web app

Results 401 - 425 of 1015Sort Results By: Published Date | Title | Company Name

Managing Access to Legacy Web Applications with Okta

Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA

Building Secure Multifactor Authentication

Published By: OKTA     Published Date: Sep 26, 2017
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications.
Tags : 
    
OKTA

How to compete for patients in the digital age

Published By: Reputation.com     Published Date: Jun 29, 2018
Creating competitive advantage starts with a sound digital strategy. In a 2017 survey of healthcare consumers across the U.S. from a representative range of demographic groups, we found that 88% of consumers begin their search for healthcare providers online. Consumers rely on search engines and review sites to steer their decisions about where to go for care. What consumers read about you online heavily influences their decision-making. Your reputation is defined at every touchpoint a potential patient has with your doctors and organization on the web — from the doctor or location listing, to patient rating and reviews, to finding the right doctor and reading profiles on your website. Done well, online reputation management (ORM) enables your providers to generate a high volume of representative reviews from the “silent majority,” while providing valuable insights to improve patient experience, make operational improvements and drive new patient appointments.
Tags : 
    
Reputation.com

3 Bright Ideas for Increasing Conversions with Customer Engagement

Published By: Moxie     Published Date: Feb 06, 2019
Customers expect you to make it easy to move through their site. According to Gartner, more than 82% of online shoppers prefer a more comprehensive web experience suite, as opposed to a stand-alone single-channel or point-based product. The content of this ebook focuses on the tangible results of effective customer engagement, along with 3 key components companies need to make it happen.
Tags : 
customer engagement, digital engagement, ecommerce, customer experience, customer service, customer support
    
Moxie

4 Fundamentals to Maximize Site Performance

Published By: Incapsula     Published Date: Nov 06, 2017
Does your website load in two seconds or less? If not, you could be disappointing nearly half of your customers. According to Kissmetrics, 47 percent of e-commerce users expect websites to load in less than two seconds – and nearly a quarter of them will abandon your website entirely if it takes longer than four seconds. Additionally, 50 percent of customers shop on their mobile phones. In other words, your website needs to load fast and be optimized or your customers will leave. The reality is that an e-commerce company can increase revenue by up to 7 percent just by making the load time one second faster. So, how can your company improve its site performance and make it faster? The best practices outlined in this whitepaper can reduce your site’s loading time, improve your user experience, and ultimately increase your company’s revenue.
Tags : 
    
Incapsula

Transforming Connectivity & Security for Moving to the Cloud

Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint

Get an Introduction to the Next-Generation of DLP

Published By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
    
Forcepoint

Transforming Connectivity & Security for Moving to the Cloud

Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint

Transforming Connectivity & Security for Moving to the Cloud

Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint

Radicati 2018 Corporate Web Security Market Quadrant

Published By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a “Top Player” for Web Security Forcepoint is proud to announce that Radicati has identified Forcepoint as a “Top Player” in their Corporate Web Security Market Quadrant for the 11th year in a row. In the report, Radicati noted that, ”Forcepoint offers a powerful web security solution that addresses all key web security concerns and integrates well with additional modules for full cyber-attack protection.” They also cited that, “Forcepoint has some of the most complete and secure application controls in the Web security space. The granularity for Web application controls available in Forcepoint’s solution is leading edge.”
Tags : 
    
Forcepoint

Reducing Cyber Exposure from Cloud to Containers

Published By: Tenable     Published Date: Feb 07, 2018
"Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure and protect your enterprise. By reading this ebook you’ll learn what’s working – and what’s not – from 29 global infosec leaders, representing a diverse array of industries and perspectives. Download your copy today for insights and lessons learned about: - Securing a dynamic IT environment - Rethinking security for cloud environments - Moving security to the application layer - Focusing on data security - Automating security testing and controls"
Tags : 
secure devops, web application security, attack surface, cloud, container security, ciso, cyber, experts, ebook
    
Tenable

Cyber Exposure for Dummies

Published By: Tenable     Published Date: Nov 06, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable

Reducing Cyber Exposure from Cloud to Containers: 5 Key Learnings from the CISO POV

Published By: Tenable     Published Date: Nov 06, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable

5 Best Practices for Application Security: A How-To Guide

Published By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
    
Tenable

Veeam Availability per VMware Cloud su AWS

Published By: Veeam '18     Published Date: May 01, 2019
VMware Cloud su Amazon Web Services (AWS) è un servizio on-demand che ti consente di eseguire applicazioni in ambienti cloud basati su vSphere con l’accesso a un’ampia gamma di servizi AWS. Supportato dalla VMware Cloud Foundation, questo servizio integra vSphere, vSAN e NSX insieme alla gestione di VMware vCenter ed è ottimizzato per l’esecuzione su un’infrastruttura AWS, dedicata, elastica e bare metal. Grazie a VMware Cloud su AWS, i team IT possono gestire le risorse basate sul cloud con strumenti VMware a loro familiari. Questa panoramica della soluzione offre una descrizione di come il supporto Veeam su AWS consente ai clienti di accelerare l’adozione delle implementazioni di cloud ibrido con la possibilità di copiare, replicare o migrare i carichi di lavoro sul cloud AWS in modo semplice ed efficiente e sfruttare gli investimenti esistenti nelle tecnologie Software-Defined Data Center (SDDC) di VMware.
Tags : 
    
Veeam '18

Falcon Discover AWS Datasheet

Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Visibility and control of endpoint devices are critical to securely manage your workloads in the Amazon Web Services (AWS) environment. Ideally, teams want to gain real-time visibility and control without having to deploy an additional agent onto the Amazon Elastic Compute Cloud (Amazon EC2) instance. They want a tool that allows them to span physical, virtual and cloud environments of their existing on-premises endpoints and Amazon EC2 instances. CrowdStrike® Falcon Discover™ platform allows you to identify unauthorized systems and applications in real time and quickly remediate issues, ensuring the integrity of your data. Download this datasheet to learn the key benefits of cloud-native CrowdStrike Falcon Discover, including: • Visibility and control over their endpoints whether they are running on-premises or as Amazon EC2 instances • The ability to scale easily to match the dynamic nature of Amazon EC2 instances "
Tags : 
    
AWS - ROI DNA

9 Reasons to Make the Move to a Cloud Contact Center

Published By: Five9     Published Date: Aug 01, 2019
It’s become abundantly clear that the cloud is no longer the future— but the new normal. Enterprises rely on cloud computing for web-based meetings, email, file sharing, and more every day to reduce costs and administrative burdens while enhancing productivity. With the wealth of benefits to be gained by moving to the cloud—including speed of deployment, cost-efficiencies, and easy scaling—it’s no wonder the shift toward all things virtual has been so pervasive and swift. What’s more, as the cloud has matured, the potential drawbacks that once made enterprises hesitant to make the move are disappearing. Security is now robust, application integration happens with ease, and reliability is a given, not a question mark. So now that the cloud has become not just viable, but essential, to stay competitive in a rapidly changing world, it’s time to explore how the cloud can significantly improve your contact center operations and guest experiences. This paper will provide one compelling r
Tags : 
    
Five9

9 Reasons to Make the Move to a Cloud Contact Center

Published By: Five9     Published Date: Oct 29, 2019
It’s become abundantly clear that the cloud is no longer the future— but the new normal. Enterprises rely on cloud computing for web-based meetings, email, file sharing, and more every day to reduce costs and administrative burdens while enhancing productivity. With the wealth of benefits to be gained by moving to the cloud—including speed of deployment, cost-efficiencies, and easy scaling—it’s no wonder the shift toward all things virtual has been so pervasive and swift. What’s more, as the cloud has matured, the potential drawbacks that once made enterprises hesitant to make the move are disappearing. Security is now robust, application integration happens with ease, and reliability is a given, not a question mark. So now that the cloud has become not just viable, but essential, to stay competitive in a rapidly changing world, it’s time to explore how the cloud can significantly improve your contact center operations and customer experiences. This paper will provide one compelling
Tags : 
    
Five9

Webinar Replay: Google Apps for Retail

Published By: Cloud Sherpas     Published Date: Oct 08, 2015
Watch this webinar replay to explore common retail uses cases for Google Apps for Work in detail and discover how adopting these solutions can help you create a more collaborative environment for your organisation.
Tags : 
apps for retail, google for work, consumer experiences, knowledge management, enterprise applications, business technology
    
Cloud Sherpas

Amazon Web Services: Enhance Application Delivery & Load Balancing, Brocade Virtual Traffic Manager

Published By: Brocade     Published Date: Nov 25, 2015
Your business demands more than the basic load balancing solution offered by Amazon Web Services. Boost application performance by adding a sophisticated Brocade vADC to seamlessly integrate with any application deployed on AWS—improve user experience, scalability, and control.
Tags : 
amazon, brocade, aws, fucntionality, amazon elb, web services, it management
    
Brocade

API Strategy & Architecture eBook

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
The rise of the application programming interface (API) represents a business opportunity and a technical challenge. For business leaders, APIs present the opportunity to open new revenue streams and maximize customer value. But enterprise architects are the ones charged with creating the APIs that make backend systems available for reuse in new Web and mobile apps. It is vital that all stakeholders understand that the business goals and technical challenges of an API program are intimately related. Program managers must take responsibility for clearly communicating the key business goals of a proposed API to the architects who will actually build the interface. This eBook outlines best practices for designing results-focused APIs that will form the cornerstone of your API program’s success.
Tags : 
    
CA Technologies EMEA

Strategie und Architektur mit APIs: Ein koordinierter Ansatz

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Der Aufstieg der Anwendungsprogrammierschnittstelle (Application Programming Interface, API) stellt eine geschäftliche Chance und eine technische Herausforderung dar. Unternehmensverantwortlichen bieten APIs die Gelegenheit, sich neue Umsatzquellen zu erschließen und den Kundenwert zu maximieren. Es ist jedoch Aufgabe von Unternehmensarchitekten, die APIs zu erstellen, mit denen Back End?Systeme zur Wiederverwendung in neuen Webanwendungen und neuen mobilen Apps verfügbar werden. Es ist unabdingbar, dass alle Stakeholder verstehen, dass die geschäftlichen Ziele und die technischen Herausforderungen eines API-Programms eng miteinander in Beziehung stehen. Programmmanager müssen die Verantwortung dafür übernehmen, die wichtigen geschäftlichen Ziele einer vorgeschlagenen API den Architekten klar mitzuteilen, die diese API erstellen sollen.
Tags : 
    
CA Technologies EMEA

Build Secure MFA

Published By: Okta     Published Date: Apr 29, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
mfa, authentication. mobile, applications, okta, security, it management
    
Okta

Service Virtualization for Dummies

Published By: IBM     Published Date: Oct 02, 2015
The book covers the following topics and more: - Understand the changing relationship between IT and business — quicker delivery is required - Examine today’s complex applications — mobile, web, social meet middleware, packaged apps, databases, and mainframes. - Discover how to begin with service virtualization — build your business case. - Realize the benefits of service virtualization —enable earlier testing to eliminate surprises and reduce risk.
Tags : 
service virtualization, software quality, efficiency, testing processes, testing, mobile applications, web applications, middleware, packaged apps, databases, security, it management, enterprise applications, business technology
    
IBM

The Future of Testing: Where Do Testers Spend Their Time?

Published By: IBM     Published Date: Oct 02, 2015
TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.
Tags : 
testing, ibm, release cycles, testing services, applications, development, web-based applications, mobile applications, software development, it management, enterprise applications, business technology
    
IBM
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.