RSS feed Get our RSS feed

News by Topic

applications services

Results 151 - 175 of 426Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: Jun 01, 2017
Here are the five core principles for monetizing your storage like never before and winning more customer applications than ever for your cloud and hosted services. These are your keys to the next generation data center.
Tags : netapp, data center solutions, cloud storage
     NetApp
By: ServiceNow     Published Date: Mar 24, 2015
IT departments and the organizations they serve can reap dramatic benefits by codifying and automating unique processes through the development of custom applications. These applications can lower costs, improve agility, quicken time to value, give IT greater control,and bolster productivity throughout IT and among enterprise users. In fact, with the right tools in place, organizations can enable a new class of “citizen developers” who work either in or with IT to create applications and services that are highly responsive to business needs. A platform to enable this type of innovation is not only available, cost efficient and simple to deploy, but it may already be part of your IT environment.
Tags : codifying and automating, custom applications, it control, applications and services, business needs, cost efficient, it environment
     ServiceNow
By: ServiceNow     Published Date: Mar 24, 2015
Your enterprise needs the ability to identify all duplicative or outmoded IT and business applications, services and other resources, and then to consolidate those worth keeping, migrate those worth updating, and retiring the rest. And that consolidation delivers multiple business benefits. Key among these: a single interface to multiple tools and resources, and more agile global operations. With the right practices, policies and technology platform, your enterprise can accomplish these goals in ways that accelerate growth, cut costs and complexities, and enhance competitiveness.
Tags : consolidation, business transformation, single interface, business applications, business benefits
     ServiceNow
By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : criminal, justice, information, services, cjis, compliance
     MobileIron
By: Okta     Published Date: Jul 25, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: Okta     Published Date: Jul 27, 2016
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and provisioning solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: AWS     Published Date: Nov 07, 2018
As more enterprises are moving some, if not all of their data and applications to the cloud – cost effectiveness, network performance and security are top of mind. AT&T NetBond for Cloud provides a dynamic, private connect to Amazon Web Services (AWS). Its enhanced infrastructure makes it easier to securely connect applications, platforms, and services. With AT&T NetBond for Cloud, customers are getting a single, end-to-end solution from one provider that allows them to maintain a hybrid environment, meaning that can utilize their current investments in their on-premises infrastructure and strategy. Download this eBook to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands in real-time - How to take advantag
Tags : 
     AWS
By: AWS     Published Date: Nov 07, 2018
To best support global users and customers, enterprises require seamlessly connectivity between branch office locations, applications, and workloads hosted in the cloud. Many WAN solutions are ill-equipped for this task because they are generally rigid, complex to configure, and expensive to maintain. IoT adoption, a dramatic increase of the number of network devices, and the sophistication of security threats further compounds this challenge. Geographically-distributed devices need secure cloud connectivity, limiting the ability of existing WAN solutions to fulfill the need of distributed organizations. Cisco SD-WAN on Amazon Web Services (AWS) is an overlay WAN architecture that is designed to address modern enterprise cloud applications and workloads, heterogeneous WAN connectivity, distributed global workforces, and other business needs that traditional WAN solutions cannot meet. Learn more by downloading this solution brief. Join our webinar to learn -How to migrate a data ce
Tags : 
     AWS
By: VMware     Published Date: Jun 04, 2019
With digital transformation accelerating across every industry, practically every modern business initiative has become and IT project, and IT is now more crucial to the success of the business than ever before. Businesses must bring innovative products and services to market faster than their competitors, which, in turn, means that IT must rapidly and continuously deliver applications and services that drive productivity and efficiency.
Tags : 
     VMware
By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
     CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
     CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
     CloudHealth by VMware
By: Palo Alto Networks     Published Date: Sep 30, 2016
Cloud-first development initiatives, the need to deliver your applications and services to an exploding number of mobile devices and the ongoing need to accomplish more with less is driving a data center transformation that increasingly includes the public cloud.
Tags : palo alto, vm-series, hybrid cloud, security, security challeneges
     Palo Alto Networks
By: Oracle     Published Date: Feb 22, 2019
Is your business looking to leverage the benefits of the Cloud, but isn’t clear on how to get there with existing applications running on the Oracle Database? Register for our webcast to see how: • in a few simple steps you can move your application and Oracle database to the Oracle Cloud • you can easily scale up or down infrastructure services use based on your needs • you can leverage the benefits of the Oracle Cloud - sink hardware costs, reduce capital expenditure, decrease provisioning time, increase productivity and accelerate time to market. Reap the benefits from the Oracle Cloud today. Register for this webcast now.
Tags : 
     Oracle
By: Oracle     Published Date: Mar 01, 2019
Most cloud infrastructure vendors offer companies a stable and secure environment on which to build and run their applications without having to manage a data center, invest in hardware, or install and update software. While most cloud vendors provide the same types of services, they differ in how they charge for and deliver those services.
Tags : 
     Oracle
By: Oracle + Dyn     Published Date: Aug 31, 2017
"Hybrid cloud adoption is exploding, with 80% of enterprises having at least some infrastructure in the cloud. This growth includes increased use of multiple endpoints to deliver applications, sites and services, requiring a performance management strategy to ensure those services reach users effectively. This educational webinar will cover the importance of: • Optimizing round trip times and latency, with clear real-time data • Understanding the importance of load balancing and active failover • Protecting your service from route hijacks, DDoS attacks and mitigating vulnerabilities Watch this short Video Webinar and learn how focusing on the DNS layer can help you plan, migrate and optimize your way to cloud success! Watch now! "
Tags : 
     Oracle + Dyn
By: Oracle + Dyn     Published Date: Jun 29, 2017
Global DNS performance and availability are critical to business continuity, security and end-user experience. With online applications, content, data and services often scattered across the internet and housed in your own DCs, your CDN or in your cloud instances; it’s more important than ever to have a robust, redundant DNS solution making sure your assets get delivered as quickly and reliably as possible. This whitepaper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: The critical role DNS plays in the user experience The failure and outage risks of relying on a single DNS solution The major resiliency and performance differences between unicast vs anycast addressing Criteria for evaluating a managed DNS service provider Download Now!
Tags : 
     Oracle + Dyn
By: Red Hat     Published Date: Jan 02, 2018
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications.
Tags : 
     Red Hat
By: IBM     Published Date: Jul 02, 2018
Cloud has evolved from a technological innovation to an integral part of business. Companies in every industry are investing in Digital Transformation initiatives to evolve and grow; often, cloudbased platforms are foundational elements of these transformations, as businesses increasingly seek the flexibility and agility to roll out new software services in days or weeks, versus months or years. As Digital Transformation initiatives unfold, one key challenge is to modernize the data center to facilitate rapid delivery of new applications and services—while still ensuring that existing missioncritical applications remain high performing, available, and secure. Another challenge relates to new requirements for accelerating the analysis of organizational data to near real time, much faster than previously possible with earlier incarnations of Business Intelligence (BI). Agile businesses are demanding faster access to the information contained within operational and business data stores to
Tags : 
     IBM
By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
     Group M_IBM Q418
By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
     TIBCO Software
By: Amazon Web Services EMEA     Published Date: Oct 07, 2019
When applications are core to your business, the approach you take to developing apps a?ects your bottom line. Many organizations are using modern application development best practices to build better apps and microservices are a key component of those e?orts.
Tags : 
     Amazon Web Services EMEA
By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
This Forrester Wave report evaluates the top applications management and digital operations services (AMDOS) providers.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q3'19     Published Date: Aug 12, 2019
Welcome to Secure Hybrid Cloud For Dummies, IBM Limited Edition. The hybrid cloud is becoming the way enterprises are transforming their organizations to meet changing customer requirements. Businesses are discovering that in order to support the needs of customers, there is an imperative to leverage the highly secure IBM Z platform to support missioncritical workloads, such as transaction management applications. The Z platform has been transformed over the years. The combination of z/OS, LinuxONE, open APIs, and the inclusion of Kubernetes has made IBM Z a critical partner in the hybrid cloud world. Businesses can transform their IBM Z environments into a secure, private cloud. In addition, through IBM’s public cloud, businesses may take advantage of IBM Z’s security services to protect their data and applications.
Tags : 
     Group M_IBM Q3'19
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics