enterprise application

Results 1 - 25 of 1130Sort Results By: Published Date | Title | Company Name
Published By: Aruba Networks     Published Date: May 21, 2013
The increase in enterprise WLANs is being driven largely by the rapid growth of mobile devices in the enterprise — what many are calling the "consumerization of IT" — and the resultant increase in enterprise mobility applications.
Tags : 
aruba, aruba networks, consumerization of it, wireless lans, mobile enterprise, enterprise mobility
    
Aruba Networks
Published By: Red Hat     Published Date: Jan 01, 2013
Linux has long since staked its claim to the cloud. Red Hat Enterprise Linux, with its consistency, stability, scalability, and support, is in a class of its own. Offering an outstanding environment for application deployment and the economy and innovation of open source, Red Hat Enterprise Linux also provides the reliability you need.
Tags : 
cloud system, consistency, stability, scalability, support, application deployment
    
Red Hat
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Published By: Epicor     Published Date: Mar 19, 2015
Over the last few years, Software as a Service (SaaS) has become a compelling and credible delivery model for business applications. SaaS, also referred to as “On-Demand” or “Cloud Computing”, eliminates many of the barriers that keep companies from implementing or upgrading their software, and can help you reduce costs. More importantly, it enables you to focus on your core business operations instead of managing IT. So Cloud-based ERP may be right for your business, but where do you start? This white paper contains 10 questions to ask when considering a Cloud-based ERP solution.
Tags : 
cloud-based erp solutions, it management, business applications, business operations, enterprise applications
    
Epicor
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
This Technology Brief is divided into two parts. The first part discusses the evolution of Ethernet, and then focuses on 10 Gigabit Ethernet and related transceiver and cabling technologies. The second part examines BLADE’s RackSwitch product line, including 10 GbE applications within enterprise networks and data centers.
Tags : 
enterprise data centers, blade’s rackswitch, 10gbe applications, enterprise networks, blade network technologies, evolution of ethernet, cabling technologies, it management, storage
    
BLADE Network Technologies
Published By: Riverbed     Published Date: Jan 28, 2014
Riverbed Cascade provides enterprise-wide network and application visibility with a full set of application-centric, site-centric, and business-centric views. While Cascade can coexist or integrate with a variety of other IT management solutions, it will likely become your first line of defense against application performance problems.
Tags : 
application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring, network performance troubleshooting, networking, it management, business technology
    
Riverbed
Published By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization today—and if you aren’t taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : 
cybersecurity, security risk, security ratings, security, it management, enterprise applications, data management, it career advancement, business technology
    
BitSight Technologies
Published By: Polycom     Published Date: Jun 08, 2016
"There are many ways to take advantage of the rich set of collaboration tools provided by Microsoft Skype for Business. IT leaders should consider a cap-and-grow Skype for Business strategy and then think through how it can be leveraged as a replacement technology. Digest this white paper by leading UC analyst Zeus Kerravala for insight on the 14 best practices for a Skype for Business Enterprise Voice deployment. Enabling IM and presence first, expanding desktop applications, and more are details in this informative piece. "
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: Hosting.com     Published Date: May 20, 2010
This Cloud Computing Trends Report provided insight into the expectations small, medium and large businesses have of cloud computing, their intended uses, reasons for adopting, and expected time-frames for implementing cloud-based solutions.
Tags : 
hosting.com, cloud, computing, enterprise application, uptime
    
Hosting.com
Published By: Cisco     Published Date: Aug 27, 2015
Magic Quadrant report looking specifically at on-premises unified communications requirements for midsize organizations with 100 to 999 employees.
Tags : 
unified communications, midsize enterprise, uc solutions, productivity, business process, enterprise communications methods, integrated application, collaboration application, personal communication, mobility management, byod, analytic tools, business application, business process management
    
Cisco
Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle, business technology
    
Veracode
Published By: Avi Networks     Published Date: Mar 24, 2016
This buyer’s guide for load balancers is based on research, best practices, and conversations with network administrators and IT operations teams at over 110 Global 2000 enterprises. It presents guidelines for choosing application services that mirror the needs of modern data centers and public cloud initiatives. The guide is organized in sections, starting with a pre-assessment of your current application delivery capabilities. With data gathered from your pre-assessment, you can review the considerations involved in creating a software-defined application services strategy; identify opportunities to improve automation of application services and operations. Finally, use the software-defined application services checklist at the end of the guide to identify key priorities in your choice of application service solutions for your enterprise.
Tags : 
avi networks, best practices, application services, modern data centers, public cloud initiatives, load balancer, load balancing, application delivery, application delivery controller, adc, software-defined networks, sdn, networking, it management
    
Avi Networks
Published By: IBM     Published Date: Apr 20, 2017
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives. UEM is not limited to PCs, tablets and smartphones. Smart devices, broadly grouped as part of the IoT, will increasingly become included in UEM. Devices such as Apple TVs, printers and smartwatches are identifiable examples of IoT devices managed by EMM tools. However, not all IoT objects will fall under the realm of EMM tools. Some devices may be managed directly by manufacturers. Other types of devices will have proprietary management tools. And many devices will not need to be managed at all. However, it is clear that the diversity and number of devices will continue to grow, and IT organizations must be ready.
Tags : 
auditing, enterprise data protection, mobile device management, mobile application management, mobile identity, policy enforcement, content optimization
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Ninety-nine percent of the enterprise workforce currently uses mobile devices – smart phones and tablets – to perform their jobs today. Nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. Reflecting on the survey results provides the opportunity to take a broad view of enterprise mobility and realize how business transformation has begun. Nearly all enterprises now incorporate mobility in their work, and a majority now sees tangible business results from mobility. Organizations are seeing greater efficiencies and productivity from mobile workers.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: Service Now     Published Date: Feb 09, 2018
We’re at a tipping point for customer service operations. Customers contact enterprises at a greater rate over a greater number of channels — shifting between them seamlessly and even using channels simultaneously. Enterprises react by adding headcount — an unsustainable strategy. You must transform operations by developing strength in automation, AI, and knowledge. This report reveals the top 10 customer service trends in 2018 for application development and delivery (AD&D) pros supporting customer service.
Tags : 
    
Service Now
Published By: Avi Networks     Published Date: Aug 17, 2018
Flexible infrastructure choices and application architectures are changing the way that modern enterprises run their computing. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. With application owners seeking public-cloud-like simplicity and agility in their own data centers, IT teams are under pressure to reduce wait times to provision applications and updates.
Tags : 
    
Avi Networks
Published By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security – without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, you’ll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: Oracle     Published Date: Oct 27, 2015
This white paper discusses how organisations can accomplish these things by moving development of enterprise applications to the cloud by leveraging Platform-as-a-Service (PaaS), and in the process reduce development costs, avoid complexity, and increase developer productivity.
Tags : 
cloud, cloud computing, enterprise applications, paas, it solutions, cloud, platform-as-a-service, cloud platform
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This white paper discusses how organisations can accomplish these things by moving development of enterprise applications to the cloud by leveraging Platform-as-a-Service (PaaS), and in the process reduce development costs, avoid complexity, and increase developer productivity.
Tags : 
cloud, cloud computing, enterprise applications, paas, it solutions, cloud, platform-as-a-service, cloud platform
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This white paper discusses how organisations can accomplish these things by moving development of enterprise applications to the cloud by leveraging Platform-as-a-Service (PaaS), and in the process reduce development costs, avoid complexity, and increase developer productivity.
Tags : 
cloud, cloud computing, enterprise applications, paas, it solutions, cloud, platform-as-a-service, cloud platform
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This white paper discusses how organisations can accomplish these things by moving development of enterprise applications to the cloud by leveraging Platform-as-a-Service (PaaS), and in the process reduce development costs, avoid complexity, and increase developer productivity.
Tags : 
cloud, cloud computing, enterprise applications, paas, it solutions, cloud, platform-as-a-service, cloud platform
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This white paper discusses how organisations can accomplish these things by moving development of enterprise applications to the cloud by leveraging Platform-as-a-Service (PaaS), and in the process reduce development costs, avoid complexity, and increase developer productivity.
Tags : 
cloud, cloud computing, enterprise applications, paas, it solutions, cloud, platform-as-a-service, cloud platform
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This white paper discusses how organisations can accomplish these things by moving development of enterprise applications to the cloud by leveraging Platform-as-a-Service (PaaS), and in the process reduce development costs, avoid complexity, and increase developer productivity.
Tags : 
cloud, cloud computing, enterprise applications, paas, it solutions, cloud, platform-as-a-service, cloud platform
    
Oracle
Published By: Logicalis     Published Date: Sep 10, 2014
Video solutions eliminate geographic boundaries and allow you to sit across a conference table from fellow participants, regardless of where they are in the world. By using unified video collaboration solutions for a virtually unlimited number of applications, you can boost productivity and communication throughout your organization, even across the largest of enterprises—allowing you to become more agile and responsive to changing needs. Download this white paper to learn how.
Tags : 
logicalis, cisco, cisco systems, video communication, video solutions, enterprise video technologies, enterprise applications, employee collaboration, innovation
    
Logicalis
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.