key applications

Results 1 - 25 of 157Sort Results By: Published Date | Title | Company Name
Published By: Rackspace     Published Date: May 28, 2019
Established organizations around the world are grappling with the dawn of the digital transformation (DX) economy as they find themselves disrupted by digital natives. In the digital age, traditional organizations risk being disrupted if they keep the status quo. For resource-constrained IT organizations, cloud services will be the foundation for their DX journey. This IDC InfoBrief takes a closer look at the new infrastructural requirements of transforming organizations and how managed cloud services are enabling their DX journey – with three key industries in the spotlight: • Retail – Retailers are expected to be significantly more mature in their cloud adoption in two years, and the next 12 months will see more deployments of hosted private cloud to support their business goals. • Travel and Hospitality – Enterprises will invest in hosted private cloud and IaaS, and adopt cloud-based applications to gain positive business outcomes from supply chain, enhanced guest experience and p
Tags : 
managed cloud services, digital transformation, retail, travel, hospitality
    
Rackspace
Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
Published By: Red Hat     Published Date: Aug 22, 2018
Digital transformation projects present many technological and organizational challenges. A key challenge is developing modern, cloud-native applications that connect customers directly using automated business processes and decisions. Creating these applications requires a radical change in how software is built—moving away from traditional, IT-led software development to a process that lets both developers and business experts contribute directly to application logic.
Tags : 
    
Red Hat
Published By: SAS     Published Date: Jan 17, 2018
Competitive advantage from analytics is changing, and for the better. For the first time in four years, MIT Sloan Management Review found an increasing ability to strategically innovate with analytics based on interviews with more than 2,600 practitioners and scholars globally. Learn more about key findings, including: Wider use of analytics, better knowledge of its benefits and greater focus on applications have reversed a trend on the benefits of analytics. Return on investment for analytics stems from the governing and sharing of data throughout the organization. Machine learning enables organizations to discover more insight from their data, allowing employees to focus on other critical responsibilities.
Tags : 
    
SAS
Published By: HP     Published Date: Jan 21, 2015
Autodesk's Lynn Allen gives pointers on getting greater performance from your hardware and maximizing your productivity with key features in BIM applications.
Tags : 
hewlett-packard, bim, autodesk, increased productivity, improved hardware performance
    
HP
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: Dell EMC     Published Date: Mar 08, 2019
Digital transformation means many key parts of the business now depend on specific and often very demanding applications. The outcome of these applications can determine the health of the company. Running them on commodity PCs is a risky strategy. Workstations designed to tackle the most challenging workloads can help ensure a positive outcome. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC
Published By: Unit4     Published Date: Feb 18, 2019
Looking to buy a Professional Services Automation (PSA) solution? Learn how you can drive greater revenue and employee billable utilization across the whole business with this Buyer’s Guide. Providing an overview of the key trends, business processes, selection criteria, as well as the major business impact of PSA, it includes expert guidance to help project- and services-based businesses evaluate and choose PSA applications.
Tags : 
psa, productivity, professional services automation, professional services, services automation
    
Unit4
Published By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : 
attacks, cyberattacks, protect certificates, how to remediate breaches, security, security applications, access control, anti spam, anti spyware, anti virus, security management, security policies
    
Venafi
Published By: Entrust Datacard     Published Date: May 10, 2017
The rapid rise of digital business is moving public key infrastructure (PKI) into the spotlight. Once commonly viewed as a deep-weeds technology reserved for niche applications, PKI is now emerging as a core technology for securing cloud, mobile and Internet of Things (IoT) initiatives.
Tags : 
digital, cloud, cloud computing, internet of things, intrastructure, virtualization, infrastructure
    
Entrust Datacard
Published By: MicroStrategy     Published Date: Aug 12, 2012
A panel of industry experts, including Steve Cornett, Director of Enterprise Information Services with Lowe's Companies, Inc.,
Tags : 
microstrategy, mobile, steve cornett, lowe's, roi
    
MicroStrategy
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.
Tags : 
saas, application, line-of-business owners, lobs, software-as-a-service, technology, strategy, networking, it management, data management, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.
Tags : 
strategies, saas, application, lob, bluecoat, cloud computing, infrastructure
    
Blue Coat Systems
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: NetApp     Published Date: Aug 26, 2016
The technical and financial advantages of solid state drives are driving a rapid transition from hard disk-drive (HDD) and hybrid-flash array (HFA) storage systems to all-flash arrays (AFAs). The white paper identifies some of the key considerations for evaluating all-flash storage infrastructure for three major uses cases: standalone applications, virtualized applications, and next-generation cloud services.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper helps organizations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.
Tags : 
security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust, certificates, application security, authentication, identity management, internet security, network security appliance, password management, security management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper helps organisations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.
Tags : 
security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust, certificates, application security, authentication, identity management, internet security, network security appliance, password management, security management
    
Entrust Datacard
Published By: Akamai Technologies     Published Date: Sep 27, 2016
Read this guide to learn the key security capabilities that a web application firewall (WAF) can deliver to defend your web applications and to get ideas for extending your existing WAF and improving web application security.
Tags : 
akamai, security, cybersecurity, web application security, web application firewall, waf, web applications, networking, knowledge management, enterprise applications
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 27, 2016
This infographic will walk you through a few key questions around your web applications.
Tags : 
akamai, attackers, cyber attacks, cybersecurity, web applications, web application security, networking, security, knowledge management, enterprise applications
    
Akamai Technologies
Published By: SolidFire_NetApp     Published Date: Oct 10, 2016
This paper introduces five architectural principles guiding the development of the next generation data center (NGDC). It describes key market influences leading a fundamental enterprise IT transformation and the technological trends that support it. The five principles are: scale-out, guaranteed performance, automated management, data assurance, and global efficiencies. Cloud infrastructure delivery models such as IaaS, private clouds, and software-defined data centers (SDDC) are foundations for the NGDC. In an era where IT is expected to ensure productiongrade support with a plethoric flow of new applications and data, these models demonstrate how to eliminate bottlenecks, increase self-service, and move the business forward. The NGDC applies a software-defined everything (SDx) discipline in a traditional, hardware-centric business to gain business advantage.
Tags : 
    
SolidFire_NetApp
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.