"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

enterprise application

Results 351 - 375 of 1102Sort Results By: Published Date | Title | Company Name
Published By: Cybric     Published Date: Oct 30, 2017
Learn how a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Development velocity is accelerating as enterprises adopt DevOps methodologies, yet security is still not integrated into the coding and deployment processes. Security teams are falling further behind as their manual processes and controls can’t scale at the same rate as development. This paper discusses: The impact the current approach to application security has on business How shifting security left in the application development process, seamlessly integrating it “early and often,” can accelerate innovation Questions the Board and C-suite are now asking about security: are you prepared? Read this paper to learn how, by shifting security left in the development process, it’s now no longer an obstacle to velocity, innovation and competitiveness. Instead, it’s an asset.
Tags : 
application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience, application security tools, cio, ciso, appsec
    
Cybric
Published By: Akamai Technologies     Published Date: May 07, 2018
Learn about Akamai Cloud Security Solutions Akamai’s web application firewall and DDoS solutions include easy-to-deploy, low-maintenance solutions for enterprises.
Tags : 
identity, theft, revenue, technical, support, data, confidential
    
Akamai Technologies
Published By: Citrix     Published Date: Jun 15, 2018
To meet the growing challenges of a competitive world economy, a digital transformation is taking place in the enterprise. Organizations realize that to be competitive they need to be more agile. They need to reach their customers wherever they are, and they need to be able to scale their applications to meet customer demands. To meet these challenges, organizations are deploying new microservice applications that are changing the application delivery environment. These applications are agile, configured to enable new features to be added without disrupting applications in production, and designed to automatically instantiate instances in response to increasing user demand. In short, microservices are drastically changing the way that applications are deployed and managed. This introduces a high level of complexity to network infrastructures because traditional applications are not going away. Applications will continue to be designed for both microservices and traditional 3-tier imple
Tags : 
    
Citrix
Published By: Dynatrace     Published Date: Apr 16, 2018
While enterprises are modernizing their applications and moving to DevOps to avoid digital disruption… - 91% of executives think their business will be disrupted by digital technologies in the next 12 months. - 97% of executives say that becoming a digital organization is important to their future. - 87% of companies think that digital transformation is a competitive opportunity. - 76% of CEOs are looking to invest in or acquire new technologies to manage disruption.
Tags : 
    
Dynatrace
Published By: Epicor     Published Date: Apr 01, 2009
This white paper details how Web 2.0 technologies support business strategies by improving efficiency, productivity, and collaboration.
Tags : 
epicor, web 2.0 technologies, enterprise applications, epicor 9 solution, enhancing search results, rss, data management, web services
    
Epicor
Published By: Epicor     Published Date: Apr 01, 2009
This white paper presents how to use technology systems to help your business promote corporate social responsibility.
Tags : 
corporate social responsibility, enterprise applications, enterprise resource planning, epicor, corporate responsibility, green it, csr, globalization, strategic sourcing, procurement, process improvement, product lifecycle management, plm, virtualization
    
Epicor
Published By: BlueArc Corporation     Published Date: Mar 31, 2008
BlueArc’s Titan 3000 Series is designed to meet the requirements of today’s sophisticated enterprise data centers and vertical applications with new levels of storage performance, scalability and reliability. Titan is the first storage solution that consolidates and manages up to 4 petabytes of data in a single storage pool.
Tags : 
titan, tiered storage, storage, bluearc, storage system, network management, network attached storage, storage area networks, storage management
    
BlueArc Corporation
Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Cloud computing has a lot of appeal, from auto-scaling to lower costs, and it's all just a few clicks away. Thus, the big question is not "why cloud?" but rather "how cloud?"
Tags : 
cloud, cloud computing, autoscaling, lower costs, applications technology, applications platform, it productivity, application lifecycle, tomcat, java ee, virtualization, multiple platforms, platform-as-a-service, paas, developer productivity, maven, hudson, production support, production maintenance, cloud architecture
    
Red Hat, Inc.
Published By: Red Hat, Inc.     Published Date: Jul 13, 2012
JBoss Enterprise Application Platform Comparison Calculator
Tags : 
jboss enterprise, application platform, network deployment
    
Red Hat, Inc.
Published By: Progress Software     Published Date: Feb 03, 2010
Enterprises invest in packaged applications, development systems, testing, services oriented architectures, middleware and analytics to align process automation with business cycles. When IT is successful in this alignment, cycles accelerate and we see improvements in business flexibility that we now take for granted.
Tags : 
bpm, progress, cep, navigation systems, idc, middleware, analytics, business process management, software testing
    
Progress Software
Published By: Red Hat     Published Date: Dec 27, 2012
In this paper, Frost & Sullivan examines historical concerns about Linux virtualization, and assess why, when, and how enterprises can safely virtualize their critical Linux workloads. They also review a Linux virtualization that meets needs.
Tags : 
red hat, linux, workload, virtualization, critical workload, enterprise applications, it environment, data management, data center
    
Red Hat
Published By: GFI Software     Published Date: Oct 06, 2011
Download a free 30-Day Trial of GFI FaxMaker - GFI FaxMaker makes sending and receiving faxes an efficient, simple and cost-effective process.
Tags : 
gfi fax maker, server, faxing, benefits, free trial, enterprise applications, hippa compliance, voip, erp, ip faxing, crm, best practices, business process automation, business process management
    
GFI Software
Published By: nimsoft     Published Date: Apr 10, 2012
According to Forrester Research, "end-user experience has to be the benchmark for enterprise application performance*," which of course makes perfect sense, given that enterprises are spending billions of dollars to enable productivity and automation gains as specifically directed by end-users. Read to find out more.
Tags : 
nimsoft, end user, technology, it management, service, application, analytics, technology management, analytical applications, project management, service management
    
nimsoft
Published By: Symantec     Published Date: Nov 14, 2012
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. Trend Micro Deep Security (DS) 8. Read to learn how well Symantec did against others.
Tags : 
symantec, symantec endpoint protection 12.1, vmware, tolly report, security, enterprise applications
    
Symantec
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
As companies embrace the use of individual liable mobile devices to access corporate applications and data, Good provides guidance on creating individual liable usage policies.
Tags : 
byod, bring your own device, security, policy considerations, device, enterprise applications, virtualization, cloud computing
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
The consumerization of IT is coming. It's a given that employees will bring their own devices to work or will want to work on devices away from the office. The adoption of smart devices has set expectations, causing the "I want my iPad" phenomena
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, it implementation, cloud computing
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Increase of BYOD programs in the enterprise has introduced questions to those in charge of enterprise mobility. Fierce MobileIT's ebook, "Securing the Mobile Workforce,"covers many of the trends and challenges of securing corporate data on a device.
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, data management, data center
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
virtualization, collaboration, enterprise applications, cloud computing, mobility management, mobile collaboration
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Learn how to move beyond single task apps and enable the app workflows that help keep your mobile workforce productive and secure.
Tags : 
mobile collaboration, secure collaboration, secure mobile application, enterprise mobile applications, enterprise mobile apps, enterprise collaboration, business case
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Mobile apps are the key to productivity and are proving to be a competitive advantage for enterprises across every industry. “Are you App Able”, shows how companies today are capitalizing on secure mobile apps to drive LOB advantages and revenue.
Tags : 
mobile collaboration, secure collaboration, secure mobile application, enterprise mobile applications, enterprise mobile apps, enterprise collaboration
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Security and management are critical to enterprise mobility—but they’re also complex. Dive deeper in this virtual roundtable with guests from Forrester Research, Inc., Good, and BoxTone. Learn more about mobile security trends, concerns, and myths.
Tags : 
mdm, mobile device management, emm, enterprise mobility, mobile application management, enterprise mobility, mobile security
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile collaboration is fast, efficient, and necessary. But before you spend your time and money on a solution, you’d better learn what works—and what doesn’t. Read this guide to learn what to consider, mistakes to avoid, and tips for data security.
Tags : 
mobile collaboration, secure collaboration, enterprise mobile applications, enterprise mobile apps, enterprise collaboration, employee collaboration
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile apps are the ultimate corporate dilemma: They turbo-charge productivity—but also bring security risks. You need a mobile app security strategy to navigate the challenge. Read this guide to learn the top 10 must-haves as you build yours.
Tags : 
mobile applications, mobile security, mobile application management, mobile app security, secure mobile application, enterprise mobile applications
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
You can’t slow down technology. But you can get ahead of it. Learn how in this mobile trend report from Gartner. Learn the latest in devices, app stores, and cloud services. You’ll even get operational tips to manage mobile costs, risk, and support.
Tags : 
consumerization, mobile technology, infrastructure and operations, mobile management, mobile security, enterprise mobility, mobile application management
    
Good Technology Corporation
Published By: Yapmo     Published Date: Mar 26, 2013
Learn how Loop + Video has enabled Hyatt to better engage with employees through their own private video sharing platform.
Tags : 
training, communication, collaboration, enterprise applications, best practices, technology
    
Yapmo
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory