RSS feed Get our RSS feed

News by Topic

web service

Results 701 - 725 of 752Sort Results By: Published Date | Title | Company Name
By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale
     VeriSign Incorp.
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
     Ping Identity
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
     Ping Identity
By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
     Ping Identity
By: VeriSign Incorp.     Published Date: Apr 15, 2009
Get your guide today and discover a smart, new strategy for managing SSL security across your network. With VeriSign's Managed PKI for SSL Web-based service, you can centrally manage all of your SSL Certificates with a simple, Web-based interface.
Tags : mpki for ssl, managed security solutions, ssl, verisign, http protocol, secure sockets layer, public key infrastructure, certification-authority (root ca)
     VeriSign Incorp.
By: WebEx     Published Date: Apr 02, 2009
This document educates end-users and decision makers on Software-as-a-Service (SaaS), where it differs from traditional software, and what the key benefits are when deploying SaaS applications. In addition, this document also provides the reader with a comprehensive look at the Total Cost of Ownership (TCO) analysis any decision maker should complete before making a choice between a SaaS or a traditional software deployment.
Tags : webex, software-as-a-service, saas, saas applications, tco, total cost of ownership, traditional software deployment, break-even point
     WebEx
By: Trend Micro SaaS     Published Date: Apr 02, 2009
Gehostete (d. h. webbasierte) Lösungen für Messaging-Sicherheit finden bei Unternehmen aller Größen immer mehr Anklang. Einige haben sich bereits für gehostete Services entschieden, während andere sich langsam mit der Idee anfreunden und nun eher Services von Dritten zur Verwaltung ihrer Sicherheits-infrastruktur nutzen als noch vor einem Jahr. Entscheidungsträger erkennen gerade jetzt im Zuge der aktuellen Wirtschaftskrise, dass gehostete Lösungen für E-Mail-Sicherheit eine kostengünstige Alternative darstellen und gleichzeitig die Sicherheit erhöhen.
Tags : trend micro, messaging-sicherheit, lösungen, osterman research, messaging-services, prozentsatz
     Trend Micro SaaS
By: Intuit, Inc     Published Date: Mar 19, 2009
No matter what role you have within an organization – be it engineer, salesperson, consultant, marketer, or business owner – you’ve acquired a second responsibility: project manager. But managing marketing projects has become more challenging than ever. Why? The work environment has expanded across departments, across job roles – and even across continents. To achieve organizational objectives, cross-functional teams form, collaborate, dissolve and re-form to tackle precisely defined projects and fulfill specific deliverables within carefully controlled deadlines and budget demands. Learn more today!
Tags : intuit, project management, project team productivity, collaboration, communication, spreadsheet shuffle, centralizing project information, packaged vs. custom software
     Intuit, Inc
By: Intuit Inc.     Published Date: Mar 19, 2009
No matter what role you have within an organization – be it engineer, salesperson, consultant, marketer, or business owner – you’ve acquired a second responsibility: project manager. But managing projects has become more challenging than ever. Why? The work environment has expanded across departments, across job roles – and even across continents. To achieve organizational objectives, cross-functional teams form, collaborate, dissolve and re-form to tackle precisely defined projects and fulfill specific deliverables within carefully controlled deadlines and budget demands. Learn more today!
Tags : intuit, project management, project team productivity, collaboration, communication, spreadsheet shuffle, centralizing project information, packaged vs. custom software
     Intuit Inc.
By: Stratus Technologies     Published Date: Mar 10, 2009
Haitham Al-Beik, Product Development Engineer, highlights the key product attributes of Avance that deliver ease of use and other elements designed to improve an IT Administrator's world.
Tags : stratus, it administration, development engineer, mission critical, web services, disaster recovery, critical data, server unreachable
     Stratus Technologies
By: IBM     Published Date: Mar 04, 2009
The online customer experience, Web 2.0 and the consumerization of technology are driving online sales strategies, as well as the demand for site redesigns and upgrades. Use this Magic Quadrant during vendor evaluation and selection.
Tags : "ibm, ecommerce, web 2.0, magic quadrant, vendor evaluation, vendor selection, crm strategy, e-crm
     IBM
By: IBM     Published Date: Mar 04, 2009
Many of your customers prefer doing business with you online. They go to your Web sites to learn about your products and services, to find products and/or services that address their needs, to configure and price the products and/or service s that they’d like to buy, and to purchase those products and/or services. They also set up and manage accounts with you. When those customers are consumers, we call these activities B2C (business to consumer) ecommerce.
Tags : ibm, ibm websphere commerce, customer service, b2c, business to consumer, ecommerce, b2b, web-sphere commerce saas
     IBM
By: Trend Micro SaaS     Published Date: Feb 09, 2009
West Coast Labs performed a comparison test on a range of email solutions (appliances, software, and hosted service solutions) to measure their relative spam detection rates over a series of at least 100,000 genuine spam emails using West Coast Labs real-time spam feed.
Tags : saas, trend, trend micro, websense, barracuda, anti-spam, antispam, spam filter service
     Trend Micro SaaS
By: F5 Networks Inc     Published Date: Jan 22, 2009
The demand for (and benefits of) web-based interfaces combined with an increasingly mobile and distributed workforce has exposed inefficiencies inherent in the browser, the network and its protocols, and the data center. These inefficiencies create performance problems for applications that continue to be magnified by emerging technologies like Web 2.0 and SOA. This White Paper details how F5's approach to Application Delivery Networking eliminates the bottlenecks inherent in browsers, in the network, and in the data.
Tags : web acceleration 2.0., web-based interfaces, data center, soa, service-oriented architecture, application delivery networking
     F5 Networks Inc
By: The Planet     Published Date: Jan 05, 2009
With all the competitive challenges and technology demands faced by web-based SMBs today, the possibility of a capital-expense-free alternative for providing world-class IT systems and services is extremely viable. By offering enterprise-class IT systems and services for a monthly fee, managed hosting helps to level the playing field as well as improve the technical capabilities of businesses that until now could not afford to match their larger competitors. Learn more today!
Tags : the planet, managed hosting, it hosting, capex-free, enterprise-class it systems
     The Planet
By: Clarity Quest Marketing     Published Date: Dec 22, 2008
When looking into sending out press releases for your business, you might be overwhelmed with the options. In addition to traditional wires, there are many new web-based services. Choosing the right one for your business sometimes requires trial and error. The following press release wire service websites for the most part all provide a similar service, but they all have differences in how they present information, and how helpful they actually are.
Tags : clarity quest marketing, pr newswire, businesswire, prweb, marketwire, emailwire, interactive marketing
     Clarity Quest Marketing
By: Melissa Data     Published Date: Nov 18, 2008
Learn what a Web Service is and how it works, the advantages of using a Data Quality Web Service, the technology assessment for implementation, and several case studies (Saab and other real world case studies) to demonstrate real life successes.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: Intermedia     Published Date: Nov 10, 2008
This WebCast introduces Osterman Research who shows and overview of Exchange 2007 and it's growth in terms to help security issues faced by Financial Services and how Exchange 2007 addresses them. Focused on the messaging, Web and collaboration industries. There are also practice areas which include archiving, security, encryption, content management, etc...download to learn more!
Tags : intermedia, email security, exchange 2007, archiving, encryption, content management, security
     Intermedia
By: MessageLabs     Published Date: Sep 25, 2008
According to recent surveys, employee social networking is growing rapidly. Learn the pros and cons of employee social networking, from creating business development opportunities to just goofing off. Also, learn how social networking is raising new challenges for enterprise security, and the distinct advantages of implementing MessageLabs Web Services.
Tags : messagelabs, social networking, facebook, myspace, bebo, orkut, perfspot, friendster
     MessageLabs
By: ZSL Inc.     Published Date: Sep 25, 2008
The hotspot in the current IT world is optimized Web Services. Now the enterprises have started their vision towards next generation Web Services. This white paper gives information for the business managers and engineers in developing and deploying Web Services using Rational Application Developer (RAD) and WebSphere Application Server (WAS), respectively. This paper explains the process to:* create a Web Service and Web Server client* build security to that web service* deploy the web service in WebSphere application server
Tags : zsl, soap, java, wsdl, uddi, web service security, risk exposure, security
     ZSL Inc.
By: Breakout Solutions     Published Date: Sep 24, 2008
Breakout Solutions is pioneering the way in which organizations utilize Social Media to meet their online promotional objectives. Our proprietary video contest platform provides a turnkey solution for organizations that value interacting and communicating directly with their target market through social media. Web 2.0, has led to a more interactive and social landscape where content is no longer king, conversation is. Breakout Solutions can help your brand become a part of these conversations so that you have a better understanding of how others view your brand and utilize your products and services.
Tags : breakout solutions, promotional contest, branded promotion, videos, photos, audio, myspace, facebook
     Breakout Solutions
By: CA Mainframe     Published Date: Sep 12, 2008
Business and IT executives should not have to choose between their desire to innovate for future growth and the desire to avoid disrupting current operations. Enterprise innovation that embraces and extends existing infrastructure and applications is possible through modern software architectures such as web services and SOA – as long as those investments perform competitively when measured against alternative platforms and they are able to be modernized to participate in these architectures.
Tags : ca mainframe, mainframe, infrastructure, architecture, platforms
     CA Mainframe
By: IBM     Published Date: Aug 21, 2008
In highly competitive markets, technologies that save time and money earn top consideration. Until now, XML Web Services, often touted for their ability to create business value, has been left off the short list for implementation. In this case study you’ll see how RouteOne LLC redefined the credit application process for automobile dealers and their customers using XML Web Services technologies.
Tags : xml, web services, ibm, ibm mi, ibm grm
     IBM
By: KEMP Technologies     Published Date: Aug 04, 2008
Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These web-based applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
     KEMP Technologies
By: HP     Published Date: Jul 29, 2008
Join IDC and HP on this webcast about Mission Critical Services. Matt Healey of IDC provides insights on the adoption of consolidation, virtualization and Service Oriented Architecture as aggressive strategies to align IT more closely with business goals.
Tags : erp, mission critical, itsm, service management, soa, service-oriented, service oriented
     HP
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics