web app

Results 351 - 375 of 938Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Oct 24, 2011
ERP and Business Intelligence are essential to your success. Read this and learn how to improve productivity and decision-making using Blue Coat WAN Optimization.
Tags : 
blue coat, wan optimization, resource management, sap, erp, secure web gateway, application performance monitoring, netweaver, business objects, soa, optimization
    
Blue Coat Systems
Published By: Oracle     Published Date: Apr 03, 2012
Download this white paper, Top Reasons to Implement an SOA Governance Strategy: A List for IT Executives, for a guide to governance that will set you on the right path.
Tags : 
soa, service oriented architecture, networking, middleware, weblogic, oracle, information technology, web services, application server, server, sla, maturity model, 10g, jvm, java, data management
    
Oracle
Published By: AppDynamics     Published Date: Nov 02, 2017
With an estimated 9 million developers worldwide, the Java community is a very robust one. One of the most important uses of Java today is building applications for mobile devices using the Android operating system. In addition, Java remains incredibly popular for enterprise applications and client-server web applications, and is also a very common language of instruction in software development courses.
Tags : 
    
AppDynamics
Published By: Citrix     Published Date: Nov 04, 2015
More and more, your customers are connecting to your products and services on their mobile devices. So if your goal is to provide great customer service, that’s where you need to be: in the app, interacting with customers. Join this webinar to hear industry experts discuss how in-app support will be the next era of customer service. Emerging mobile technologies are posing new challenges and opportunities — are you and your support team prepared? Attend this live webinar to learn: • Ways to evaluate your support center for the mobile world • How new technologies will impact the customer service industry • Why your customer service should offer in-app support options • And more…
Tags : 
    
Citrix
Published By: AWS     Published Date: Aug 06, 2018
Learn more Salesforce and Amazon Web Services at http://amzn.to/2zhcn1v. Building and releasing cutting-edge applications quickly can be difficult when you lack proper tooling and integrated customer data. Salesforce Heroku delivers a cloud-native, developer-friendly platform that streamlines application development by integrating formerly siloed customer data and removing the burden of infrastructure management, allowing developers to focus their attention solely on creating customer-centric applications. Join the upcoming webinar to hear how the Financial Times builds customer-driven applications with faster cycle times with Heroku and AWS.
Tags : 
    
AWS
Published By: AWS     Published Date: Nov 15, 2018
"To provide trusted identities and secure transactions to your customers, you want a flexible, scalable monitoring solution that offers a unified view on the Amazon Web Services (AWS) cloud. Learn how Entrust Datacard can help your organization quickly identify, resolve, and prevent issues by using a cloud-native platform to deliver seamless customer experiences every time. Watch our on-demand webinar and gain valuable insights into: • How to use a DevOps approach to monitoring • The best practices to scale your monitoring solutions • How Entrust Datacard monitors trace, syslog and metric data from sources like Amazon CloudWatch, Application Load Balancer, and Amazon Aurora"
Tags : 
    
AWS
Published By: 8x8 Inc.     Published Date: Aug 09, 2017
Progressive companies of all sizes today are taking advantage of new, web-based technologies to reduce IT complexity and increase their competitiveness. Mobile apps and devices that provide anywhere, anytime connectivity and cloud infrastructure that enables seamless, scalable growth give them the speed and flexibility to grow quickly and expand into new markets. In this whitepaper you will find three examples of forward-thinking franchise owners and entrepreneurs that are growing their businesses and positioning themselves for the future with unified communications solutions. These franchises are: McDonald's RE/MAX Fix Auto Download now to learn more!
Tags : 
franchise, mcdonald's, mobile app, positioning, communication solutions, 8x8
    
8x8 Inc.
Published By: CA Technologies EMEA     Published Date: May 23, 2018
In today’s application economy, interaction between a business and its customers, partners and employees is increasingly through apps. And omni-channel access to these applications—from anywhere at any time—is dependent on APIs. These APIs provide an interface for developers to code against, and must be robust enough to support ever-growing demand. As a result, APIs are perhaps the most critical technology in digital business design today. APIs sit between your application clients —apps, websites and devices—and application backends. By leveraging APIs, you can securely stretch the boundaries of your enterprise by tapping into a broad array of digital businesses, digital customers and digital devices. But just as important as the API, is the application backend itself. Behind the API, the data access layer and application logic layer are doing the heavy lifting—implementing business rules, maintaining data consistency and managing interactions with various data sources. These three com
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
Der Aufstieg der Anwendungsprogrammierschnittstelle (Application Programming Interface, API) stellt eine geschäftliche Chance und eine technische Herausforderung dar. Unternehmensverantwortlichen bieten APIs die Gelegenheit, sich neue Umsatzquellen zu erschließen und den Kundenwert zu maximieren. Es ist jedoch Aufgabe von Unternehmensarchitekten, die APIs zu erstellen, mit denen Back End?Systeme zur Wiederverwendung in neuen Webanwendungen und neuen mobilen Apps verfügbar werden. Es ist unabdingbar, dass alle Stakeholder verstehen, dass die geschäftlichen Ziele und die technischen Herausforderungen eines API?Programms eng miteinander in Beziehung stehen. Programmmanager müssen die Verantwortung dafür übernehmen, die wichtigen geschäftlichen Ziele einer vorgeschlagenen API den Architekten klar mitzuteilen, die diese API erstellen sollen.
Tags : 
    
CA Technologies EMEA
Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Published By: OKTA     Published Date: Sep 26, 2017
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications.
Tags : 
    
OKTA
Published By: Reputation.com     Published Date: Jun 29, 2018
Creating competitive advantage starts with a sound digital strategy. In a 2017 survey of healthcare consumers across the U.S. from a representative range of demographic groups, we found that 88% of consumers begin their search for healthcare providers online. Consumers rely on search engines and review sites to steer their decisions about where to go for care. What consumers read about you online heavily influences their decision-making. Your reputation is defined at every touchpoint a potential patient has with your doctors and organization on the web — from the doctor or location listing, to patient rating and reviews, to finding the right doctor and reading profiles on your website. Done well, online reputation management (ORM) enables your providers to generate a high volume of representative reviews from the “silent majority,” while providing valuable insights to improve patient experience, make operational improvements and drive new patient appointments.
Tags : 
    
Reputation.com
Published By: Incapsula     Published Date: Nov 06, 2017
Does your website load in two seconds or less? If not, you could be disappointing nearly half of your customers. According to Kissmetrics, 47 percent of e-commerce users expect websites to load in less than two seconds – and nearly a quarter of them will abandon your website entirely if it takes longer than four seconds. Additionally, 50 percent of customers shop on their mobile phones. In other words, your website needs to load fast and be optimized or your customers will leave. The reality is that an e-commerce company can increase revenue by up to 7 percent just by making the load time one second faster. So, how can your company improve its site performance and make it faster? The best practices outlined in this whitepaper can reduce your site’s loading time, improve your user experience, and ultimately increase your company’s revenue.
Tags : 
    
Incapsula
Published By: Forcepoint     Published Date: Jan 03, 2019
How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services. Read the eBook to find out the five information security lessons learned from transitioning to the cloud.
Tags : 
data security, cloud security, digital transformation, email security, cyber security, secure web gateway, web proxy, ngfw, next generation firewall, forcepoint, distributed offices, distributed network, firewall, swg, cloud web protection, cloud migration, cloud applications
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 03, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. View the webinar today!
Tags : 
cloud connectivity, cloud security, distributed network, distributed offices, digital transformation, data security, cloud security, sd-wan, secure web gateway, firewall, branch security
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services. Read the eBook to find out the five information security lessons learned from transitioning to the cloud.
Tags : 
data security, cloud security, digital transformation, email security, cyber security, secure web gateway, web proxy, ngfw, next generation firewall, forcepoint, distributed offices, distributed network, firewall, swg, cloud web protection, cloud migration, cloud applications
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. View the webinar today!
Tags : 
cloud connectivity, cloud security, distributed network, distributed offices, digital transformation, data security, cloud security, sd-wan, secure web gateway, firewall, branch security
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 04, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Tenable     Published Date: Feb 07, 2018
"Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure and protect your enterprise. By reading this ebook you’ll learn what’s working – and what’s not – from 29 global infosec leaders, representing a diverse array of industries and perspectives. Download your copy today for insights and lessons learned about: - Securing a dynamic IT environment - Rethinking security for cloud environments - Moving security to the application layer - Focusing on data security - Automating security testing and controls"
Tags : 
secure devops, web application security, attack surface, cloud, container security, ciso, cyber, experts, ebook
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
    
Tenable
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Visibility and control of endpoint devices are critical to securely manage your workloads in the Amazon Web Services (AWS) environment. Ideally, teams want to gain real-time visibility and control without having to deploy an additional agent onto the Amazon Elastic Compute Cloud (Amazon EC2) instance. They want a tool that allows them to span physical, virtual and cloud environments of their existing on-premises endpoints and Amazon EC2 instances. CrowdStrike® Falcon Discover™ platform allows you to identify unauthorized systems and applications in real time and quickly remediate issues, ensuring the integrity of your data. Download this datasheet to learn the key benefits of cloud-native CrowdStrike Falcon Discover, including: • Visibility and control over their endpoints whether they are running on-premises or as Amazon EC2 instances • The ability to scale easily to match the dynamic nature of Amazon EC2 instances "
Tags : 
    
AWS - ROI DNA
Published By: Cloud Sherpas     Published Date: Oct 08, 2015
Watch this webinar replay to explore common retail uses cases for Google Apps for Work in detail and discover how adopting these solutions can help you create a more collaborative environment for your organisation.
Tags : 
apps for retail, google for work, consumer experiences, knowledge management, business technology
    
Cloud Sherpas
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.