web environment

Results 76 - 100 of 148Sort Results By: Published Date | Title | Company Name
Published By: Cloud Sherpas     Published Date: Oct 08, 2015
Watch this webinar replay to explore common retail uses cases for Google Apps for Work in detail and discover how adopting these solutions can help you create a more collaborative environment for your organisation.
Tags : 
apps for retail, google for work, consumer experiences, knowledge management, business technology
    
Cloud Sherpas
Published By: SolarWinds     Published Date: Aug 04, 2015
In order to have a responsive and resilient website, there are critical decisions you should make in the planning process with regard to security, load testing, load balancing and scalability. In this paper, Terri Donahue, Microsoft IIS MVP, outlines specific decisions and tasks you should perform to effectively plan and implement your IIS environment.
Tags : 
internet information services, load testing, load balancing, scalability, iis environment
    
SolarWinds
Published By: IBM     Published Date: Jul 09, 2015
Whether it's a web application or an enterprise cloud application, Websphere Application Server has the right fit-for-purpose cloud environment for your business.
Tags : 
web application, ibm, enterprise cloud application, cloud environment, application server, it management, data management, data center
    
IBM
Published By: Xangati     Published Date: May 20, 2015
The goal for organizations with eCommerce Web sites, application developers and IT infrastructure managers is to deliver a successful end-user experience. Xangati can help you scale environment and succeed in reaching that goal.
Tags : 
e-commerce, e-commerce web applications, citrix netscaler adc, web server, web application infrastructure, it administrator, it infrastructure, web application performance, it management
    
Xangati
Published By: IBM     Published Date: Apr 09, 2015
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test environments, the value of the mobile device cloud, the unique role crowd sourcing can play, and how teams can leverage automation to help deliver quality apps.
Tags : 
mobile apps, mobile app testing, mobile device cloud, crowd sourcing, ibm, networking, software development, business technology
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : 
user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking, it management, knowledge management, data management
    
IBM
Published By: New Relic     Published Date: Apr 07, 2015
Whether you've already moved to the cloud or are ready to migrate, New Relic helps Amazon Web Services (AWS) users improve performance. Here are five best practices that can help you improve the end-user experience, simplify management, and reduce the cost of your AWS environment.
Tags : 
    
New Relic
Published By: Symantec     Published Date: Apr 02, 2015
The online world can be a scary place as the integration of the Internet into everyone’s lives has also brought with it an ever-increasing trend towards malicious activity. Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers’ sensitive information. It is critical to choose e-commerce security solutions that continually evolve and extend to address a range of ever-changing needs. SSL-based security platforms with solid track records of meeting new challenges are the best way to defend, and future proof, e-commerce environments against a growing and dynamic Internet threat environment.
Tags : 
security solution, ssl, e-commerce environments, malicious activity, safeguard information, ssl-based security
    
Symantec
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security, networking, it management
    
CDW-Trend Micro
Published By: IBM     Published Date: Feb 18, 2015
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test environments, the value of the mobile device cloud, the unique role crowd sourcing can play, and how teams can leverage automation to help deliver quality apps.
Tags : 
mobile app testing, ibm, desktop applications, mobile test environments, mobile device cloud, it management, knowledge management
    
IBM
Published By: IBM     Published Date: Jan 30, 2015
IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment. This session provides an overview of IBM Bluemix capabilities.
Tags : 
paas, ibm, infrastructure solutions, middleware challenges, knowledge management, data management, data center
    
IBM
Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers
    
Symantec
Published By: IBM     Published Date: Nov 19, 2014
IBM's new Platform-as-a-Service (PaaS) offering, IBM Bluemix, delivers the speed and flexibility of the cloud to allow developers to more quickly compose and build enterprise-grade applications for by providing access to IBM's vast software portfolio as composable services. This powerful PaaS/services combination, built on open standards and taking advantage of Cloud Foundry, enables developers to avoid vendor lock-in while leveraging their existing application development assets and skills, which is essential for building hybrid clouds. IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment.This session provides an overview of IBM Bluemix capabilities.
Tags : 
ibm, bluemix, cloud-computing, middleware, networking, software development, it management, business technology
    
IBM
Published By: IBM     Published Date: Nov 13, 2014
This webcast examines a large government agency struggling to provide stable test environments to support their partner landscape. Learn how service virtualization was used to simulate their department's core systems for a lower risk, less expensive, and stable testing environment.
Tags : 
service virutalization, core systems, testing environments, it management, knowledge management, business technology
    
IBM
Published By: NEC     Published Date: Nov 12, 2014
In this webinar an expert panel will examine the security and visibility needs of mesh SDN networks by examining the security challenges faced by businesses in distributed SDN environments. The webinar will also present real-world case studies of companies who excelling at providing a superior customer experience for their applications and their sites.
Tags : 
nec, software defined networking, sdn, lan, land area network, wifi, wireless network, network management, business network, network security
    
NEC
Published By: Sage     Published Date: Oct 29, 2014
If you have recently been to a seminar, attended a conference or webcast, or read a white paper or blog, you have most likely heard about cloud technology as it relates to the accounting profession. Cloud technology is an enabler that allows a business to shift computing power from local networks and desktop environments to a remote off-premises computing environment. Ef?ciency of operations is enhanced by removing the burden of managing networks, upgrades, and information technology operational issues.
Tags : 
cloud technology, service offerings, efficiency, managing networks, operational issues
    
Sage
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Lumension     Published Date: Oct 20, 2014
"Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli
Tags : 
java, insecurity, vulverabilities, computing, security
    
Lumension
Published By: Nutanix     Published Date: Oct 01, 2014
This webinar will help enterprises understand the fundamentals of web-scale IT and how other companies are using web-scale principles to build private cloud-like environments.
Tags : 
nutanix, cloud, convergence, hyperconvergence, virtualization, web scale, it scale
    
Nutanix
Published By: HP     Published Date: Sep 16, 2014
Web hosting operations can reduce costs and be more agile by rethinking their IT environments from the server to the rack to the data center. Here’s a new approach that’s ideal for scaling out and enabling web hosts to reduce costs and expand their present and future capabilities.
Tags : 
hyperscale, eda, opex, data centers
    
HP
Published By: IBM     Published Date: Jul 22, 2014
Join this session to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.
Tags : 
ibm, cloud, cloud storage, storage, storage environment efficiency, environment efficiency, data protection, data driven analytics, storage systems, storage costs, it budget, it management
    
IBM
Published By: Keynote     Published Date: Apr 23, 2014
In the world of digital interactions, the margin between success and disengagement or abandonment is measured in milliseconds. With the exploding adoption of advanced smartphones and tablets, you need a mobile-first approach to engaging with customers and employees. And as your mobile initiatives are delivered at increasingly rapid rates, the quality and reliability of the mobile apps, mobile web and connected services that support them has become critically important. For the technology teams delivering customer and employee services in the mobile channel, it is important to understand that performance monitoring solutions which work for the desktop cannot be simply applied to mobile. Managing the mobile end user experience requires an understanding of the challenges posed by the complexities of the mobile environment. This paper will reveal the 4 pillars of mobile performance, plus offer strategies for accurately monitoring mobile end user experience so you can continuously improve.
Tags : 
mobile application monitoring, mobile application monitoring system, mobile app performance, mobile application performance, app monitoring, monitor mobile applications, web performance monitoring tools, performance monitoring, web application monitoring, mobile website performance, mobile website optimization, mobile web monitoring, keynote, business technology
    
Keynote
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
Tags : 
kaspersky, it security, cost of production, total cost, hidden costs, cloud computing, mobile devices, web applications, virtualization, vulnerabilities, it spending, security spending, malware writers, cybercriminals, anti-malware, it environment, virus detection, software protection, it management
    
Kaspersky Lab
Published By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content, security model, dll protection, it environments, security suite, endpoint protection, e-security, targeted phishing, organized attacks, vulnerability management
    
Lumension
Published By: NetApp     Published Date: Dec 12, 2013
This informative paper explores a partnership that extends how you can leverage the scalability and reliability of Amazon Web Services—in its own right, as backup, as a test/dev environment, or as an innovative extension of your  on premises IT infrastructure. Read on to learn more.
Tags : 
private cloud, virtualization, technology, best practices, enterprise cloud, netapp, cloud deployments, storage
    
NetApp
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.