internet is the corporate WAN of the near future. Using SD-WAN, combined with the appropriate Zero Trust–compliant security and access services, is the first step to transitioning to the Internet as the corporate network. Read this white paper to learn how enabling safe traffic to go straight to the Internet, blocking bad traffic, and only proxying risky traffic, delivers: • Simplified security • Lower latency and better performance • Fewer broken web pages and applications"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"A Zero Trust model ensures that security and access decisions are dynamically enforced based on identity, device, and user context. This security framework dictates that only authenticated and authorized users and devices can access applications and data, while also protecting workloads and users from advanced threats. Read this white paper to learn how to progress your Zero Trust transformation, safeguarding users, applications — and the future of your business — with best practices including: • Isolating your network infrastructure from the public Internet • Enabling WAF to protect corporate applications • Monitoring Internet-bound traffic and activity"
Tags : 
    
Akamai Technologies
Published By: SAP Concur     Published Date: Dec 26, 2019
As we move from the digital era to the intelligent era, enterprises need to turn to the tools of the future. S/4HANA Cloud is the cornerstone of an intelligent enterprise. SAP can help. Here’s how: 1. Connecting people and data 2. Make integration easy 3. Extend your core offerings and unlock business value The winning combination of SAP S/4HANA Cloud and SAP Cloud Platform brings everything together to build the applications of the future while making the most of your existing investments today. Download the Gold Guide.
Tags : 
    
SAP Concur
Published By: Rubrik EMEA     Published Date: Dec 16, 2019
Modern businesses are rapidly embracing Microsoft Azure Cloud to fast track their digital transformation, achieve cost efficiency, and gain business agility. Join this on-demand webinar with experts from Rubrik, Microsoft, and joint customer Cranfield University for a deep-dive on how Rubrik and Microsoft Azure accelerate the cloud journey with a simple, integrated solution for data protection and application mobility across the hybrid data center. View this webinar to learn how Rubrik and Microsoft have enabled Cranfield University to: Protect, secure, and manage their entire hybrid cloud across their Microsoft environment including Hyper-V, physical Windows, and instant database recoveries with SQL Live Mount. Automate backup, recovery and archival to Azure via Rubrik's SLA policy. Lower their TCO and reduce their data center footprint by 75%.
Tags : 
    
Rubrik EMEA
Published By: Dassault Systèmes     Published Date: Nov 11, 2019
"The term Value Network describes enterprises that truly connect into a network of partners that collaborate and communicate with lightning speed and agility. The supply chain is now overshadowed by interconnected Value Networks. One example for Value networks applications is the digital twin, where the physical environment is replicated in a virtual model to harmonize new product design, process design and manufacturing design with planning, logistics, service and execution. When the virtual world and real world truly work together, we are able to speed up decision-making, reduce risk and cost, deliver great customer experiences, and minimize waste to make businesses more sustainable. Dassault Systèmes DELMIA,powered by the 3DEXPERIENCE platform, delivers the solutions to industries and service providers to transform their operations and orchestrate their entire Value Network."
Tags : 
    
Dassault Systèmes
Published By: Schneider Electric     Published Date: Jan 09, 2020
"Medium Voltage protection relays with a focus on safety and cyber security. Easy to use for panel builders, system integrators and end users. From overcurrent to differential protection with arc flash protection, LPCTs, LPVTs, redundant Ethernet communication and IEC 61850. Easergy P5 is our latest protection relay for demanding medium-voltage applications. It offers best-in-class safety, security, reliability, and connectivity. The Easergy P5 is part of the PowerLogic range of power monitoring and control solutions and has been built on more than 100 years of experience in protection relays."
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 09, 2020
Arc faults in low voltage electrical installations within buildings pose significant safety risks. Electric arcs in conductors and connections are not detected by existing protective devices such as circuit-breakers or residual current devices (RCDs), even though these arcs cause fires. To minimize the threat of electrical installation-related fires, electricians, contractors and building occupants need to consider deploying new Arc Fault Detection Devices (AFDD). This paper discusses new break-through in the field of electrical protection, and identifies critical application areas where AFDDs enhance safety
Tags : 
    
Schneider Electric
Published By: F5 Networks Singapore Pte Ltd     Published Date: Dec 02, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed-breach world. Credential theft is the leading attack type for causing a data breach, and bots are the driving force behind the majority of them. To defend against credential stuffing, prioritizing secure access and bot protection needs to be part of every organization’s security strategy.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Dec 02, 2019
The rise of microservices has been a remarkable advancement in application development and deployment. Moving to a microservices-based approach makes app development faster and easier to manage, requiring fewer people to implement more new features. Microservices are a critical part of a number of significant advancements that are changing the nature of how we work. Agile software development techniques, moving applications to the cloud, DevOps culture, continuous integration and continuous deployment (CI/CD), and the use of containers are all being used alongside microservices to revolutionize application development and delivery. In this ebook, you’ll take away with pro-tips on how to solve many potential development problems before you even start writing code.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Salesforce     Published Date: Dec 18, 2019
With Salesforce, building amazing customer experiences is everyone’s business — declarative and technical developers alike. Yes, with Salesforce anyone can build anything from authenticated websites, branded partner portals, published mobile apps, to high-fidelity applications. It’s about transforming your customer experience strategy so you can easily connect with your customers in new and innovative ways. Get started here. Get to know these four tools for declarative builders and technical developers — a full suite of solutions that can help you to build high-fidelity, business intelligent websites and mobile apps.
Tags : 
    
Salesforce
Published By: Salesforce     Published Date: Dec 18, 2019
IDC interviewed organizations using the Salesforce Lightning Platform (Lightning Platform) to understand its impact on their application development activities, including application development by line-of-business (LOB) users. These Salesforce customers are creating significant value by enabling delivery of timely and highly relevant new applications and features to the business. IDC’s analysis shows that study participants will realize value worth an average of $181,900 per 100 internal users of applications developed on the Lightning Platform ($13.67 million per organization) by: Enabling line-of-business users to deliver enhancements and new features Accelerating development life cycles for IT developers, thereby helping organizations better address business opportunities Improving the quality and functionality of new applications and features, which bolster employee productivity levels Requiring less IT staff time for management and support, freeing up IT resources for other busi
Tags : 
    
Salesforce
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.
Tags : 
    
Cisco Umbrella EMEA
Published By: Anaplan     Published Date: Sep 11, 2019
Financial planning and analysis (FP&A) professionals have witnessed evolutionary changes in budgeting, planning, forecasting, and analysis processes. Through innovative advancements in technology and the application of big data within these processes, the FP&A function is empowered to transform into a strategic business partner. In “The Rise and Rise of FP&A,” a paper written by FSN and sponsored by Anaplan, you will learn about: The evolution of the FP&A function How FP&A teams harness big data and close the talent gap Why FP&A can become a top contributor to forward-focused decision-making
Tags : 
    
Anaplan
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : 
bell micro, sap application, best practices, ibm xiv, storage system
    
Bell Micro
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Akamai Technologies     Published Date: Apr 26, 2010
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
Tags : 
akamai, collaboration, collaboration software, firewall, enterprise software, web conferencing, travel costs, twitter
    
Akamai Technologies
Published By: Coyote Point Systems     Published Date: Aug 25, 2010
Application Delivery Controllers understand applications and optimize server performance - offloading compute-intensive tasks that prevent servers from quickly delivering applications. Learn how ADCs have taken over where load balancers left off.
Tags : 
coyote point, systems, slbs, server load balancers, adc, adcs, ssl, load balancing
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.