RSS feed Get our RSS feed

News by Topic

enterprise applications

Results 1 - 25 of 591Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: • Operational disruption • Loss of confidential data • Lost user productivity • Reputational harm • Damage to partner and customer relations • Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage – and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months – 98% said they had.
Tags : ddos, technical support, data security, application security
     Akamai Technologies
By: Entrust Datacard     Published Date: May 10, 2017
Entrust Datacard provides customers with a commercial security public key infrastructure (PKI) solution that addresses authentication and data protection needs for enterprise and government customers
Tags : 
     Entrust Datacard
By: Cisco     Published Date: Mar 17, 2017
We evaluate enterprise LAN vendors providing wired and wireless access layer connectivity. Network leaders should evaluate vendors based on their ability to offer the same network applications across both the wired and wireless infrastructure and address new IoT challenges.
Tags : connectivity, wireless, infrastructure, iot, internet of things, network applications, wireless infrastructure
     Cisco
By: NetApp     Published Date: Jun 01, 2017
In this comprehensive report, Gartner reviews how IT leaders must apply a future-looking, enterprise wide IT strategy to determine where to place applications and workloads – on premises or in the cloud.
Tags : netapp, gartner, it infrastracture, cloud
     NetApp
By: IBM     Published Date: Apr 18, 2017
The data integration tool market was worth approximately $2.8 billion in constant currency at the end of 2015, an increase of 10.5% from the end of 2014. The discipline of data integration comprises the practices, architectural techniques and tools that ingest, transform, combine and provision data across the spectrum of information types in the enterprise and beyond — to meet the data consumption requirements of all applications and business processes. The biggest changes in the market from 2015 are the increased demand for data virtualization, the growing use of data integration tools to combine "data lakes" with existing integration solutions, and the overall expectation that data integration will become cloud- and on-premises-agnostic.
Tags : data integration, data security, data optimization, data virtualization, database security, data analytics, data innovation
     IBM
By: Epicor Software Corporation     Published Date: Apr 12, 2017
An Enterprise Resource Planning (ERP) system is a series of software applications or modules that collects data from your sales, purchasing, finance, inventory, supply chain, manufacturing and quality functions into a common database so that your company can share the information, coordinate activities and collaborate. If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     Epicor Software Corporation
By: F5 Networks Inc     Published Date: May 03, 2017
Building out a dedicated infrastructure with the agility, scalability, and effciency of a public cloud—while enjoying increased levels of control and security—can help enterprises boost agility and improve operational ef?ciency. However, while most private cloud networking services provide basic load balancing functionality, they lack important application delivery features, putting the performance, availability, and security of applications at risk. As private clouds increasingly host mission-critical production applications, advanced application delivery services for layers 4 through 7 are becoming essential. End-to-end integration, orchestration, and automation of the needed application delivery networking and security services are also critical to improve application time-to-market and operational ef?ciency.
Tags : cloud, cloud security, efficiency, security, public cloud
     F5 Networks Inc
By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : cloud computing, technology, virtela, device management, christian kane, mobility management, research
     Virtela Communications, Inc.
By: Akamai Technologies     Published Date: Apr 26, 2010
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
Tags : akamai, collaboration, collaboration software, firewall, enterprise software, web conferencing, travel costs, twitter
     Akamai Technologies
By: OpenText     Published Date: Apr 12, 2016
Read the Digital Clarity Group report to learn how you can increase the value of your enterprise content by extending it to business applications.
Tags : opentext, content management, ecm, business applications
     OpenText
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
     Ounce Labs, an IBM Company
By: Palo Alto Networks     Published Date: Apr 25, 2017
A new survey commissioned by Palo Alto Networks and conducted by Enterprise Strategy Group explores why enterprise IT leaders are embracing CASB products, where they are using them, and what capabilities are most important to them. One of the most critical needs is securing the use of SaaS applications. Here’s what you need to know.
Tags : 
     Palo Alto Networks
By: Endeavour Software Technologies     Published Date: Nov 25, 2011
This whitepaper takes a deep dive into the security considerations required for enterprise mobile applications with an emphasis on iPad security.
Tags : 
     Endeavour Software Technologies
By: IBM     Published Date: Jun 21, 2017
Today, it’s unlikely that a single database will meet all your needs. For a variety of reasons—including the need to support cloud-scale solutions and increasingly dynamic app ecosystems—startups and enterprises alike are embracing a wide variety of open source databases. These varied databases—including MongoDB, Redis and PostgreSQL— open doors to building sophisticated and scalable applications on battle-hardened, non-proprietary databases.
Tags : ibm, data base, cloud, scalability, app ecosystem
     IBM
By: Pitney Bowes     Published Date: Apr 20, 2009
This Executive White Paper, sponsored by Pitney Bowes Marketing Solutions, a provider of web-based marketing automation solutions, examines the competitive advantages offered by marketing automation portals and the potential impact of these types of portals on marketing campaigns deployed in complex, rapidly evolving markets.
Tags : pitney bowes, automated portals, marketing solutions, web-based marketing, competitive advantage, portal, channel marketing, sustainable
     Pitney Bowes
By: HPE APAC     Published Date: Jun 20, 2017
Enterprise IT is in the throes of a fundamental transformation from a careful builder of infrastructure that supports core enterprise applications to a lean and lively developer of business-enabling applications powered by infrastructure. But why is this change happening now at all, and why now? Read this paper to find out more.
Tags : infrastructure, devops, agile, hpe, it transformation, enterprise
     HPE APAC
By: Akamai Technologies     Published Date: Feb 23, 2017
Most enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago—through VPNs, proxies, and remote desktops—but new and growing realities are forcing enterprises to take a different path. Read this whitepaper to learn five reasons why enterprises need a new access model.
Tags : enterprise, remote access, vpn, proxies, model
     Akamai Technologies
By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
These are no longer capitally strained organizations building an application on a one-off basis, with the cloud this is enterprise transition, this is enterprise applications being shifted to the cloud, new applications being developed in the cloud, and this requires a completely new way of building and consuming IT services for the enterprise. Download now to learn more.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jul 13, 2016
Download this asset to see how at the Carneros Inn, their Hewlett Packard Enterprise IT infrastructure is the backbone to running business applications and guest infrastructure seamlessly, 24 hours a day and 7 days a week. Sponsored by: HPE and Intel®
Tags : intel, hpe, carneros, enterprise, technology, infrastructure, business management, applications
     Hewlett Packard Enterprise
By: DocuSign     Published Date: Feb 13, 2017
Greg Baran, Director of Enterprise Applications at Vocus, speaks about DocuSign's seamless integration with Salesforce allowed them to focus on their business process rather than the technology. Vocus is always searching for new ways to DocuSign! Find out about DocuSign for Salesforce:
Tags : 
     DocuSign
By: DataStax     Published Date: Mar 10, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
     DataStax
By: Oracle + Dyn     Published Date: Jun 27, 2017
"Hybrid cloud adoption is exploding, with 80% of enterprises having at least some infrastructure in the cloud. This growth includes increased use of multiple endpoints to deliver applications, sites and services, requiring a performance management strategy to ensure those services reach users effectively. This educational webinar will cover the importance of: • Optimizing round trip times and latency, with clear real-time data • Understanding the importance of load balancing and active failover • Protecting your service from route hijacks, DDoS attacks and mitigating vulnerabilities Watch this short Video Webinar and learn how focusing on the DNS layer can help you plan, migrate and optimize your way to cloud success! Watch now! "
Tags : 
     Oracle + Dyn
By: Dell EMC     Published Date: Nov 04, 2016
While some distributed enterprises look to the cloud to reduce server sprawl and centralize operations, in many cases, the cloud simply isn’t feasible. Maybe the offices are in remote locations with limited Internet service or low-bandwidth connectivity causes issues such as latency and availability. Download the solutions brief to discover why VCE VxRail hyper-converged appliances from Dell EMC are ideal for consolidating multiple applications in a remote location onto a single, high-performance and high-availability platform that’s easy to deploy and manage.
Tags : distributed enterprises, vmware, storage, virtualization, software management, appliances
     Dell EMC
By: Dell     Published Date: May 04, 2015
To run a truly efficient private cloud, the enterprise must have clear visibility into operations, applications, and costs, no matter how heterogeneous the underlying virtualized environment. Read on to learn how to build the ties that bind the private cloud infrastructure to what the business needs.
Tags : 
     Dell
By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve an app centric approach to enterprise mobility and see how this will enable workers to stay connected to corporate systems through a vast array of device types and wireless connectivity options while simultaneously increasing productivity and becoming more customer-centric.
Tags : enterprise mobility, applications, byod, mobile strategy, security
     PulseSecure
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics