enterprise applications

Results 326 - 350 of 802Sort Results By: Published Date | Title | Company Name
By: Avi Networks     Published Date: Aug 17, 2018
Flexible infrastructure choices and application architectures are changing the way that modern enterprises run their computing. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. With application owners seeking public-cloud-like simplicity and agility in their own data centers, IT teams are under pressure to reduce wait times to provision applications and updates.
Tags : 
     Avi Networks
By: Cloudroute     Published Date: Jun 01, 2016
Keep your employees productive on their essential applications and favorite devices, and your company data protected with enterprise mobility solutions. Deliver and support Single sign-on to thousands of popular SaaS applications like Salesforce, Concur, and Workday. Manage iOS, Android, and Windows computers and mobile devices from one platform. And, finally, get enterprise grade security for your organization by identifying threats before they can damage your business.
Tags : 
     Cloudroute
By: CA Technologies EMEA     Published Date: May 23, 2018
CA Live API Creator creates application back-ends exposing enterprise-class REST/JSON APIs, including access to existing data and applications. It enables developers to create new REST endpoints that join data across diverse data sources using a point–and–click approach. API owners can extend the API with declarative business rules, JavaScript event processing, role-based security and interactive testing. The CA Live API Creator Reactive Logic model yields systems that are highly scalable and reliable. Its optimized services run more efficiently and with less fragility than services manually coded by skilled developers and architects.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
     CA Technologies EMEA
By: Adobe     Published Date: Nov 09, 2017
In our 40-criteria evaluation of enterprise marketing software suites (EMSS) providers, we identified the nine most significant ones — Adobe, Experian Marketing Services, IBM, Marketo, Oracle, Salesforce, SAP, SAS, and Teradata Marketing Applications — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2C marketing professionals make the right choice.
Tags : 
     Adobe
By: OKTA     Published Date: Sep 26, 2017
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications.
Tags : 
     OKTA
By: Tricentis     Published Date: Jan 22, 2019
With today’s enterprise IT landscape evolving faster than ever, it’s hardly surprising that IT teams find it difficult to keep pace with the seemingly non-stop testing requirement for new software. That’s particularly the case in the SAP arena, where end-to-end SAP-enabled business processes now frequently span multiple SAP applications and platforms, and increasingly draw on multiple SaaS applications – all with their own separate release cycles.
Tags : 
     Tricentis
By: Okta     Published Date: Apr 29, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : mfa, authentication. mobile, applications, okta, security, it management
     Okta
By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : security, cloud, application delivery, authentication, access control, application security, silos, password fatigue, iam
     F5 Networks Inc
By: Riverbed     Published Date: Feb 26, 2015
How can IT achieve the flexibility and agility it needs to offer multiple types of applications in multiple locations? Just as enterprises take advantage of applications hosted in multiple locations (i.e., public clouds, private clouds, or SaaS applications), they take advantage of different networks for different reasons (i.e. performance, backup, remote access). These could be MPLS links, ATM links, traditional Internet connections, or VPN lines. Enterprises, in effect, are already building hybrid networks, and those combined with the elements of hybrid clouds create the hybrid enterprise.
Tags : private clouds, public clouds, saas applications, vpn lines, hybrid clouds, hybrid enterprise
     Riverbed
By: Riverbed     Published Date: Apr 24, 2015
This ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) whitepaper examines the scope of challenges for assuring web-based and SaaS application performance, and reviews a solution offered by Riverbed that is designed to meet these new requirements.
Tags : web-based applications, saas, enterprise-class applications, it management, user experience, cost efficiency and flexibility
     Riverbed
By: Riverbed     Published Date: Jul 22, 2015
As enterprise computing has evolved, businesses have been shifting to a “hybrid enterprise” where core applications and data can be located in private data centers and public clouds. The growth of hybrid cloud deployments accelerated the transition to hybrid wide-area networks (WANs). Private networks, such as MPLS, are being joined by Internet connections that offer a choice in delivery channels—costly, but predictable, networks for mission-critical loads and cheaper public networks for bulk loads such as data backups.
Tags : hybrid enterprise, private data centers, public clouds, wans, data backups, it management
     Riverbed
By: Riverbed     Published Date: Nov 30, 2016
Digital transformation on the 3rd Platform continues to present unprecedented opportunities and challenges for enterprise networks and the IT professionals who operate them. Indeed, the requirements associated with cloud computing have already reverberated through data center networking, with software-defined networking (SDN) arising as an architectural approach that provided the network with the agility and responsiveness that it lacked previously but has come to require. Now, the focus is turning to how the WAN must change to accommodate the requirements of cloud applications and services. Fortunately, technologies such as hybrid WAN and software-defined WAN (SD-WAN) are coming to the rescue, giving enterprise IT the means to allow the WAN to meet these challenges directly.
Tags : 
     Riverbed
By: F5 Networks Inc     Published Date: Jan 31, 2017
Organizations considering moving enterprise applications to the public cloud should ensure that they also move the application delivery services their applications rely on in the data center. In addition, cloud migration presents an opportunity to organize and rationalize security and access, gain visibility into cloud-based application traffic, and architect a strong disaster recovery plan. Download to read the 5 rules to follow when lifting and shifting apps to the the cloud.
Tags : apps, cloud, enterprise applications, public cloud, networking
     F5 Networks Inc
By: F5 Networks Inc     Published Date: May 03, 2017
Building out a dedicated infrastructure with the agility, scalability, and effciency of a public cloud—while enjoying increased levels of control and security—can help enterprises boost agility and improve operational ef?ciency. However, while most private cloud networking services provide basic load balancing functionality, they lack important application delivery features, putting the performance, availability, and security of applications at risk. As private clouds increasingly host mission-critical production applications, advanced application delivery services for layers 4 through 7 are becoming essential. End-to-end integration, orchestration, and automation of the needed application delivery networking and security services are also critical to improve application time-to-market and operational ef?ciency.
Tags : cloud, cloud security, efficiency, security, public cloud
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Aug 25, 2017
With the cloud transforming application development and deployment—enabling organizations to improve flexibility, automate processes, and decrease time to market—some big questions remain. One of the most important issues an organization must address is how it can best employ the smarter tools and limitless scale that the cloud offers. One way that enterprises take advantage of the benefits of the cloud is by deploying their own private cloud, which is a computing model that fosters agility while allowing organizations to maintain control of their infrastructure, while better securing their applications and their data.
Tags : 
     F5 Networks Inc
By: Amazon Web Services     Published Date: Sep 05, 2018
Today’s businesses generate staggering amounts of data, and learning to get the most value from that data is paramount to success. Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on-demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Amazon Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. Organizations choose Amazon Redshift for its affordability, flexibility, and powerful feature set: • Enterprise-class relational database query and management system • Supports client connections with many types of applications, including business intelligence (BI), reporting, data, and analytics tools • Execute analytic queries in order to retrieve, compare, and evaluate large amounts of data in multiple-stage operations
Tags : 
     Amazon Web Services
By: Oracle     Published Date: Sep 08, 2016
This report examines how two major players in the grocery, pharmacy and wholesale markets are leveraging loss prevention technology to centralize enterprise-wide data collection, analysis, and reporting to protect profits, reduce shrink and provide actionable insight across the organization from merchandising and planning to supply chain.
Tags : analytics, loss prevention, enterprise applications, best practices, networking
     Oracle
By: HP     Published Date: Sep 06, 2011
Read how blades are the best infrastructure choice for an extremely wide range of enterprise applications and use cases.
Tags : hp bladesystem, server deployment, storage, flexfabric, data centers, data center, infrastructure
     HP
By: Adaptive Growth     Published Date: Feb 25, 2008
In what practical ways – if any – is ERP implementation project success different from the absence of failure? Both casual and thorough analysis of ERP failure agree on several interesting points.
Tags : erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
     Adaptive Growth
By: Adaptive Growth     Published Date: Mar 12, 2008
ERP system acquisition projects are rarely deemed to fail.  All the well-advertised failures come later, during implementation and afterward.  Nevertheless, the seeds of these failures are invariably planted in the earliest stages of ERP acquisition planning.
Tags : erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
     Adaptive Growth
By: Adaptive Growth     Published Date: Mar 12, 2008
ERP implementations fail – when they do – because implementation projects allow a few well-known risks to go unmanaged. These risks go unmanaged because the control of results slips from buyer to seller.  It doesn’t have to work that way.
Tags : erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
     Adaptive Growth
By: Adaptive Growth     Published Date: Mar 12, 2008
It is a truism that in any complex activity, the critical, defining decisions should be made as early in the process as possible.  In ERP implementation projects this principle is routinely undermined by the nearly universal practice of separating acquisition and implementation activities into separate projects, performed by separate teams operating under separate control.
Tags : erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
     Adaptive Growth
By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : entrust, identitityguard, enterprise security, networking, it management
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : identity guard, enterprise, securing identities, corporate network, mobile platforms, security
     Entrust Datacard
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com