RSS feed Get our RSS feed

News by Topic

management applications

Results 151 - 175 of 511Sort Results By: Published Date | Title | Company Name
By: Alight Solutions     Published Date: Jul 17, 2018
As much as moving to the Cloud has been a hot trend over the past several years with Human Capital Management systems, in today’s world, financial management systems are not far behind. We’re starting to see the activity significantly ramp up within the financial management system space. So much so, that according to research done by Gartner, the Cloud is expected to become the dominant deployment model across all areas of financial management applications by 2025. Spending on cloud or SaaS-based applications will increase from 30% of the total market spend in 2015 to 47% by 2020. So which financial systems are organizations shifting to the cloud model and why is this happening—aside from following the trend in HR? Download now to learn more -
Tags : 
     Alight Solutions
By: TIBCO Software     Published Date: Feb 26, 2019
Every financial services firm understands the importance of data. More is better. Sooner is better. Accessing it, understanding it, and taking advantage of it before the competition is better. In the mid-2000s, Financial Services was the first industry to strongly adopt data virtualization as a disruptive, new technology for accessing and integrating more data, faster and more easily than ever before. Buy and sell side groups at the largest institutions led the charge, followed soon after by risk management and compliance units. The leading mutual fund providers, along with hedge funds, led the next wave of adoption. In recent years, commercial banks and insurers have accelerated their use of data virtualization. And today, analyst firms such as Gartner, Inc. and Forrester project continued data virtualization adoption for both first-time use at new firms and expanded deployments at existing sites. This whitepaper provides 10 examples of TIBCO Data Virtualization enabled applications f
Tags : 
     TIBCO Software
By: Sage     Published Date: Jul 08, 2015
This white paper describes how ERP technology can improve efficiency by: • Standardizing and automating business processes—locally as well as across multiple locations and countries—to accelerate business operations. • Offering a fully integrated suite of business management applications that share a common dataset and extending these applications over the Internet, allowing visibility and collaboration across departments, as well as with customers, partners, suppliers, and remote users. • Providing flexible and customizable reporting to improve business reporting, analysis,and insight.
Tags : enterprise resource planning, erp, efficiency, operating costs, standardization, automation, business management
     Sage
By: BlueCat     Published Date: Aug 20, 2013
To enable always-on application access and business connectivity, you need a rock-solid network foundation. The increasingly complex, dynamic and fluid relationship between networks and devices requires a new approach to IP Address Management (IPAM) – one that unifies mobile security, address management, automation and self-service to provide actionable network intelligence and a broad span of control. This paper discusses the critical role of IPAM in providing a smarter way to connect mobile devices, applications, virtual environments and clouds.
Tags : device management, ipam, ip address management, ip management, dns management, dhcp management, network security, network management
     BlueCat
By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
     HP - Enterprise
By: F5 Networks Inc     Published Date: Aug 13, 2013
While the promises of reduced costs and greater flexibility are driving companies to the cloud, these benefits can be negated by new management and processes which are often manual and disconnected from existing systems. This white paper explores strategies that enables IT departments to embrace the shift to being a services-based organization without relinquishing the control necessary to ensure the security, performance, and reliable delivery of applications.
Tags : cloud, security, performance, reliable delivery
     F5 Networks Inc
By: SAP Inc.     Published Date: Jul 28, 2009
Learn how core corporate processes can help your company meet financial objectives and mitigate risk in troubled economic times.
Tags : sap, lean, lean enterprise, three-tierd, operations, lehman, costs, operations
     SAP Inc.
By: Okta     Published Date: Oct 12, 2010
This white paper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : okta, identity and access management, saas applications, iam, password fatigue, compliance, application integration, identity management
     Okta
By: Okta     Published Date: Jan 30, 2013
This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : top 8, access management, challenges, saas applications, okta
     Okta
By: CDW-Apple     Published Date: Dec 11, 2012
Simplify management, strengthen security, and improve productivity with managed mobile applications.
Tags : mobile applications, business mobile applications, application management, mobile it integration, mobile it
     CDW-Apple
By: Enterprise Mobile     Published Date: Jul 09, 2013
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management
     Enterprise Mobile
By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content – effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a “mobile first” strategy that manages and secures both mobile apps and content.
Tags : box, mobile first, securing information, mobile device management solutions, applications, enable management
     Box
By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : software, vulnerability, intelligence, data, statistics, application, attacks, action strategy
     Flexera
By: AWS     Published Date: Aug 06, 2018
Learn more Salesforce and Amazon Web Services at http://amzn.to/2zhcn1v. Building and releasing cutting-edge applications quickly can be difficult when you lack proper tooling and integrated customer data. Salesforce Heroku delivers a cloud-native, developer-friendly platform that streamlines application development by integrating formerly siloed customer data and removing the burden of infrastructure management, allowing developers to focus their attention solely on creating customer-centric applications. Join the upcoming webinar to hear how the Financial Times builds customer-driven applications with faster cycle times with Heroku and AWS.
Tags : 
     AWS
By: VMware     Published Date: Sep 06, 2017
"Today’s IT organizations simply cannot afford to continue to manage the end user environment with an out-of-date PC-centric approach to systems management. The cloud, mobility and multiplatform environments render that approach ineffective. It’s time to take another look at virtual application and desktop virtualization technologies. Download this whitepaper to look at VMware Horizon, the most complete solution for delivering, managing and protecting Windows desktops, applications and online services across devices, locations, media and connections, making it ideal for systems management transformation. "
Tags : 
     VMware
By: VMware     Published Date: Sep 06, 2017
"By implementing the VMware App Volumes™ application management solution, OGL built a multitenant VDI environment that delivers an extensive range of applications to customers in real time, with full application functionality on any device, while also reducing OpEx and CapEx. Download this case study to learn how OGL Computer addressed these issues and more with VMware App Volumes: • Scale VDI service for more customers and applications. • Reduce expenses of Citrix VDI solution delivery. • Deliver and manage applications dynamically, in real time. • Give users desktop access on any Internet-connected device. "
Tags : 
     VMware
By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
     OKTA
By: Arcserve     Published Date: Jul 26, 2010
Business is driving IT operations management to become increasingly application-centric. At the same time, applications are becoming more difficult to manage. How vendors respond to the application performance monitoring challenge will have a profound impact on their overall market positions.
Tags : ca technologies, magic quadrant, application performance monitoring, it operations management, apm
     Arcserve
By: Arcserve     Published Date: Jul 26, 2010
Using the CA Wily Application Performance Management (APM) solution consisting of CA Wily Introscope® and CA Wily Customer Experience Manager™, JN Data better manages Web applications through faster diagnosis of problem root causes in its customers' heterogeneous environments.
Tags : ca technologies, jn data, web application management, ca wily, application performance management, apm, customer experience manager, virtual server network
     Arcserve
By: Arcserve     Published Date: Jul 26, 2010
Adopting an effective application performance management strategy is a critical step in managing complex Web revenue and generating mission critical applications to deliver a high-quality end-user experience.
Tags : ca technologies, performance optimization, web application, application performance management, apm, customer experience
     Arcserve
By: Tact     Published Date: Sep 06, 2016
Did you know that sales reps typically waste up to 16 hours per week on non-selling tasks? If your sales team is spending too much time on non-selling tasks, logging sales activities to Salesforce, hunting for customer information and documents, or copy-pasting data between separate systems, they might resist the rise of mobile CRM solutions like Salesforce1. However, it’s important to figure out how to enable these teams in the field, as 55% of salespeople will access sales applications exclusively through smartphones or tablets by the end of 2016. It’s not surprising that salespeople will increase their use of mobile apps 125% from 2015-2017. In this whitepaper from Tact, you’ll learn 1) common challenges facing field sales teams, 2) a framework for thinking about mobile sales productivity, 3) essential characteristics for evaluating mobile sales solutions, and 4) key trends in mobile sales.
Tags : salesforce, salesforce.com, crm, sales productivity, sales enablement, salesforce adoption, crm adoption, sales management
     Tact
By: Amazon Web Services     Published Date: Sep 05, 2018
Today’s businesses generate staggering amounts of data, and learning to get the most value from that data is paramount to success. Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on-demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Amazon Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. Organizations choose Amazon Redshift for its affordability, flexibility, and powerful feature set: • Enterprise-class relational database query and management system • Supports client connections with many types of applications, including business intelligence (BI), reporting, data, and analytics tools • Execute analytic queries in order to retrieve, compare, and evaluate large amounts of data in multiple-stage operations
Tags : 
     Amazon Web Services
By: Adaptive Growth     Published Date: Feb 25, 2008
In what practical ways – if any – is ERP implementation project success different from the absence of failure? Both casual and thorough analysis of ERP failure agree on several interesting points.
Tags : erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
     Adaptive Growth
By: Adaptive Growth     Published Date: Mar 12, 2008
ERP system acquisition projects are rarely deemed to fail.  All the well-advertised failures come later, during implementation and afterward.  Nevertheless, the seeds of these failures are invariably planted in the earliest stages of ERP acquisition planning.
Tags : erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
     Adaptive Growth
By: Adaptive Growth     Published Date: Mar 12, 2008
ERP implementations fail – when they do – because implementation projects allow a few well-known risks to go unmanaged. These risks go unmanaged because the control of results slips from buyer to seller.  It doesn’t have to work that way.
Tags : erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
     Adaptive Growth
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics