app cloud

Results 226 - 250 of 1851Sort Results By: Published Date | Title | Company Name

Deep Packet Inspection for Wireless Access Points: Analyze. Control. Secure.

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe
    
Rohde & Schwarz Cybersecurity

Barracuda Firewalls Rely on DPI engine R&S Pace 2

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity

Cloud Accelerates Linux Adoption

Published By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
    
Oracle APAC

Protect Your Data The Way Banks Protect Your Money

Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics
    
CA Technologies

Using Threat Analytics To Protect Privileged Access And Prevent Breaches

Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
CA Technologies

Application Container Cloud with Java SE and Node

Published By: Oracle     Published Date: Mar 06, 2017
Get the choice of either Oracle Java SE Advanced, including Flight Recorder for production monitoring, or Node.js running on enterprise-grade cloud infrastructure.
Tags : 
    
Oracle

Insiders are Still the Weakest Link in your Data Security Chain

Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications, mobile computing, mobile data systems, wireless application software
    
Absolute Software

Safe Adoption of Cloud Applications: Solution Guide

Published By: Symantec     Published Date: Jul 09, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud applications, swgs, secure web gateway's, saas
    
Symantec

How Hybrid IT can support Enterprise Mobility

Published By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : 
enterprise mobility, mobile application security, it management, vulnerability management, mobile device management
    
Adobe

Das richtige Hybrid-Modell zur Steigerung der Mobilität von Mitarbeitern

Published By: Adobe     Published Date: Apr 25, 2016
Im vorliegenden Paper beschäftigen wir uns mit der IT-Umgebung. Wie können Sie einfach zu verwaltende Dokumentenlösungen implementieren, die Desktop-Anwendungen, Apps und die Cloud aufeinander abstimmen und so den Anforderungen der modernen Arbeitswelt gerecht werden?
Tags : 
    
Adobe

Gérer la mobilité d’entreprise par un modèle informatique hybride

Published By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : 
enterprise mobility, mobile application security, it management, vulnerability management, mobile device management
    
Adobe

SECURITY CONCERNS OVERCOME: CUSTOMERS MOVING TO SAAS

Published By: Adobe     Published Date: Oct 05, 2016
The cloud has been the hottest topic in information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.
Tags : 
security, security application, cloud, cloud computing, cloud security, application security, security management, security policies
    
Adobe

Transform business processes with electronic and digital signature solutions from Adobe

Published By: Adobe     Published Date: Mar 21, 2017
This paper explores electronic and digital signatures and shows how Adobe solutions let you work with either approach, or a combination of the two. Adobe Sign is an Adobe Document Cloud solution that manages signature processes from end to end, integrates easily with existing business processes and provides a quick return on investment.
Tags : 
    
Adobe

Fine Tune IT Performance-Accelerate Applications & Manage Performance Across The Entire Network

Published By: Riverbed     Published Date: Jul 17, 2013
Riverbed IT performance solutions allow you to align IT with the business objectives, accelerate applications and manage performance across the entire corporate network - at the data center, in the cloud, at branch offices, and for mobile workers. Businesses run faster and more efficiently, saving time and cutting the cost of infrastructure.
Tags : 
it performance, riverbed it, riverbed, network, infrastructure, local area networking, monitoring, network architecture
    
Riverbed

Cloud Guide: How Cloud and Mobile are Perfect Partners for UC

Published By: Avaya     Published Date: Jan 23, 2015
This White Paper provides information on how mobile, cloud and UC make perfect business sense. When everyone works together, things get done. Decisions are made faster, actions are taken effectively, and results improve. That’s why tomorrow’s market leaders are acting now to harness the power of Unified Communications and Collaboration tools and unleash the potential of their business.
Tags : 
unified communications, managing uc, uc becoming more powerful and useful, mobile computing, mobile data systems, application integration, business integration, business intelligence
    
Avaya

Tapping Cloud-Based ERP Solutions to Capture Global Business Opportunities

Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jun 10, 2015
In this paper, we consider the distinct financial and operational challenges that businesses face when launching international operations, and examine the value that global, real-time financial reporting and consolidation solutions can deliver. We discuss the criteria that companies should use to evaluate solutions.
Tags : 
business management software, cloud erp, erp, business software, accounting software, business accounting software, cloud financials, small business software
    
Netsuite DWASF Leads Display Q1 2015

The New Shopping Journey – Welcome to Distributed Commerce

Published By: Salesforce Commerce Cloud     Published Date: Sep 29, 2016
The concept of distributed commerce, the ability for consumers to buy on any Internet-connected device or application, could have a profound impact on retail. As a result, integrating new means of engagement and commerce – quickly and at scale – is vital. In this whitepaper from Salesforce Commerce Cloud, formerly Demandware, you’ll see how every touchpoint is a transaction and how retailers can adapt. Download now!
Tags : 
demandware, commerce, retail, shopping, shopping journey, distributed commerce, knowledge management, business technology
    
Salesforce Commerce Cloud

Colt Telecommunications

Published By: SolidFire_NetApp     Published Date: May 10, 2016
Founded in 1992 as a provider of integrated network, voice and data centre solutions, Colt’s business today has grown to encompass a wide range of IT services, spanning enterprise application hosting, business critical cloud and end-user computing solutions. Colt has 29 data centre locations supporting thousands of customers across 28 countries in Europe and Asia, including Swiss International Airlines, Shurgard, Berenberg, and Jaguar Land Rover. Colt’s award-winning solution portfolio is based on end-to-end data centre, network and IT services capabilities; its aim is to help its customers compete and win in their markets without being held back by hardware, licensing and resource limitations.
Tags : 
network management, best practices, network optimization, network applications, application management, technology, telecommunications, network architecture
    
SolidFire_NetApp

Getting it Right OpenStack Private Cloud Storage

Published By: SolidFire_NetApp     Published Date: May 10, 2016
So you’ve chosen OpenStack for your cloud infrastructure. Now another big decision needs to be made: Block storage or object storage? OpenStack has sub-projects that deliver both block (Cinder) and object (Swift) storage. A variety of performance-focused primary storage and optimized secondary storage solutions are on the market, and they provide flexible, highly scalable storage services for OpenStack.
Tags : 
cloud management, cloud services, cloud management, cloud application, cloud computing, infrastructure, technology, storage
    
SolidFire_NetApp

The Business Case for IT Automation

Published By: Puppet     Published Date: Mar 09, 2017
System administrators and other IT practitioners spend as much as 50% of their time on routine, repetitive tasks. Does the following apply to your organization? • You go from one server to the next, installing the same package on all of them. It works nine times out of 10, but the tenth time causes a failure ... and you can't identify what went wrong. • You can't scale. When the business wants to move to the cloud, or asks for faster provisioning of development and test environments, you only have so many hours in the day — and you can't meet everyone's needs. • You don't have time to get to the work that matters. You spend too much time on routine system management, and can't prepare for the projects that will bring real business value to your team — and customers. With growing demands from all corners of your organization, you simply can't keep doing it all manually. Download this paper to learn how you can benefit from automation, and how IT infrastructure can become a strategic ass
Tags : 
    
Puppet

Geek Guide: Cloud Scale Automation

Published By: Puppet     Published Date: Mar 13, 2017
Have you started moving to the cloud? Nearly 70 percent of organizations have at least one application living in the cloud already, and cloud adoption is growing fast. That's because organizations recognize the cloud is a great way to make IT more agile and helpful to the business. Download Cloud-Scale Automation with Puppet, and learn how you can ease the transition to cloud, gaining the agility your organization needs without adding hours of management time or unnecessary risk. You really can use cloud infrastructure as easily as you use on-prem, and keep it as secure as on-prem, too. You’ll learn how to: • Automate your cloud resources and manage infrastructure at scale. • Get started with Puppet on both Linux and Windows machines. • Make Puppet the foundation of your DevOps efforts, regardless of where you choose to deploy.
Tags : 
    
Puppet

The Ultimate Guide to Amazon EC2 Reserved Instances

Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Amazon EC2 Reserved Instances can appear complicated, but finding a solution that best suits your company doesn't mean becoming an expert yourself; you just need to know how to approach Reserved Instances and where they can make the biggest impact. This free guide delivers a collection of proven best practices to help you successfully manage Amazon EC2 Reserved Instances. The benefits include: A breakdown of reservation types and offerings, including Convertible Reserved Instances How to calculate the payback period How to modify and exchange existing reservations to match cloud usage over time How to maximise savings with automated RI management and optimisation
Tags : 
    
CloudHealth by VMware

Comparing Security Across The Three Main Cloud Providers

Published By: CloudHealth by VMware     Published Date: Aug 26, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware

Why Workday?

Published By: Workday     Published Date: Oct 17, 2017
Every day, hundreds of organizations communicate, collaborate, and drive their business forward with Workday cloud applications. Our customers say they gain unprecedented visibility into their workforce, improve overall productivity, and get the right people working on the most important initiatives—things they could not achieve with legacy systems. And all of this is accomplished with applications that are intuitive and easy to use. Our customers are unique and have different goals, challenges, and priorities. What they share in common is that they all decided to move beyond legacy systems to the cloud with Workday. So, why Workday?
Tags : 
    
Workday

CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers

Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.