application control

Results 76 - 100 of 316Sort Results By: Published Date | Title | Company Name
Published By: Okta     Published Date: Jul 25, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Oktas on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Okta     Published Date: Aug 03, 2016
Within 6 months of purchasing Okta, the average customer connects 10 applications, and once up and running, the number increases quickly. But, the average customer could be using twice as many provisioning integrations than they are. Using Okta for single sign-on and a centralized view of your cloud apps isnt nearly enough. Watch this webinar for a live demo of Oktas new Access Request Workflow and Access Discovery Report features and learn how Okta Provisioning can bring sanity to your IT processes. Learn about: Provisioning Workflows Role & Rule-based Access Control Security-focused Compliance Reporting
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and provisioning solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Datastax     Published Date: Aug 23, 2017
Kenzan, a software engineering firm that specializes in building scalable, data-driven solutions, often leverages DataStax Enterprise (DSE) for customers that have high expectations for both performance and value. That means making careful, informed choices when designing the cloud infrastructure that applications run on. Controlling costs is always a priority for businesses that rely on AWS for running DSE. With AWS, it can be tempting to solve performance issues simply by adding more resources until the problem goes away. However, this solution results in increased costs which quickly add up over time. In this white paper, Kenzan and DataStax identify some of the key factors to consider when building out infrastructure on AWS, outlining practical steps you can take to optimize performance with DSE on AWS while keeping costs in check.
Tags : 
enterprise, benchmarking, data
    
Datastax
Published By: Symantec     Published Date: Dec 13, 2017
Todays workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the worlds largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : 
security, defense, cloud, threats, attack, symantec, enterprise, endpoint
    
Symantec
Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everythingcorporate applications, sensitive customer data, employee health records, etc.was within the safe four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, well explain ten steps on how to do that
Tags : 
    
OneLogin
Published By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
Consider the volume of business content that your organization generates or receives every day: applications, forms, reports, office documents, audio, video, and even social media about your company. If it is poorly managed, not digitized, or disconnected from critical business processes, it creates chaos. This chaos impacts your ability to deliver exceptional customer service; it slows down important processes, increases security risk, and negatively impacts revenue. Conversely, controlling content chaos can significantly improve your analytics strategy by gaining insight and business value from dark or unstructured data sources. In this eBook, learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it as you grow.
Tags : 
business content, volume, cloud-based, enterprise content management, ecm
    
Group M_IBM Q1'18
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
Is your WLAN under increasing pressure from more users, more types of connected devices, and more bandwidth-intensive applications? Its time to consider a better solution. With Ruckus Cloud Wi-Fi you get simple, centralized cloud-based management and the best performing Wi-Fi access points for high-density environments. Your job gets easier and your Wi-Fi gets better. Get visibility and control of your distributed Wi-Fi network with bandwidth to spare.
Tags : 
    
Ruckus Wireless
Published By: Citrix     Published Date: Jun 15, 2018
It used to be that you would build out your datacenter with all the right considerations in place, purchasing equipment that was sized to meet the needs of your organization for today and the near term future. Change used to be merely planning for capacity upgrades or network expansion, or migrating to the latest application versionor more simply put: things we could measure, control and manage. With the advent of the cloud, the rise in cyber-based threats, and the need to do more, faster, were witnessing a perfect storm that is making it more and more difficult for the enterprise to plan for change, and to maximize the investments that they make in their IT infrastructure today. This eBook will focus on considerations that you should make when deciding on an ADC solution that can not only survive these changes, but help create opportunities for innovation as the enterprise strives towards digital transformation. This guide will help you understand the changes that are currently unde
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 15, 2018
The world of IT is undergoing a digital transformation. Applications are growing fast, and so are the users consuming them. These applications are everywherein the datacenter, on virtual and/or microservices platforms, in the cloud, and as SaaS. More and more apps are now being moved out of datacenters to a cloud-based infrastructure. In order for an optimized and secure delivery of these applications, IT needs specific network appliances called Application Delivery Controllers (ADCs). These ADCs come in hardware, virtual, and containerized form factors, and are sized by Network Administrators based on the current and future usage of applications. The challenge with this is that its hard to foresee sizing or scalability requirements for these ADCs since users are constantly increasing, and applications are consistently evolving, as well as moving out of datacenters. Complicating matters, most ADCs are fixed-capacity network appliances that provide zero or minimum expansion capability
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 15, 2018
The ADC market continues to evolve, with various new cloud-integrated and software-centric use cases having arisen. This report provides infrastructure and operations leaders with a snapshot of the market's transition and profiles vendors representative of emerging and very different approaches.
Tags : 
    
Citrix
Published By: Epicor     Published Date: Dec 06, 2018
Over the last several years, manufacturers have embraced cloud applications. However, some manufacturers remain reluctant to migrate ERP systems and other business-critical applications to the cloud. Read on to discover four areas where manufacturers can benefit from a more complete understanding of how and why Epicor Cloud ERP offers unique advantages compared to on-premises deployment, including: Increased data security Greater financial visibility and control Better long-term reliability Easier access to cutting-edge tech innovation Moving an ERP environment to the cloud enables IT leaders to free up the resources they need to partner with the business and to focus on more strategic technology initiatives. Download the white paper to learn more.
Tags : 
epicor erp, erp system, cloud erp
    
Epicor
Published By: Nuage Networks     Published Date: Aug 07, 2014
Your clients and end users want instant access to their chosen applications anytime, anywhere. To meet this demand, you have undoubtedly investigated cloud services. You know that with cloud services you should be able to turn up applications very quickly. You also expect cloud services will help you simplify operations and control costs. However, for cloud services to meet your expectations, the networks within and across datacenters must evolve to become as virtualized and readily available as the server and storage infrastructure.
Tags : 
cloud, networks, datacenters, storage infrastructure, cloud services, storage virtualization, wireless infrastructure, cloud computing
    
Nuage Networks
Published By: Nuage Networks     Published Date: Aug 07, 2014
Your clients and end users want instant access to their chosen applications anytime, anywhere. To meet this demand, you have undoubtedly investigated cloud services. You know that with cloud services you should be able to turn up applications very quickly. You also expect cloud services will help you simplify operations and control costs. However, for cloud services to meet your expectations, the networks within and across datacenters must evolve to become as virtualized and readily available as the server and storage infrastructure.
Tags : 
cloud, networks, datacenters, storage infrastructure, cloud services, storage virtualization, wireless infrastructure, cloud computing
    
Nuage Networks
Published By: Avi Networks     Published Date: Mar 07, 2018
"Maximizing Operational Efficiency and Application Performance in VMware-Based Data Center Some of the most common challenges in VMware-based virtual data center environments include: - Lack of visibility into applications and end-user experience - Complex and error-prone operations - High capital and operational costs Review our solution brief to learn how the Avi Controller, the industrys first solution that integrates application delivery with real-time analytics, is able to solve these challenges."
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: May 14, 2018
"ZK Research conducted a recent study of the Application Delivery Controller (ADC) market and finds that the landscape for load balancers and ADCs is rapidly changing in the face of these market forces. Join Principal Analyst Zeus Kerravala for an informative session to learn: - Common application delivery challenges - On-premises vs. cloud considerations for ADCs - Trends in delivering cloud-native applications - Trends in troubleshooting - Future solutions being considered - What are the features most in demand that network engineers aren't getting Watch the On-Demand Webinar by filling out this form."
Tags : 
    
Avi Networks
Published By: VMware     Published Date: May 10, 2017
VMware Workspace ONE is VMwares digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. Download this white paper to discover the objectives that drove VMwares decisions of how and when to deploy, plus an overview of the business results achieved so far.
Tags : 
    
VMware
Published By: VMware     Published Date: May 10, 2017
VMware Identity Manager provides single sign-on (SSO) to a broad range of SaaS applications, as well as legacy applications published via virtual desktop platforms from VMware and Citrix, and browser-based and native mobile apps. VMware Identity Manager also provides application provisioning and conditional (adaptive, or risk-based) access controls, and can be deployed either on-premises or in the cloud. In this report, 451 Research analyzes VMwares strategic effort to bridge the legacy on-premises world (which still represents most of its business) with the more highly distributed and heterogeneous worlds of mobile and cloud computing. 451 also examines VMwares re-entry into the IDaaS market is to extend their market reach beyond what VDI and EMM might accomplish individually.
Tags : 
    
VMware
Published By: Juniper Networks     Published Date: Aug 08, 2017
The constant growth of cloud, IoT, virtualization, mobility, and digital transformation has brought tectonic changes to the world of networking. Long viewed as a bastion of single-purpose, inflexible, and closed solutions, networks have started to transform in line with the demands for flexibility, scalability, ease of management, interoperability, and application support. Networking departments need to achieve all of the tasks above while keeping costs under control. Additionally, security requirements for the new network are not letting up quite the opposite, as the virtualized network (and general IT) environment requires rethinking, virtualization, and evolution of security architectures.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Spectrum Enterprise     Published Date: Jun 05, 2017
Download this Case Study to learn the value of Spectrum Enterprises and how Spectrum has helped Front Room Furnishings with: - Their ability to use more Internet-based applications with confidence - A real-time view of whats happening throughout the business - Greater control over systems, such as freedom from PBX phones -Virtually limitless scalability in upgrading and adding locations
Tags : 
    
Spectrum Enterprise
Published By: Cisco and NVIDIA Corporation     Published Date: Sep 09, 2019
Application performance and delivery have changed. Should your network change too? Cloud is changing the fundamentals of how IT teams deliver applications and manage their performance. Applications are increasingly deployed farther from users, crossing networks outside of ITs direct control. Instead of enterprise data centers, many apps now reside in public and hybrid cloud environments. There are even new breeds of applications, built upon microservices and containers. Today, IT needs modern solutions that: ? Extend on-premises networks, apps, and infrastructure resources to the cloud. ? Maintain high levels of performance, user experience, and security across all applications, including microservices based apps. ? Sustain operational consistency across on-premises and cloud environments. ? Move away from the expense, complexity, and poor performance of traditional networking methods. These solutions are available for apps running on Google Cloud Platform (GCP) through the allia
Tags : 
    
Cisco and NVIDIA Corporation
Published By: LogMeIn     Published Date: Feb 27, 2018
LogMeIn offers consistently reliable service to its Bold360 customers and is vigilant in efforts to provide services that are not only robust and scalable, but also secure. This document describes how we achieve reliable scalability and the measures taken by LogMeIn to protect Bold360 customer data.
Tags : 
industry, network, service, operations, scalability, data, encryption
    
LogMeIn
Published By: Oracle     Published Date: Oct 20, 2017
Oracle has just announced a new microprocessor, and the servers and engineered system that are powered by it. The SPARC M8 processor fits in the palm of your hand, but it contains the result of years of co-engineering of hardware and software together to run enterprise applications with unprecedented speed and security. The SPARC M8 chip contains 32 of todays most powerful cores for running Oracle Database and Java applications. Benchmarking data shows that the performance of these cores reaches twice the performance of Intels x86 cores. This is the result of exhaustive work on designing smart execution units and threading architecture, and on balancing metrics such as core count, memory and IO bandwidth. It also required millions of hours in testing chip design and operating system software on real workloads for database and Java. Having faster cores means increasing application capability while keeping the core count and software investment under control. In other words, a boost
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Oracle has just announced a new microprocessor, and the servers and engineered system that are powered by it. The SPARC M8 processor fits in the palm of your hand, but it contains the result of years of co-engineering of hardware and software together to run enterprise applications with unprecedented speed and security. The SPARC M8 chip contains 32 of todays most powerful cores for running Oracle Database and Java applications. Benchmarking data shows that the performance of these cores reaches twice the performance of Intels x86 cores. This is the result of exhaustive work on designing smart execution units and threading architecture, and on balancing metrics such as core count, memory and IO bandwidth. It also required millions of hours in testing chip design and operating system software on real workloads for database and Java. Having faster cores means increasing application capability while keeping the core count and software investment under control. In other words, a boost
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.