web applications

Results 201 - 225 of 342Sort Results By: Published Date | Title | Company Name
By: Qualys     Published Date: Nov 05, 2013
Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-used applications, which has drawn the attention of cyber criminals – making it a potential Achilles heel for security.
Tags : qualys, qualys browsercheck, security, web security, application security, web browser, cyber criminals, vulnerability, browser security, business technology
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.
Tags : qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services, disaster recovery, data security, vulnerabilities management, security services, web applications, virtualisation, mobility
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime, hacking breaches, security, application security, web application security, risk management, robustness, scanning, cloud platform
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Web applications have recently emerged as a top cybercriminal attack vector, and organizations that don’t take a proactive approach to app security may be setting themselves up for disaster. More than one-third of organizations still don’t have an application security program in place – what can you do to make sure you’re protected? Consult this informative survey today to discover your peers’ proven practices for app security success, and learn what you can do to stay protected – read on to get started.
Tags : qualys, sans, sans survery, application, application security, web applications, web applications security, cybercriminals, app security, application security program, protection, customer facing web applications, vulnerability management
     Qualys
By: Internap     Published Date: Dec 29, 2011
Performance plays a vital role in the success of your online applications and web-based content - whether you are processing millions of transactions, delivering business-critical software or servicing a massive gaming community. Research shows that even one second of delay on a typical website can result in 7% fewer customer conversions. For many businesses, that means lost revenue and damage to their brand. As cloud is becoming an increasingly viable infrastructure choice for enterprise applications, it is essential to select a high-performance cloud service that will support the best possible experience for your end users. Determining the right cloud solution for your needs also necessitates thorough analysis of the level of security, control, customization and support your business requires. In this webcast, thought leaders from Gartner and Internap outline the performance factors that affect your cloud decision-making process and discuss how to optimize your IT Infrastructure to create satisfied end users.
Tags : enterprise cloud, cloud computing, technology, cloud solution
     Internap
By: Ektron     Published Date: Feb 04, 2009
As Web sites move toward a richer user experience, rich internet applications (RIAs) are becoming the method of choice to dynamically engage site visitors. But even as sites are designed around RIAs built on Microsoft Silverlight and Adobe Flex, businesses and organizations are looking for the best possible ways to manage the data that these Web applications rely on.
Tags : ria, html, rich internet applications, multimedia, data management, silverlight, adobe flex
     Ektron
By: Marketo, INC.     Published Date: Sep 25, 2008
In this free 15-minute podcast, Laura Ramos of Forrester Research explains how B2B marketers can leverage Web 2.0.  Listen at your desk or on the road and discover: how to enhance marketing ROI by driving real engagement and dialog ... how to reach key decision-makers ... reasons behind the move from demand generation toward more organic demand management ... and more.  Understanding Web 2.0 tactics is a must for B2B marketers who want to compete.  Find out why; listen to this free podcast now.
Tags : using digital, promo code: wp2, marketing, b2b marketing, social marketing, social networks, social networking, interactive direct marketing, interactive demand generation, digital media, engagement, rich media, rich web, rich applications, blogging, rss, social networks, facebook, myspace, digital marketing
     Marketo, INC.
By: QuinStreet     Published Date: Feb 05, 2009
This white paper details how Web 2.0 technologies support business strategies by improving efficiency and productivity as well as harnessing knowledge through collaboration. They also reduce IT costs by simplifying integration and improving IT administration and maintenance.
Tags : quinstreet, web 2.0, social computing technologies, erp applications, enterprise applications, technology applications, data management
     QuinStreet
By: WebEx     Published Date: Apr 02, 2009
IDG Research Services recently queried 144 CIO Magazine subscribers to gain insight into how and why collaboration technology is creating competitive advantage. This summary report explores different market trends with commentary from key respondents as well as WebEx's Knight, an industry expert. Learn more today!
Tags : webex, collaborative efforts, on-demand, collaboration technology, competitive advantage, webex knight, firewall, external audiences, collaboration applications, online training, online meetings, portals, instant messaging, online webinars/events, human resources technology, enabling knowledge workers, erp, crm, external audiences, vendor solutions
     WebEx
By: WebEx     Published Date: Apr 02, 2009
This document educates end-users and decision makers on Software-as-a-Service (SaaS), where it differs from traditional software, and what the key benefits are when deploying SaaS applications. In addition, this document also provides the reader with a comprehensive look at the Total Cost of Ownership (TCO) analysis any decision maker should complete before making a choice between a SaaS or a traditional software deployment.
Tags : webex, software-as-a-service, saas, saas applications, tco, total cost of ownership, traditional software deployment, break-even point, on-demand software, apis, multi-tenant, single-tenant, application service provider, asp, it requirements, core software applications, context software applications, cost allocations, eos, groupware applications
     WebEx
By: Trend Micro, Inc.     Published Date: Nov 25, 2009
The increasing adoption of electronic health records greatly complicates the tasks of security and privacy requirements. In this webcast, *Trend Micro* and *Beth Israel Deaconess Medical Center* discuss how to successfully navigate through the challenges associated with securing Web-based applications.
Tags : trend, trend micro, webcast, security, hitrust, web, privacy, ehrs, health records
     Trend Micro, Inc.
By: IBM ILOG.     Published Date: Oct 26, 2009
This case study will showcase the challenges of clinical trial data management, but the highlighted techniques are applicable to any business needing smart, dynamic and adaptive Web-based user interfaces.
Tags : brms, business logic, business rules, claims management, data management, data validation, healthcare, productivity, web-based applications
     IBM ILOG.
By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : web threat, content filtering, the cloud, security, web gateway, cloud-based applications, business technology
     Webroot
By: Asure Software     Published Date: Sep 10, 2012
In this case study, you'll learn how DPT's research into time and attendance systems lead them to Asure Software. After reviewing various vendors, DPT selected Asure Software as their vendor and partner because they knew AsureForceT Time & Labor Management Solutions would provide accuracy and room for company growth.
Tags : time and attendance systems, workforce management, payroll solutions, human resources, web-based applications
     Asure Software
By: Silver Peak     Published Date: Oct 28, 2013
Enterprises have long been battling the inherent performance limitations of Wide Area Networks (WANs) when delivering applications to remote offices. Caching emerged in the 1990’s as a potential way of addressing this problem, accelerating the performance of specific applications, such as web services, while reducing overall WAN traffic. While caching achieved reasonable success for a few short years, the market for these point products ultimately subsided as a result of several operational and functional limitations. Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. The result is a complete solution for improved application delivery across a distributed enterprise environment.
Tags : silver peak, network memory, application caching, wan, caching, networking
     Silver Peak
By: Oracle     Published Date: Feb 03, 2014
Take a deep dive into how and why Oracle Tap was created and learn how the native iPad application redefines the level of productivity that can be achieved while on-the-go.
Tags : oracle, oracle tap, webcast, ipad, application, productivity, enterprise applications
     Oracle
By: Oracle     Published Date: Feb 03, 2014
Take a deep dive into how and why Oracle Tap was created and learn how the native iPad application redefines the level of productivity that can be achieved while on-the-go.
Tags : oracle, oracle tap, webcast, ipad, application, productivity, enterprise applications, electronics, business technology
     Oracle
By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : secure, ios, android, mobile security, data protection, security
     Lumension
By: Adobe     Published Date: Mar 16, 2016
In this white paper learn how e-signatures are making workflows easier and more productive than ever before. Learn how e-signatures remove the last barrier between a hybrid paper-to-digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract—sales, employment and hiring, purchase orders, legal agreements, and more.
Tags : digital, digital systems, mobile, broadband, wireless, web applications, networking, knowledge management, enterprise applications
     Adobe
By: Okta     Published Date: May 12, 2017
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications.
Tags : 
     Okta
By: CloudEndure     Published Date: Mar 23, 2016
While a public cloud provides an easy and scalable way to manage and deploy your app or website, you also need to have a contingency plan for business continuity and disaster recovery. Often overlooked on Amazon Web Services (AWS), an extremely effective cloud disaster recovery (DR) strategy is to spread the application stack across regions versus availability zones. This eBook provides a guide for planning and implementing a robust cross-region cloud disaster recovery (CDR) plan for business continuity and critical application uptime on AWS-based applications.
Tags : cloudendure, aws, cloud disaster recovery plan, disaster recovery, cloud
     CloudEndure
By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : location-based bi, business value, geographic enhancement
     SAP
By: Flimp Media     Published Date: Feb 02, 2010
This report, which describes the emerging web video direct marketing category, discusses how online video marketing isn't just for advertisers anymore; explains the applications and benefits of interactive web video and in particular video landing pages for direct marketing, communications and sales; and explores how new technologies are enabling users to create, distribute and measure effective email video marketing campaigns without programming or advanced technical skills.
Tags : flimp, b2b, idc, intelligent digital collateral, digital sales, direct marketing, analytics, rich media, social media, online video
     Flimp Media
By: Qualys     Published Date: Jan 11, 2017
When web applications are breached, enormous amounts of sensitive business data can be lost. According to Verizon’s 2014 Data Breach Investigations Report, web application attacks more than doubled in 2013 to become the #1 cause of security incidents
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: WebEx Communications     Published Date: Dec 14, 2007
Health services organizations around the world are discovering that they can optimize business strategies while protecting patient records. These companies use WebEx online applications to reach and support a growing number of employees and customers. They also follow HIPAA mandates using WebEx secure connections that encrypt all content. This content is never uploaded to any WebEx server, ensuring the highest level of data security and confidentiality.
Tags : online presentations, online training, staff training, interactive selling, system management, remote support, web meetings, online meetings, webinars, hipaa compliance, ensure compliance, system rollout, community education, community programs, webex
     WebEx Communications
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com