web app

Results 101 - 125 of 942Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : 
blue coat, ssl, ssl visibility
    
Blue Coat Systems
Published By: VMWare - vFabric     Published Date: May 10, 2012
View this webcast to learn how to cost-effectively run your applications & balance your load across virtual machines.
Tags : 
vfabric, balancing, load balancing, elastic, networking, virual, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, virtualization, cloud computing, infrastructure
    
VMWare - vFabric
Published By: VMWare - vFabric     Published Date: May 10, 2012
Attend this webcast to learn how VMware vFabric Application Director can help you ensure simplified and highly flexible application provisioning and create best practice application architectures to be reused by other functions in your organization.
Tags : 
applications, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, provisioning, vfabric, networking, data management, virtualization, cloud computing, infrastructure, design and facilities
    
VMWare - vFabric
Published By: VMWare - vFabric     Published Date: May 10, 2012
By migrating all web applications to VMware vFabric tc Server, DSD achieved fast testing and live deployments, proactive problem solving and high website availability. This case study is essential reading for anyone interested in quick turn around!
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, networking, data management, virtualization, cloud computing, infrastructure, design and facilities
    
VMWare - vFabric
Published By: Oracle     Published Date: Aug 08, 2013
Take a deep dive into how and why Oracle Tap was created and learn how the native iPad application redefines the level of productivity that can be achieved while on-the-go.
Tags : 
oracle, oracle tap, webcast, ipad, application, productivity, software development, it management, knowledge management, enterprise applications
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Take a deep dive into how and why Oracle Tap was created and learn how the native iPad application redefines the level of productivity that can be achieved while on-the-go.
Tags : 
oracle, oracle tap, webcast, ipad, application, productivity, enterprise applications, business technology
    
Oracle
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: SAP     Published Date: Nov 01, 2017
Dieses Webinar gibt Ihnen einen Überblick über die SAP HANA Enterprise Cloud (HEC). Wir zeigen Ihnen anhand von Beispielen die Möglichkeiten des HEC Services für Ihre SAP-Applikationen, auch im Zusammenspiel mit SAP S/4HANA. Dieses neueste ERP-Produkt der SAP eröffnet Ihnen alle Optionen einer digitalisierten Unternehmensausrichtung.
Tags : 
    
SAP
Published By: Symantec     Published Date: Jul 09, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud applications, swgs, secure web gateway's, saas
    
Symantec
Published By: IBM     Published Date: Nov 28, 2011
Download this IBM white paper from Web Buyer's Guide to learn the next generation solutions for application servers.
Tags : 
solutions, applications, hybrid, computing, scaled-out, web-based applications
    
IBM
Published By: Adobe     Published Date: Jul 09, 2014
This paper outlines factors that influence successful business results and provides tips to achieve efficiency in content design, management, and publishing, ultimately increasing the return on your investment in responsive design.
Tags : 
responsive web design, adobe
    
Adobe
Published By: Cleversafe     Published Date: Mar 29, 2013
Cloud applications and web-based services, such photo sharing sites, create some monumental challenges for a storage infrastructure.
Tags : 
raid, cloud storage, storage, replication, capacity, bandwith, efficiency, web applications, backup and recovery, network attached storage, storage management, storage virtualization, application integration, application performance management, best practices, business technology
    
Cleversafe
Published By: Sitecore     Published Date: Mar 27, 2017
In a digital era where 74% of online consumers get frustrated with websites when content appears that has nothing to do with their interests, it’s time for marketers to think differently about how they personalize the shopping experience, and we’ll show you how. Download now!
Tags : 
    
Sitecore
Published By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: Limelight     Published Date: Feb 16, 2018
DDoS attacks have long been known as the main form of cyber attack risk. “The Financial Inspection Manual” revised by the Japanese government’s Financial Services Agency in April 2015, identifies the risk of "DDoS attacks", and the need to take countermeasures is strongly emphasized. Other government agencies also acknowledge the frequency and severity of DDoS attacks. However, a clear method to completely prevent DDoS attacks has not been established yet. Why is that? What are the best measures that companies can take at the present time?
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept