RSS feed Get our RSS feed

News by Topic

web environment

Results 26 - 50 of 139Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Feb 03, 2010
This white paper is intended to provide service providers with IBM's point of view on the power of collaboration in a Web 2.0 environment and to introduce a new IBM solution that can help telecoms to use collaboration as a tool for enabling innovation.
Tags : ibm ep, empowering people, service provider, collaboration, web 2.0 environment, innovation factory, telecommunication
     IBM
By: DigiCert     Published Date: Jun 19, 2018
No organization is safe from cyber attacks. Organized crime drives the rapid growth and sophisticated evolution of advanced threats that put your entire website ecosystem at risk. And the threat landscape will only grow more dangerous as attackers create more innovative and damaging ways to profit from their efforts. That’s why you need Complete Website Security to harmonize and fortify your website security. Across the board, we deliver best-in-class solutions for securing your website environment. Secure your websites. Protect your business.
Tags : 
     DigiCert
By: IBM     Published Date: Oct 24, 2013
Hear real world examples from service virtualization and mainframe experts about the way service virtualization can enable continuous integration to increase quality, reduce cost, and decrease project risk.
Tags : ibm webcast, continuous integration, test virtualization, test automation, execution environment, collaborative development, simplified testing, v2v migrations
     IBM
By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Nov 22, 2018
Modern marketers leverage insights on how consumers browse goods or make a purchase, to design smarter cross-channel programs and create relevant campaigns. Brands that leverage cross-channel marketing see a 91% customer retention rate. You can do this too. Learn how other marketers in ASEAN are leveraging cross-channel to create real business impact. Join this webinar and hear from Charlie Loo, an award-winning marketer and our Principal Consultant on: • five practical ways you can use cross-channel marketing • the importance of cross-channel in a mobile first environment • the difference between multi-channel and cross-channel
Tags : 
     Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017
By: ESET, LLC.     Published Date: May 16, 2011
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.
Tags : eset, cybersecurity webinar, security manager, it security, crm solutions/software, customer experience/engagement, reputation monitoring, usability
     ESET, LLC.
By: IBM     Published Date: May 17, 2016
Join the webcast to learn how you can simplify and automate your app environment deployment, and watch a brief demo on how this is put into practice in your organization.
Tags : ibm, middleware, apps, applications, hybrid, cloud
     IBM
By: Oath     Published Date: Nov 06, 2017
42% of consumers make the internet their first stop for healthcare information, ranking the web second to actual physicians. Following this trend, healthcare marketers have increased their investment in a variety of digital advertising channels such as native, video, mobile, content and more in order to better educate and inspire healthcare consumers. But whatever digital channels healthcare marketers choose, the environment matters. Consumers make snap judgments about brands based on adjacency. Over two-thirds of your audience will feel less favorably towards a brand if its placed next to untrustworthy, offensive, or low-quality content. Fortunately for brands the flip side is also true, which is why it’s imperative that you guarantee ad placements that share digital space with premium content. With Oath’s reputation as a trusted publisher, healthcare brands can experience peace of mind knowing their consumers will make positive associations that will increase brand loyalty.
Tags : healthcare, physicians, digital, advertising
     Oath
By: Xangati     Published Date: May 20, 2015
The goal for organizations with eCommerce Web sites, application developers and IT infrastructure managers is to deliver a successful end-user experience. Xangati can help you scale environment and succeed in reaching that goal.
Tags : e-commerce, e-commerce web applications, citrix netscaler adc, web server, web application infrastructure, it administrator, it infrastructure, web application performance
     Xangati
By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
     AWS
By: Riverbed     Published Date: Nov 02, 2016
In its quest to increase agility and reliability, IT is adopting cloud services and related technologies like PaaS, micro-services, and containers to rapidly deliver applications that scale to real-world conditions. Application topology is often transient and unpredictably interrelated with countless other applications and services. This poses a serious challenge for performance monitoring since most techniques are still rooted to tiers or servers. During this webinar, discover: • The benefits and challenges of deploying apps across hybrid environments • Techniques that expose major, but often undiagnosed problems • Real-world examples where major performance issues were resolved"
Tags : 
     Riverbed
By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : av defense, blue coat, web environment
     Blue Coat Systems
By: IBM     Published Date: Jun 22, 2010
Learn how the IBM WebSphere Portal can help extend the value of your System z platform to the web. Download this free white paper from IBM today!
Tags : ibm websphere, system z, mainframe, ibm, web 2.0
     IBM
By: Riverbed     Published Date: Oct 17, 2012
Microsoft SharePoint is a collaboration tool used in enterprises. Read this white paper to learn about the optimizing a web-based SharePoint environment and how to address the requirements across the technology stack to deliver ROI for the business.
Tags : microsoft sharepoint, enterprise applications, connectivity, it infrastructure
     Riverbed
By: Brainshark     Published Date: Oct 16, 2013
Traditional ways of talking to customers, partners, and employees—memos, phone calls, newsletters—are being replaced by web-based interactive and social communication tools. Of those surveyed, 88% said that mobile access to social communication or collaboration tools was either important or very important. This whitepaper examines how companies can leverage Mobile, Social Enterprise, and video to create an enriched environment that delivers important communications and fosters active engagement.
Tags : video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video
     Brainshark
By: NetApp     Published Date: Dec 12, 2013
This informative paper explores a partnership that extends how you can leverage the scalability and reliability of Amazon Web Services—in its own right, as backup, as a test/dev environment, or as an innovative extension of your  on premises IT infrastructure. Read on to learn more.
Tags : private cloud, virtualization, technology, best practices, enterprise cloud, netapp, cloud deployments, storage
     NetApp
By: Akamai Technologies     Published Date: Mar 19, 2019
Whether you're focused on public-facing websites or your company's assets and users, as someone who cares about digital security, your life is dominated by these trends that characterize the state of all things security in 2019: Attacks are growing, evolving, and becoming more sophisticated. And the types of attacks we see are proliferating. How do you protect your crown jewels when the castle has no walls? The answer is at the edge. When you deploy security at the edge, you are protecting your changing assets closer to the attack itself and moving digital experiences closer to users. In essence, you're deploying a single pane of glass, an extension of your infrastructure, that sits between you - your users, your digital experiences - and the always-changing nature of today's digital environment.
Tags : 
     Akamai Technologies
By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
     Symantec
By: DigiCert     Published Date: Jun 19, 2018
Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. Website security must be evolved in line with these growing threats and challenges. Download this whitepaper to find out more about how Digicert can help.
Tags : 
     DigiCert
By: Silver Peak     Published Date: Oct 28, 2013
Enterprises have long been battling the inherent performance limitations of Wide Area Networks (WANs) when delivering applications to remote offices. Caching emerged in the 1990’s as a potential way of addressing this problem, accelerating the performance of specific applications, such as web services, while reducing overall WAN traffic. While caching achieved reasonable success for a few short years, the market for these point products ultimately subsided as a result of several operational and functional limitations. Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. The result is a complete solution for improved application delivery across a distributed enterprise environment.
Tags : silver peak, network memory, application caching, wan, caching
     Silver Peak
By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Visibility and control of endpoint devices are critical to securely manage your workloads in the Amazon Web Services (AWS) environment. Ideally, teams want to gain real-time visibility and control without having to deploy an additional agent onto the Amazon Elastic Compute Cloud (Amazon EC2) instance. They want a tool that allows them to span physical, virtual and cloud environments of their existing on-premises endpoints and Amazon EC2 instances. CrowdStrike® Falcon Discover™ platform allows you to identify unauthorized systems and applications in real time and quickly remediate issues, ensuring the integrity of your data. Download this datasheet to learn the key benefits of cloud-native CrowdStrike Falcon Discover, including: • Visibility and control over their endpoints whether they are running on-premises or as Amazon EC2 instances • The ability to scale easily to match the dynamic nature of Amazon EC2 instances "
Tags : 
     AWS - ROI DNA
By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : web analytics, frost & sullivan, bot management, botnet
     Akamai Technologies
By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
     Entrust Datacard
By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
     Forcepoint
By: Dell Windows Server     Published Date: Jan 16, 2009
The Windows Server 2008 OS promises to supercharge enterprise computing by providing a solid foundation to support critical workloads and deliver rich Web-based experiences—all in an exceptionally secure, industry-standard operating environment. Dell smoothes the way by providing business-ready platforms optimized for Windows Server 2008 together with Structured Solution Designs to make the migration flexible, simple, and green.
Tags : dell, microsoft windows server 2008, structured solution designs, windows migration
     Dell Windows Server
By: Optimizely     Published Date: Apr 06, 2018
We live in the age of the consumer. Across touchpoints, customer expectations for digital interactions and brand experiences are evolving. Today, it is critical for organizations to deliver high-performing, personalized encounters across the customer journey. To drive innovation and stay competitive, organizations need to reorient towards the customer—which means being able to understand their needs, adapt to their expectations, and quickly make improvements. But pinpointing where to make iterations across your tactics and digital entities like websites and landing pages can be a difficult task—especially in today’s multi-touch environment.
Tags : 
     Optimizely
Start   Previous    1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics