application management

Results 1051 - 1075 of 1102Sort Results By: Published Date | Title | Company Name
Published By: Polycom     Published Date: Jun 08, 2016
"Have you heard about Polycom’s groundbreaking new meeting collaboration solutions? Are you curious how Polycom® RealPresence Trio™, RealPresence Centro™ and others fit into your Skype for Business plans? View the on-demand webinar, “Create Exceptional Meeting Experiences with Skype for Business and Polycom: A Q&A with Jeff Schertz, Skype for Business MVP” for a conversation about Polycom’s newest solutions and see how they elevate the collaboration possibilities of Skype for Business. And how they can enhance your meeting experiences."
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, collaboration, productivity, content management system
    
Polycom
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As organizations prioritize digital transformation initiatives, many are finding that legacy networks are holding them back. To support new business models, cloud adoption, and an explosion in connected devices, modern networks must support interoperability across data centers, multiple clouds, branch locations, and edge devices. Applications now run at every point on this spectrum, and they are critical to businesses’ ability to win in hypercompetitive marketplaces. Yet, even as business success has become more dependent on this new architecture, and the amount of data flowing across connections has increased, many organizations still lack a unified approach to management, automation, and security
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: CA Technologies     Published Date: Jun 04, 2015
Current approaches for predicting with a high degree of confidence the application performance prior to implementation into production can be antiquated, expensive and time consuming. This document outlines a next-generation performance management approach using Service Virtualization and Application Performance Management being adopted by progressive organizations around the world. Adopting a next-generation performance management approach can offer a range of benefits including efficiency gains in delivering applications, cost savings, improved agility and better performing applications. For organizations that increasingly rely on technology to provide value to stakeholders improving application delivery capability is critical to remaining competitive and relevant.
Tags : 
    
CA Technologies
Published By: FICO     Published Date: Sep 02, 2016
Read this brief to learn how FICO is helping retailers and grocers to use optimization to increase decision accuracy by 5%-40%, while deploying optimization applications up to 80% faster than possible – collectively, providing businesses with the ability to drive more revenue and customer connectivity while reducing costs.
Tags : 
fico optimization solutions, decision accuracy, optimization applications, customer connectivity, global supply chain, inventory management
    
FICO
Published By: VMware AirWatch     Published Date: Oct 12, 2015
Organizaciones necesitan encontrar la forma de restringir el acceso de O365.
Tags : 
airwatch, emm, office 365, cloud, enterprise applications, platforms, data management, application performance management, best practices, business analytics, business intelligence, business management
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Oct 12, 2015
Quello di cui le organizzazioni hanno bisogno è un metodo per limitare l’accesso ad O365.
Tags : 
airwatch, emm, office 365, cloud, enterprise applications, platforms, data management, application performance management, best practices, business intelligence, business management
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 24, 2016
La mobilità resta un'opportunità strategica di primo piano per tutti i tipi di in quanto può rendere di rendere le imprese più competitive migliorando la produttività dei dipendenti oppure creando modalità innovative di coinvolgimento dei clienti. Per realizzare questa opportunità, la Enterprise Mobility deve fornire agli utenti un'esperienza di utilizzo fluida su più dispositivi e offrire un'area di lavoro sicura per le applicazioni di importanza critica. Per sostenere gli utenti di dispositivi mobili e la base clienti, le aziende devono attivare in modo sicuro le capacità BYOD (Bring Your Own Device, ovvero "Porta il tuo dispositivo") e self-service tramite una piattaforma solida, in grado di adattarsi adattarsi a nuovi processi.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 24, 2016
Nemmeno un anno fa, le previsioni degli analisti inducevano gli entusiasti della mobility a ritenere che il destino del settore del Mobile Device Management (MDM) fosse ormai segnato. In occasione di una convention di analisti svoltasi nel 2013, un gruppo di esperti aveva espresso la convinzione che il fenomeno del BYOD (Bring Your Own Device) avrebbe portato a una forte riduzione dei prezzi, a un crollo delle vendite e alla fine di un intero settore. Così si rivolgeva l'analista di Gartner John Girard alla platea dei partecipanti (fonte: CRN.com): "Il mercato del Mobile Device Management è in pieno marasma e a mio parere ha i giorni contati". Girard prevedeva che il trend del BYOD e la refrattarietà dei dipendenti alla gestione dei dispositivi personali avrebbero reso necessaria la transizione verso un modello di gestione a livello di applicazione.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 24, 2016
AIRWATCH MIGLIORA LA PRODUTTIVITÀ Dotare gli utenti finali di uno SPAZIO DI LAVORO DIGITALE
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity, business integration
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 24, 2016
In letzter Zeit stellen Kunden immer häufiger die Frage, wie AirWatch Office 365 unterstützt. Viele fragen, ob AirWatch den Zugang zu Office 365 (O365) nicht nur auf ihren geschäftlichen Desktop-Systemen, sondern auch auf ihren Mobilgeräten steuern kann.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 24, 2016
Una de las preguntas más frecuentes de los clientes es ¿cuánto soporte le provee AirWatch a Office 365? Muchos preguntan si AirWatch controla el acceso a Office 365 (O365) en los dispositivos móviles de la misma forma que lo controla en los sistemas de escritorio corporativos.
Tags : 
application management, best practices, mobile support, mobile, systems management, business optimization, network management, application security, mobile computing, mobile data systems, smart phones, wireless application software, application integration
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 25, 2016
La mobilité reste une opportunité stratégique importante pour les entreprises de toutes sortes, car elle peut contribuer à augmenter leur compétitivité en rendant les employés plus productifs ou en s'engageant auprès des clients de manière plus innovante. Pour atteindre ce potentiel, la mobilité des entreprises doit proposer aux utilisateurs une expérience simple sur plusieurs terminaux et offrir un espace de travail sécurisé pour les applications essentielles. Pour servir cette base d'employés mobiles et de clients, les entreprises doivent activer leurs fonctionnalités BYOD et self-service avec une plateforme établie qui s'adapte pour prendre en charge de nouveaux processus. La plateforme de gestion de la mobilité d'entreprise (EMM) offre à l'informatique la possibilité d'activer les transformations de processus métier, de favoriser de nouveaux revenus et de créer de nouvelles façons mémorables de se connecter aux clients.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, enterprise applications, application integration
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 25, 2016
Il y a moins d’un an, les prévisions des analystes avaient laissé croire aux fervents défenseurs de la mobilité qu’une catastrophe allait toucher de plein fouet le secteur de la gestion des terminaux mobiles. Lors d’un événement réservé aux analystes qui s’est tenu en 2013, un panel de spécialistes indiquait que l’utilisation des terminaux personnels allait aboutir à une réduction des prix et faire chuter les ventes. Ils annonçaient la mort de cette industrie. La gestion des terminaux mobiles est actuellement totalement chaotique et je pense que ce marché est en train de mourir. déclarait l’analyste Gartner John Girard (CRN.com). John Girard avait prévu une nouvelle orientation dans la gestion de niveau application qui était liée à l’utilisation de terminaux personnels et à la résistance que montraient les employés devant la gestion par l’entreprise de leurs terminaux personnels.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, application integration, content management system
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Dec 13, 2016
As enterprises embrace adoption of Microsoft Office 365 to drive productivity by using the latest mobile applications and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how VMware AirWatch® Enterprise Mobility Management (EMM) easily integrates with both Office 365 and VMware Identity Manager to optimize user experience and ensure data is secure across all devices and platforms. An AirWatch expert will give an in-depth demonstration of the advantages of deploying Office 365 with AirWatch by VMware, as well as conduct a Q&A session.
Tags : 
    
VMware AirWatch
Published By: Pega     Published Date: Sep 11, 2015
In this new report, Pegasystems is recognized as a leader in the growing market for flexible case management solutions. Pega leads the market in delivering applications that meet rising expectations for: -Built-in change governance procedures -Open APIs -Ability to federate case management -Flexible data structures -Focus on business outcomes
Tags : 
    
Pega
Published By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Microsoft Office 365     Published Date: Nov 15, 2016
Download the free A to Z eBook to learn more about data security, employee productivity, IT Support and cost. Also, see how the competition measures up against Office 365. Here are a few must-knows when it comes to Office 365: Data compliance out of the box. Built-in security and privacy features; meets key industry standards and supports FERPA, HIPPAA and EU. Online or offline across all devices. Whether you are in the office or on the go, Office applications let you create, edit and share from your PC/MAC or your iOS, Android™ or Windows device with anyone in real time. Work off a single platform and eliminate third-party apps. With our suite of apps, such as Enterprise Content Management, Cloud PBX, and Microsoft MyAnalytics, you can trust that a single vendor is providing you the tools you need to get work done.
Tags : 
    
Microsoft Office 365
Published By: Akamai Technologies     Published Date: Oct 31, 2017
Before organizations can address their bot challenges, they need the ability to detect the many types of bots interacting with their websites and web applications on a daily basis. Bots come in many shapes and sizes, ranging from simple scripts to sophisticated automation tools, and continuously evolve over time. As detection technologies improve, so too do the technologies available to bot operators as they update their bots to evade the latest detection mechanisms. When evaluating a bot management solution, organizations should consider its detection technologies and their effectiveness against the current and future bot landscape, while maintaining the lowest possible level of false positives and negatives.
Tags : 
bot manager, bot interaction bot detection
    
Akamai Technologies
Published By: AWS     Published Date: Nov 12, 2018
If your organization runs VMware vSphere-based cloud infrastructure in your on-premises data center, but you have been reluctant to migrate applications to the cloud for fear of losing some VMware vSphere-based cloud capabilities, VMware Cloud on AWS solves this problem by seamlessly integrating your familiar VMware virtualization and cloud management tools with Amazon Web Services (AWS). Many organizations believe that moving their applications to the cloud makes it necessary to introduce new tools, skills, and processes. This can present a new set of challenges because learning to use new tools, applying new skills, and adapting to new processes can be costly and time-consuming. In this eBook, we dive deeper into how these challenges can hinder hybrid cloud adoption and cover how VMware Cloud on AWS can help your organization overcome these challenges. Join our webinar to learn The benefits of Disaster Recovery-as-a-Service (DRaaS), delivering on-site protection. How automated or
Tags : 
    
AWS
Published By: AWS     Published Date: Nov 12, 2018
If your organization runs VMware vSphere-based cloud infrastructure in your on-premises data center, but you have been reluctant to migrate applications to the cloud for fear of losing some VMware vSphere-based cloud capabilities, VMware Cloud on AWS solves this problem by seamlessly integrating your familiar VMware virtualization and cloud management tools with Amazon Web Services (AWS). Many organizations believe that moving their applications to the cloud makes it necessary to introduce new tools, skills, and processes. This can present a new set of challenges because learning to use new tools, applying new skills, and adapting to new processes can be costly and time-consuming. In this eBook, we dive deeper into how these challenges can hinder hybrid cloud adoption and cover how VMware Cloud on AWS can help your organization overcome these challenges. Join our webinar to learn How to take advantage of flexible consumption models to align hybrid cloud adoption with your business
Tags : 
    
AWS
Published By: CA Technologies     Published Date: Jul 19, 2017
• Planning for DevOps implementation encompasses people, processes and technology • CA Technologies delivers DevOps for Mainframe anchored by CA Application Lifecycle Conductor, which allows organizations to continue using their existing products • Catch a detailed evaluation of how CA compares to Compuware on Platform Support, Software Development Lifecycle, Integration and Extension of Enterprise Assets, Configuration and Administrative Management
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM
Start   Previous    31 32 33 34 35 36 37 38 39 40 41 42 43 44 45    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.