web app

Results 351 - 375 of 966Sort Results By: Published Date | Title | Company Name

How to Protect Your Buiness from the Coming Malware Storm

Published By: Webroot UK     Published Date: Feb 04, 2013
The Webroot solution provides customers with a layered approach to security including products for Web and email security, email archiving and endpoint security. Offerings can be implemented as an integrated suite or as individual point products.
Tags : 
solution, malware, email archiving, endpoint security, individual point products, web, business technology
    
Webroot UK

Taming the Complexity of Web-Scale IoT Applications

Published By: Dynatrace     Published Date: May 21, 2019
The Internet of Things (IoT) is exploding across every industry, everywhere, starting a new chapter in digital transformation. As new use-cases for IoT continue to emerge, the digital experiences they enable will become increasingly critical to business success, connecting all aspects of human society. Based on a global survey of 800 CIOs, this report examines the challenges organizations face as they begin to explore and deploy Internet of Things (IoT) use-cases and web-scale applications.
Tags : 
    
Dynatrace

IDC Analyst Report: A New Breed of Servers for Digital Transformation

Published By: IBM APAC     Published Date: Mar 19, 2018
IDC Analyst Report: A New Breed of Servers for Digital Transformation Most organizations today are on a digital transformation journey and a server infrastructure is a critical component of that journey. Read the IDC Analyst Report “A New Breed of Servers for Digital Transformation" to find out: • A roadmap for servers in three stages - from running simple stateless web applications to adopting open source DBMSs to cloud to predictive modeling • How you can take advantage of OpenPOWER-based infrastructure from a price/performance perspective • Ways to lower your IT spend and increase your workloads with minimal investment
Tags : 
    
IBM APAC

Study CIOs say Application Performance is Top Priority, End User is King

Published By: CA Service Assurance     Published Date: May 23, 2011
IDG Research Services recently conducted a study via the CIO Forum on LinkedIn. The results found that CIOs and IT leaders recognize the business impact of web application performance. It's all about the end user: ensuring customer satisfaction, increasing employee productivity, and lowering IT costs.
Tags : 
web application performance, cio, end user, idg research services, linkedin, it leaders, ca technologies, customer satisfaction
    
CA Service Assurance

Exceptional Application Experience - Delivering Exceptional Customer App Experience

Published By: CA Service Assurance     Published Date: May 08, 2011
While the rise of web-enabled applications and the zero latency customers expect from them has driven many enterprises to adopt performance management solutions, they are finding that basic understanding of how their overall user populations are being served is simply not enough.
Tags : 
application experience, application delivery, customer app experience, user satisfaction, application performance management, business activity monitoring, customer satisfaction, enterprise software
    
CA Service Assurance

Passing PCI Compliance Section 6.6: Code Reviews and Application Firewalls

Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise

Securing the Cloud

Published By: F5 Networks Inc     Published Date: Apr 18, 2012
Cloud computing has become another key resource for IT deployments, but securing applications and data in the cloud remains a concern. Learn strategies for keeping your most precious assets safe, no matter where they reside.
Tags : 
cloud computing, cloud security, protection data in the cloud, cloud data protection, cloud deployment, application protection in the cloud, authentication, aaa
    
F5 Networks Inc

Identity Management for Customer and Partner Portals

Published By: Okta     Published Date: Jul 05, 2012
For many organizations, portals are an increasingly important way of providing critical application access to partners and/or customers. Assembled from multiple web applications, portals introduce unique identity management challenges, because unlike internal employees, users from customers or partners aren't typically stored in the corporate directory. This forces administrators to maintain multiple user-stores and end-users to register, and manage logins for, each app individually.
Tags : 
okta, partner portals, enterprises, target applications, it management
    
Okta

Okta Identity Management for Portals Built on Salesforce.com

Published By: Okta     Published Date: Jan 30, 2013
The Salesforce.com’s suite of platforms and applications offer enterprises the ability to roll out rich customer-facing applications quickly, with no hardware or operations infrastructure required. Learn how Okta solves problems with web apps.
Tags : 
security, enterprise applications, data management, business technology, data center
    
Okta

Okta Active Directory Integration - An Architecture Overview

Published By: Okta     Published Date: Jan 31, 2013
Okta’s cloud-based identity and access management service solves the issue of user identities on multiple networks with a highly available solution for all cloud based and web based application AD integrations. Learn how Okta can help you.
Tags : 
okta, active directory, integration, architecture, okta, knowledge management, enterprise applications, data management
    
Okta

Building Secure Multi-Factor Authentication

Published By: Okta     Published Date: Apr 03, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
multi-factor authentication, assurance of authentication, consumer and enterprise web, mobile applications, knowledge management, enterprise applications
    
Okta

Six Steps to Effective Web Security

Published By: M86 Security     Published Date: Dec 01, 2010
This white paper addresses the risks that concern IT security professionals, many of which they feel powerless to control.
Tags : 
m86 security, web security, malware protection, web 2.0 application, information exchange, collaboration, business enablement, anti spam
    
M86 Security

Optimizing Video Delivery With Blue Coat

Published By: Blue Coat Systems     Published Date: Oct 24, 2011
Optimized Video Delivery automatically minimizes bandwidth impact and improves user experience! Find our more in this white paper.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, convergence, business activity monitoring, business process management, collaborative commerce
    
Blue Coat Systems

Wan Optimization For Today and Tomorrow

Published By: Blue Coat Systems     Published Date: Oct 24, 2011
Learn how to proactively address the latest trends in WAN traffic. Tomorrow is here: video, Web 2.0, and SaaS applications are overtaking the WAN.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, network architecture, network management, network performance, network performance management
    
Blue Coat Systems

Blue Coat Accelerates SAP ERP and Business Objects

Published By: Blue Coat Systems     Published Date: Oct 24, 2011
ERP and Business Intelligence are essential to your success. Read this and learn how to improve productivity and decision-making using Blue Coat WAN Optimization.
Tags : 
blue coat, wan optimization, resource management, sap, erp, secure web gateway, application performance monitoring, netweaver
    
Blue Coat Systems

Top Reasons to Implement an SOA Governance Strategy: A List for IT Executives

Published By: Oracle     Published Date: Apr 03, 2012
Download this white paper, Top Reasons to Implement an SOA Governance Strategy: A List for IT Executives, for a guide to governance that will set you on the right path.
Tags : 
soa, service oriented architecture, networking, middleware, weblogic, oracle, information technology, web services
    
Oracle

Top 5 Java Performance Considerations

Published By: AppDynamics     Published Date: Nov 02, 2017
With an estimated 9 million developers worldwide, the Java community is a very robust one. One of the most important uses of Java today is building applications for mobile devices using the Android operating system. In addition, Java remains incredibly popular for enterprise applications and client-server web applications, and is also a very common language of instruction in software development courses.
Tags : 
    
AppDynamics

Discover why in-app support will be the next era of customer service

Published By: Citrix     Published Date: Nov 04, 2015
More and more, your customers are connecting to your products and services on their mobile devices. So if your goal is to provide great customer service, that’s where you need to be: in the app, interacting with customers. Join this webinar to hear industry experts discuss how in-app support will be the next era of customer service. Emerging mobile technologies are posing new challenges and opportunities — are you and your support team prepared? Attend this live webinar to learn: • Ways to evaluate your support center for the mobile world • How new technologies will impact the customer service industry • Why your customer service should offer in-app support options • And more…
Tags : 
    
Citrix

Container App Services with Kubernetes

Published By: Avi Networks     Published Date: May 23, 2019
With growing adoption of container ecosystems, Kubernetes and OpenShift are becoming easy and popular choices for enterprises today. This webinar will look at the bigger picture by exploring all the components necessary to deploy a production-ready container-based application. Register to watch this webinar to: Review how containers and microservices have changed traditional application delivery Take a deeper look into application service deployment considerations in Kubernetes Understand the 'North-South' and 'East-West' nature of microservices Learn how the Avi fits into this ecosystem - working either alongside or replacing Kube-proxy To register to watch this webinar, simply fill out the form on this page.
Tags : 
    
Avi Networks

Build Engaging Applications with Salesforce Heroku and AWS

Published By: AWS     Published Date: Aug 06, 2018
Learn more Salesforce and Amazon Web Services at http://amzn.to/2zhcn1v. Building and releasing cutting-edge applications quickly can be difficult when you lack proper tooling and integrated customer data. Salesforce Heroku delivers a cloud-native, developer-friendly platform that streamlines application development by integrating formerly siloed customer data and removing the burden of infrastructure management, allowing developers to focus their attention solely on creating customer-centric applications. Join the upcoming webinar to hear how the Financial Times builds customer-driven applications with faster cycle times with Heroku and AWS.
Tags : 
    
AWS

Cloud Native Monitoring at Entrust Datacard with Splunk

Published By: AWS     Published Date: Nov 15, 2018
"To provide trusted identities and secure transactions to your customers, you want a flexible, scalable monitoring solution that offers a unified view on the Amazon Web Services (AWS) cloud. Learn how Entrust Datacard can help your organization quickly identify, resolve, and prevent issues by using a cloud-native platform to deliver seamless customer experiences every time. Watch our on-demand webinar and gain valuable insights into: • How to use a DevOps approach to monitoring • The best practices to scale your monitoring solutions • How Entrust Datacard monitors trace, syslog and metric data from sources like Amazon CloudWatch, Application Load Balancer, and Amazon Aurora"
Tags : 
    
AWS

How Three Franchise Owners Reduced Complexity and Gained Flexibility with Cloud Communications

Published By: 8x8 Inc.     Published Date: Aug 09, 2017
Progressive companies of all sizes today are taking advantage of new, web-based technologies to reduce IT complexity and increase their competitiveness. Mobile apps and devices that provide anywhere, anytime connectivity and cloud infrastructure that enables seamless, scalable growth give them the speed and flexibility to grow quickly and expand into new markets. In this whitepaper you will find three examples of forward-thinking franchise owners and entrepreneurs that are growing their businesses and positioning themselves for the future with unified communications solutions. These franchises are: McDonald's RE/MAX Fix Auto Download now to learn more!
Tags : 
franchise, mcdonald's, mobile app, positioning, communication solutions, 8x8
    
8x8 Inc.

Reimagining API and Application Backend Creation

Published By: CA Technologies EMEA     Published Date: May 23, 2018
In today’s application economy, interaction between a business and its customers, partners and employees is increasingly through apps. And omni-channel access to these applications—from anywhere at any time—is dependent on APIs. These APIs provide an interface for developers to code against, and must be robust enough to support ever-growing demand. As a result, APIs are perhaps the most critical technology in digital business design today. APIs sit between your application clients —apps, websites and devices—and application backends. By leveraging APIs, you can securely stretch the boundaries of your enterprise by tapping into a broad array of digital businesses, digital customers and digital devices. But just as important as the API, is the application backend itself. Behind the API, the data access layer and application logic layer are doing the heavy lifting—implementing business rules, maintaining data consistency and managing interactions with various data sources. These three com
Tags : 
    
CA Technologies EMEA

Strategie und Architektur mit APIs: Ein koordinierter Ansatz

Published By: CA Technologies EMEA     Published Date: May 24, 2018
Der Aufstieg der Anwendungsprogrammierschnittstelle (Application Programming Interface, API) stellt eine geschäftliche Chance und eine technische Herausforderung dar. Unternehmensverantwortlichen bieten APIs die Gelegenheit, sich neue Umsatzquellen zu erschließen und den Kundenwert zu maximieren. Es ist jedoch Aufgabe von Unternehmensarchitekten, die APIs zu erstellen, mit denen Back End?Systeme zur Wiederverwendung in neuen Webanwendungen und neuen mobilen Apps verfügbar werden. Es ist unabdingbar, dass alle Stakeholder verstehen, dass die geschäftlichen Ziele und die technischen Herausforderungen eines API?Programms eng miteinander in Beziehung stehen. Programmmanager müssen die Verantwortung dafür übernehmen, die wichtigen geschäftlichen Ziele einer vorgeschlagenen API den Architekten klar mitzuteilen, die diese API erstellen sollen.
Tags : 
    
CA Technologies EMEA

Managing Access to Legacy Web Applications with Okta

Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.