RSS feed Get our RSS feed

News by Topic

aditi

Results 176 - 200 of 1518Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
In dem Maße, in dem Unternehmen ihre On-Premise-Daten und -Anwendungsfunktionen für Partnerunternehmen, das Internet, mobile Anwendungen, intelligente Geräte und die Cloud zugänglich machen, verschwimmen branchenübergreifend die Grenzen des traditionellen Unternehmens. Die Grundlage dieses neuen, offenen Unternehmens sind APIs (Anwendungsprogrammierschnittstellen), denn damit können Unternehmen die vorhandenen Informationen unternehmensübergreifend für mehrere Zwecke auf einmal nutzen.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Sep 25, 2017
Despite talented IT teams and years of head start in both architectural and development work, it is still difficult to respond to these challenges using traditional development patterns centered around monolithic software applications. It’s simply impossible to get to market quickly when applications need to be maintained, modified and scaled as a single entity by a large, heavily inter-dependent team.
Tags : scaling, messaging, communication, autonomously, decentralized, automated, ca technologies
     CA Technologies
By: CA Technologies     Published Date: Sep 25, 2017
These challenges stem from an increased focus on agility and scale for building modern applications—and traditional application development methodology cannot support this environment. CA Technologies has expanded full lifecycle API management to include microservices—an integration enabling the best of breeds to work together to provide the platform for modern architectures and a secure environment for agility and scale. CA enables enterprises to use best practices and industry–leading technology to accelerate and make the process of architecture modernization more practical.
Tags : api, microservices, digital transformation, performance management, enterprise, developers, ca technologies
     CA Technologies
By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     CA Technologies
By: CA Technologies     Published Date: Sep 25, 2017
Several years into the app economy, business has changed. Accelerating product cycles and competitive threats now demand continuous planning. Change is constant and managing it is more important than ever. As a result, companies that for years have taken a traditional approach to managing initiatives are moving rapidly to implement agile business practices. And they’re seeing results, in the form of improved quality, faster delivery of value, reduced development costs and increased customer satisfaction. But this transition also creates new challenges and responsibilities for the project management office (PMO). In fact, the success of the transformation often hinges on the PMO’s ability to expand the underlying concepts of the agile development methodology into a companywide ethos¬—a concept known as business agility.
Tags : decision making, strategically, tools, pmo, entrepreneurial spirit, business, ca technologies
     CA Technologies
By: CA Technologies EMEA     Published Date: Aug 07, 2017
Software delivery processes and systems, and the people involved with them, are under increasing pressure. Sometimes it’s digital transformation, other times it’s simply the challenge of keeping up with the demands created by ever more dynamic markets and an escalating pace of change. None of this is news, but is does provide an important backdrop to the discussion of how software delivery needs to evolve, especially given that traditional methods and approaches were never designed to deal with the fastmoving and unpredictable environment you are probably working in today.
Tags : delivery, testing, software development, integration, business solutions, ca technologies, continuous testing, testing effort
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Aug 07, 2017
Continuous Delivery has become somewhat of a buzzword in the software development world. As such, numerous vendors promise that they can make it a reality, offering their tools as a remedy to the traditional causes of project delays and failure. They suggest that by adopting them, organizations can continually innovate and deliver quality software on time, and within budget.
Tags : data management, data system, enterprise management, continuous testing, testing effort, service virtualisation, delivery ecosystem
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Oct 23, 2017
Pour dynamiser le marché ou rester compétitives, les entreprises doivent livrer leurs produits logiciels plus rapidement que jamais. Les méthodes traditionnelles d’assurance qualité ne sont cependant pas en mesure de supporter cette cadence soutenue. Bien qu’ils aient aidé les organisations à améliorer la qualité du code, les mécanismes d’intégration continue ne prennent pas en charge les tests de bout en bout à l’échelle du cycle de vie du code.
Tags : continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Apr 10, 2018
Speed and agility matter. Businesses are being disrupted every day by digital upstarts that find ways to address new market requirements before the more established companies can respond. Despite talented IT teams and years of head start in both architectural and development work, it is still difficult to respond to these challenges using traditional development patterns centered around monolithic software applications. It’s simply impossible to get to market quickly when applications need to be maintained, modified and scaled as a single entity by a large, heavily inter-dependent team. From this need has arisen the microservices paradigm: a set of patterns for software architecture, development, deployment and culture that focus on speed and agility. From small, independent services and teams to automated deployment to fault tolerance and resiliency, these patterns help accelerate time to market.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nouveau modèle de sécurité qui mérite d’être étudié... et reproduit. Traditionnellement, la sécurité des entreprises a toujours été fondée sur une stratégie de « forteresse », chargée de sécuriser les terminaux utilisateur et de former une barrière de protection autour du réseau. Aujourd’hui, cette stratégie n’est pas en mesure de supporter ou de sécuriser l’utilisation des périphériques mobiles et des fonctionnalités SaaS, qui existent en-dehors de la forteresse. Les responsables de la sécurité des informations (CISO, Chief Information Security Officer) sont donc tenus de trouver de nouvelles solutions à même de sécuriser ces technologies actuelles, et de s’adapter aux menaces et aux besoins métier en évolution.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Apr 10, 2018
La vitesse et l’agilité comptent. Les entreprises sont tous les jours concurrencées par de jeunes start-up numériques qui réussissent à répondre aux nouvelles demandes du marché avant les sociétés bien établies. Malgré des équipes informatiques talentueuses et plusieurs années d’avance dans les domaines de l’architecture et du développement, les approches traditionnelles de développement centrées sur des applications monolithiques ne permettent pas toujours de relever facilement ces défis. Il est tout simplement impossible de mettre rapidement sur le marché des applications qui doivent être maintenues, modifiées et mises à l’échelle sous la forme d’une entité unique par une équipe nombreuse et fortement interdépendante.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 25, 2018
The APM market is one of the largest subsegments of the IT operations management market, with 2016 revenue of approximately $3.7 billion and a growth rate exceeding 18% over the prior year. Given these statistics, it is no surprise that Gartner observes continuing investment. Interestingly, while Gartner has observed many new startups appearing on the radar screen, we've also seen large software organizations such as CA Technologies, IBM, Oracle and Microsoft (re)investing at the same time. Other non-APM companies are also expressing potential interest in the market — almost all of the current APM suite providers expect to see companies like Google and Amazon boost their primarily infrastructure monitoring capabilities with increased support for application visibility. Yet these (and other large) cloud companies will pose another challenge for the traditional APM players — the battle for talent acquisition. There is some concern within the APM market that highly skilled individuals may
Tags : ca technologies, monitoring, programs, applications
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 11, 2018
Welcome to the very first edition of Modern Monitoring, a collection of articles and insights designed to help IT operations and DevOps professionals deliver more resilient, supportable and high-performance IT services. It’s perhaps a sign of the times that monitoring as a discipline is receiving much more attention within the biz tech community. And deservedly so. The new distributed application architectures being built, together with the dizzying pace of software delivery, demand new approaches in what’s traditionally been perceived as a “keeping the lights on” IT practice. Of course, there’s no better way to consider monitoring than to draw parallels with other practices in related fields. It’s why we’ve included a couple of pieces with a distinct aeronautical flavor that discuss importance of instrumentation and contextual awareness.
Tags : 
     CA Technologies EMEA
By: CA WA     Published Date: May 12, 2008
This IDC White Paper presents an overview of key concerns driving IT management and how they translate into needs that can be addressed through modern approaches to job scheduling and workload automation. The paper traces evolutionary trends in job scheduling software, which is growing from traditional batch job schedulers to cross-platform and event-driven capabilities. It also explores the role of job schedulers in providing automation capabilities.
Tags : roi, soa, job scheduling, ca wa, workload automation
     CA WA
By: Caminosoft     Published Date: Aug 21, 2009
Companies today are faced with managing an ever-increasing amount of data. The traditional solution to this problem was to increase the amount of space on a server by adding more hard drives. This strategy would be similar to a person continually building additional rooms onto a house in order to have more space in which to store all his or her belongings, but without any thought as to where items were being stored.
Tags : caminosoft, database management, data center, data management, storage, data warehousing, hsm, netware
     Caminosoft
By: Canon Business Process Services     Published Date: Aug 27, 2013
Managed print services have been proven to drive cost savings as much as 10-30 percent over traditional approaches as well as increase efficiency, security and sustainability across your business.
Tags : print management, business process outsourcing, business performance management, managed print services, business imaging, document and print management, business management
     Canon Business Process Services
By: Carbon Black     Published Date: Oct 10, 2018
According to ESG Research, 65% of organizations believe the skill level of their security team could be improved, and 48% are using more than 25 security products. This leads to more overworked staff and, ultimately, less effective security. Download the Replace AV Buyer's Guide to learn what your team should look for when replacing legacy AV with an endpoint security solution that is easy to manage and deploy, and can cost-effectively protect your growing business. In this buyer's guide you'll find: A core evaluation checklist for replacing AV. Guiding questions to frame your evaluation to replace AV. How to run a test of next-generation AV solutions. Learn more about replacing your traditional AV in the Replace AV Buyer's Guide.
Tags : 
     Carbon Black
By: CarbonBlack     Published Date: Mar 16, 2016
Today’s security battle is being waged on the endpoint, and traditional tools are ineffective against today’s sophisticated attackers. Every analyst firm is producing research about Next-Generation Endpoint Security (NGES), and they all reach the same conclusion: every organization needs to upgrade their endpoint security to a modern solution. Download this white paper to learn more.
Tags : next generation, endpoint security, nges, next generation endpoint security, security, security solutions
     CarbonBlack
By: CarbonBlack     Published Date: Oct 26, 2016
Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.
Tags : security
     CarbonBlack
By: CarbonBlack     Published Date: Oct 26, 2016
It’s become increasingly clear that traditional antivirus is no longer sufficient in stopping advanced threats such as ransomware. Companies need a next-generation antivirus (NGAV) solution to successfully stop modern attacks. Hear what Trevor Albrecht from DraftKings has to say about his experience replacing AV with NGAV.
Tags : security
     CarbonBlack
By: CarbonBlack     Published Date: Nov 01, 2016
A SANS Guide to Evaluating Next-Generation Antivirus Rather than dying, antivirus is actually growing up. Today, organizations look to spend their antivirus budget on replacing current solutions with next-generation antivirus (NGAV) platforms that can stop modern attacks, not just known malware.
Tags : carbonblack, sans, antivirus, security
     CarbonBlack
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics