application usage

Results 1 - 25 of 40Sort Results By: Published Date | Title | Company Name

Forcepoint Free Cloud Threat Assessment

Published By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
    
Forcepoint

Learn How to Manage the Cost and Security Risks of Your SaaS Applications

Published By: Flexera     Published Date: Feb 19, 2019
SaaS adoption is growing quickly. It's easy to buy and deploy because of its relatively low overhead and up-front costs. But SaaS is designed to proliferate. About a third of the SaaS apps in most organizations don’t even get used. And the result? SaaS costs spin out of control. Are you able to manage the cost and security risks associated with your SaaS applications? Download the Essential SaaS Management Toolkit to learn about SaaS usage trends, understand the importance of SaaS management tools and discover how to take control of your SaaS applications. The Essential SaaS Management Toolkit was designed to provide everything you need to learn how to manage the cost and security risks of your SaaS applications. Get the Toolkit here.
Tags : 
    
Flexera

Accenture Unveils Real-Life Performance Results for Oracle Autonomous Data Warehouse

Published By: Oracle     Published Date: Jan 09, 2019
The Accenture Oracle data team has more than 20,000 professionals, who aid in delivering 50 billion transactions a day across more than three exabytes of data for clients globally. Accenture Oracle data specialists recently put the Oracle Autonomous Data Warehouse to a rigorous performance test to provide a real-life application usage experience. The data was then extrapolated and expanded to nine years’ worth of data to test the performance. Learn directly from Accenture experts about testing methodology and results that enable them to deliver more data intelligence faster to the enterprise and transform the way people live and work.
Tags : 
    
Oracle

STREAMLINING VM BACKUPS WITH THE PUBLIC CLOUD

Published By: Druva     Published Date: Nov 09, 2018
The rise of virtualization as a business tool has dramatically enhanced server and primary storage utilization. By allowing multiple operating systems and applications to run on a single physical server, organizations can significantly lower their hardware costs and take advantage of efficiency and agility improvements as more and more tasks become automated. This also alleviates the pain of fragmented IT ecosystems and incompatible data silos. Currently, this virtualization juggernaut shows no sign of slowing. As businesses recognize the potential for increased reliability and scalability offered by virtual technology, they are ramping up their investments in data center modernization and upgrading. In fact, 33 percent of the respondents to a recent ESG survey on cloud usage said that making greater use of server virtualization was one of their top five spending priorities for the next 12 to 18 months.
Tags : 
    
Druva

Optimizing Amazon Redshift, A Real-World Guide

Published By: Amazon Web Services     Published Date: Sep 05, 2018
Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. It’s designed for speed and ease of use — but to realize all of its potential benefits, organizations still have to configure Redshift for the demands of their particular applications. Whether you’ve been using Redshift for a while, have just implemented it, or are still evaluating it as one of many cloud-based data warehouse and business analytics technology options, your organization needs to understand how to configure it to ensure it delivers the right balance of performance, cost, and scalability for your particular usage scenarios. Since starting to work with this technolog
Tags : 
    
Amazon Web Services

Optimizing Amazon Redshift, A Real-World Guide

Published By: AWS     Published Date: Sep 04, 2018
Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. It’s designed for speed and ease of use — but to realize all of its potential benefits, organizations still have to configure Redshift for the demands of their particular applications. Whether you’ve been using Redshift for a while, have just implemented it, or are still evaluating it as one of many cloud-based data warehouse and business analytics technology options, your organization needs to understand how to configure it to ensure it delivers the right balance of performance, cost, and scalability for your particular usage scenarios. Since starting to work with this technology
Tags : 
    
AWS

The Guide to Multi- Dimensional ADC Scaling for Digital Transformation

Published By: Citrix     Published Date: Jun 15, 2018
The world of IT is undergoing a digital transformation. Applications are growing fast, and so are the users consuming them. These applications are everywhere—in the datacenter, on virtual and/or microservices platforms, in the cloud, and as SaaS. More and more apps are now being moved out of datacenters to a cloud-based infrastructure. In order for an optimized and secure delivery of these applications, IT needs specific network appliances called Application Delivery Controllers (ADCs). These ADCs come in hardware, virtual, and containerized form factors, and are sized by Network Administrators based on the current and future usage of applications. The challenge with this is that it’s hard to foresee sizing or scalability requirements for these ADCs since users are constantly increasing, and applications are consistently evolving, as well as moving out of datacenters. Complicating matters, most ADCs are fixed-capacity network appliances that provide zero or minimum expansion capability
Tags : 
    
Citrix

The Cloud is Changing Data Backup: Here’s What IT Leaders Need to Know

Published By: NetApp     Published Date: Mar 05, 2018
Companies are moving applications to the cloud with software-as-a-service (SaaS) and infrastructure-as-a-service (IaaS) usage increasing at a steady rate. IDC research has found that over half of organizations currently utilize a hybrid cloud configuration. For many companies, backing up data to the cloud is the easiest way to begin using the cloud. To achieve the benefits of backup to the cloud without taking on extra risk, IT leaders need to understand the nuances of cloud-based storage services and plan accordingly.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp

10 Things Your Next Firewall Must Do

Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : 
firewall, optimization, security risks, business, devices, employees, technology
    
Palo Alto Networks

Firewall Buyer's Guide

Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks

Unlocking Mobile Application Performance

Published By: Akamai Technologies     Published Date: Aug 17, 2017
As mobile device usage has skyrocketed in recent years, mobile applications have emerged as the key engagement channel for businesses to connect with their most loyal and most valuable customers. Mobile app usage represents more than 85% of total mobile device time, and users now spend more time with apps than they do with television. But while app usage has increased more than 60% over the last two years, the number of apps each user actively engages with has remained fairly steady, at around 27 per month. This means users have a limited appetite for additional apps – but are heavily engaged with the ones they use. So while the mobile web gives businesses broad reach, mobile apps offer a robust link to their best customers. Users who value the company enough to go through the trouble of downloading and installing the app are a brand’s most engaged audience and loyal fan base.
Tags : 
mobile performance, mobile app, customer engagement, channeling
    
Akamai Technologies

IDC Spotlight paper

Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
According to Mary Johnston Turner, Research Vice President at IDC; "Breaking down technology specific management as well as data silos also facilitates faster infrastructure and application rollouts, reduces human errors, and improves overall business agility.Cloud based management, monitoring and analytics help to improve collaboration between IT operations and developer teams by stabilizing service levels and monitoring usage to support accurate charge back." 
Tags : 
    
Oracle PaaS/IaaS/Hardware

IW Custom Research: The Internet of Things: Finding the Path to Value

Published By: SAS     Published Date: Jun 05, 2017
"As more products and machines become connected, and analytical capabilities grow, new applications for the Internet of Things (IoT) will emerge. So too will manufacturers change how they make business decisions. This IndustryWeek Special Research Report gauges the current and planned usage of IoT technology and analytics by US manufacturers. It also explores how manufacturers can develop a specific IoT strategy and apply analytics more widely across their organizations to drive revenue, cut costs and innovate. "
Tags : 
    
SAS

IDC Spotlight paper

Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jan 10, 2017
According to Mary Johnston Turner, Research Vice President at IDC; "Breaking down technology specific management as well as data silos also facilitates faster infrastructure and application rollouts, reduces human errors, and improves overall business agility.Cloud based management, monitoring and analytics help to improve collaboration between IT operations and developer teams by stabilizing service levels and monitoring usage to support accurate charge back." 
Tags : 
    
Oracle PaaS/IaaS/Hardware

10 Things Your Next Firewall Must Do

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : 
palo alto, firewall, applications, ssl, ssh
    
Palo Alto Networks

Securing cloud application usage across the enterprise

Published By: IBM     Published Date: Jul 14, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : 
ibm, security, cloud applications, cloud, cloud-based threats, networking, enterprise applications
    
IBM

Securing cloud application usage across the enterprise

Published By: IBM     Published Date: Jan 07, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : 
ibm, cloud, security, threats, usage, application, enterprise applications, business technology
    
IBM

Top 10 Ways Infrastructure Monitoring Improves Your Business

Published By: SevOne     Published Date: Jul 27, 2015
Download this free whitepaper to learn 10 ways that infrastructure performance monitoring can have a positive impact on your business.
Tags : 
infrastructure monitoring, byod, application performance, sevone, bandwidth usage, best practices, it solutions
    
SevOne

The Connected Consumer: The Role of IT in the Digital Industrial Revolution

Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps helps drive continuous collaboration with the end-customer, gaining further visibility into online and mobile application usage and its effect on the brick-and-mortar experience. The data your company can derive from this collaboration should be used to continuously validate assumptions made earlier in the development process. Today’s empowered consumers have high expectations for the companies they do business with. They expect real-time communication, instant information, and the ability to connect in multiple ways. And they want it to be simple. A DevOps approach can help to accomplish this.
Tags : 
    
CA Technologies

The Connected Consumer: The Role of IT in the Digital Industrial Revolution

Published By: CA Technologies     Published Date: Jun 03, 2015
"DevOps helps drive continuous collaboration with the end-customer, gaining further visibility into online and mobile application usage and its effect on the brick-and-mortar experience. The data your company can derive from this collaboration should be used to continuously validate assumptions made earlier in the development process. Today’s empowered consumers have high expectations for the companies they do business with. They expect real-time communication, instant information, and the ability to connect in multiple ways. And they want it to be simple. A DevOps approach can help to accomplish this."
Tags : 
    
CA Technologies

Equinix Customer Success Story: Global Consulting and Technology Company

Published By: Equinix     Published Date: Mar 26, 2015
The client had an extensive global multiprotocol label switching (MPLS) network with over 30 Gbps of bandwidth. However, the client was experiencing bandwidth growth of >30% compound annual growth rate (CAGR) and foresaw increasing demands for multi-media applications, data center to data center traffic, and cloud solution usage to support its business units and global workforce. It became crucial for the client to re-architect their current network to support growth and provide a globally consistent user experience at lower cost. With 40% of their WAN traffic being http internet traffic, they needed regional internet service provider (ISP) breakouts. The client needed a lower cost/MB high capacity WAN backbone for better application performance and cloud optimization. Their network needed to be scalable to poise them for anticipated growth and offer improved site connectivity options.
Tags : 
bandwidth growth, multi-media applications, data center, cloud solution, internet service provider, cloud optimization, enterprise applications
    
Equinix

STI & SPM: The perfect synergy of hardware and software for maximizing ROI

Published By: Server Technology     Published Date: Feb 10, 2015
WebEx elected to pursue a course of investigation and analysis that required a granular picture of its application-centric hardware implementations and corresponding power usage profiles. To accomplish this, WebEx decided to retool their datacenters with intelligent power strips having the ability to remotely report power consumption.
Tags : 
server technology, power consumption, power and cooling, energy costs, roi, infrastructure, internetworking hardware, it spending, return on investment, data center design and management
    
Server Technology

Accelerating the Delivery of Microsoft Office 365

Published By: Riverbed     Published Date: Aug 22, 2014
The world’s largest organizations are adopting cloudbased infrastructure and services at a dizzying pace. Software as a service (SaaS) offerings such as Salesforce.com and Microsoft Office 365 are among the more popular cloud-based services. When moving services to the cloud, data centers are no longer local, so the end user experience can suffer. A poor or congested Internet connection between the user and the cloud service will mean sluggish application delivery that puts a damper on user productivity and ultimately threatens application usage.
Tags : 
acceleration, delivery, cloudbased infrastructure, productivity, microsoft exchange, windows, collaboration, cloud computing, business technology, infrastructure
    
Riverbed

Application, Usage and Threat Report

Published By: Palo Alto Networks     Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Tags : 
palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security, social media security, network security, email security, hacker detection, web service security, data protection
    
Palo Alto Networks

Firewall Buyers Guide: The Definitive Guide for Evaluating Enterprise Network Firewalls

Published By: Palo Alto Networks     Published Date: Jun 09, 2014
Without question, your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity, firewall, it management
    
Palo Alto Networks
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.