application control

Results 126 - 150 of 306Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Inc     Published Date: Feb 19, 2013
The application delivery controller has evolved into a key component of the data center architecture, and enterprises should evaluate ADCs based on how they integrate with this architecture and support more-advanced features, such as user and traffic control and monitoring.
Tags : 
application, delivery, controllers, evolved, data center, adcs, advancements
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
The application delivery controller has evolved into a key component of the data center architecture, and enterprises should evaluate ADCs based on how they integrate with this architecture and support more-advanced features, such as user and traffic control and monitoring.
Tags : 
gartner, f5 networks, application delivery, data center architecture, enterprises, adcs, infrastructure, application management, deployment, traffic control, monitoring, data center, data center architecture, architecture, traffic management, application integration, application performance management, service oriented architecture
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
Cisco's move limiting Application Control Engine development shows that the time for stand-alone load balancers has passed. IT leaders should focus on leveraging more advanced application delivery controller features to improve application deployments.
Tags : 
refocus, application delivery, control engine, adcs, streamline data center operations, application performance management, application integration, productivity, data center
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : 
security, cloud, application delivery, authentication, access control, application security, silos, password fatigue, iam, identity management, password management, security management, cloud computing
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
Turning on firewall features can sometimes result in a significant performance hit, creating an obstacle for network architects. In this Network World Clear Choice test, learn about a firewall solution that can help your business overcome these performance challenges by maxing our network capacity while also offering filtering and attack protection capabilities.
Tags : 
network world, data center, firewall, load balancer, scalability, data center management, dos protection, security, network, server traffic, application perforamce, server loading, application delivery controllers, data management, application security, firewalls, network security appliance, cloud computing
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Cloud computing and the "bring your own device" (BYOD) trend will impact the design of future datacenters and their supporting networks. To attain the kind of business agility that companies now demand, network infrastructure needs to provide the flexibility required by cloud application workloads and the changing traffic patterns fostered by BYOD. To make networks more agile, new approaches to network implementation need to be enabled. As these trends continue, application delivery controllers (ADCs) will be critical elements in the new network infrastructure. This Technology Spotlight examines these trends and the role that F5 Networks' integrated scalable platform plays in this strategic market.
Tags : 
f5 networks, idc, cloud, cloud computing, bring your own device, byod, datacenter, network, network infrastructure, infrastructure, application workload, application delivery, application delivery controllers, adc, platform, platforms, traffic management, application integration, application performance management, data center
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Nov 05, 2014
F5 Networks is positioned in the Leaders Quadrant for Application Delivery Controllers for the eighth consecutive year. The application delivery controller (ADC) is a key component within enterprise data center and public cloud architectures, and according to Gartner, enterprises should evaluate ADCs based on how they integrate with key applications and cloud/virtualization platforms.
Tags : 
application control, application delivery, adc, enterprise data center, it management, knowledge management, application performance management, business intelligence, business management
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Dec 11, 2015
CIOs want harmony. Security directors loathe point products. Networks operations wont buy into anything new. Stakeholders can get the harmony they need around DDoS mitigation by extending the F5 Application Delivery Controller into a hybrid solution: on-premises with a new cloud component.
Tags : 
software-defined networking, sdn, programability, cloud computing, mobility, it solutions, apps, cio, ddos, networking, security, it management
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: May 03, 2017
Application delivery services are critical for successful applications. Whether such services add scalability, reliability, or security, most applications rely on one or more. Application Delivery Controllers (ADCs), therefore, occupy a critical place in most application, cloud, and data center designs. But what does "performance" actually mean? In general, ADC vendors publish four main types of metrics to demonstrate performance: Requests per second (RPS) Connections per second (CPS) Transactions per second (TPS) Throughput (often measured in gigabits per second, Gbps) Download now to learn more!
Tags : 
application delivery controllers, cloud, data center, performance metrics
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
With the cloud transforming application development and deploymentenabling organizations to improve flexibility, automate processes, and decrease time to marketsome big questions remain. One of the most important issues an organization must address is how it can best employ the smarter tools and limitless scale that the cloud offers. One way that enterprises take advantage of the benefits of the cloud is by deploying their own private cloud, which is a computing model that fosters agility while allowing organizations to maintain control of their infrastructure, while better securing their applications and their data.
Tags : 
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
With the rate of cloud spending predicted to outpace overall IT spending six to one over the next few years, organizations are rightly concerned about ensuring that applications in the cloud enjoy the same level of security as apps deployed in data centers. Using the public cloud does alter your attack surface areaand leveraging multiple public and private clouds (aka multi-cloud) does so even more. Some threats get bigger, some get smaller. Some even go away, or at least drift out of your control, while new threats should move front and center in your security thinking.
Tags : 
cloud, landscape, navigation, security, technology, applications
    
F5 Networks Inc
Published By: Flexera     Published Date: Feb 19, 2019
SaaS adoption is growing quickly. It's easy to buy and deploy because of its relatively low overhead and up-front costs. But SaaS is designed to proliferate. About a third of the SaaS apps in most organizations dont even get used. And the result? SaaS costs spin out of control. Are you able to manage the cost and security risks associated with your SaaS applications? Download the Essential SaaS Management Toolkit to learn about SaaS usage trends, understand the importance of SaaS management tools and discover how to take control of your SaaS applications. The Essential SaaS Management Toolkit was designed to provide everything you need to learn how to manage the cost and security risks of your SaaS applications. Get the Toolkit here.
Tags : 
    
Flexera
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizations traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCs 2017 CloudView Survey; IDCs 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizations traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCs 2017 CloudView Survey; IDCs 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizations traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCs 2017 CloudView Survey; IDCs 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Todays employees are mobile, theyre storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employees ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific users risk and the sensitivity or value of the data. An organizations data protection program must consider the human point the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a Top Player for Web Security Forcepoint is proud to announce that Radicati has identified Forcepoint as a Top Player in their Corporate Web Security Market Quadrant for the 11th year in a row. In the report, Radicati noted that, Forcepoint offers a powerful web security solution that addresses all key web security concerns and integrates well with additional modules for full cyber-attack protection. They also cited that, Forcepoint has some of the most complete and secure application controls in the Web security space. The granularity for Web application controls available in Forcepoints solution is leading edge.
Tags : 
    
Forcepoint
Published By: Fortinet     Published Date: Nov 11, 2013
This paper explores the limitations of Windows NLB and the benefits of deploying a hardware load balancing device to achieve optimum performance of MS Exchange 2010.
Tags : 
load balancing, exchange, exchange 2010, windows nlb, application delivery, ms exchange, application delivery controller, adc, hardware load balancer, coyote point, fortinet, kemp, radware, a10, enterprise applications
    
Fortinet
Published By: Fortinet     Published Date: Nov 11, 2013
This paper explores the limitations of Windows NLB and the benefits of deploying a hardware load balancing device to achieve optimum performance of MS Exchange 2013.
Tags : 
load balancing, exchange, exchange 2013, windows nlb, application delivery, ms exchange, application delivery controller, adc, hardware load balancer, coyote point, fortinet, a10, radware, kemp, enterprise applications
    
Fortinet
Published By: Fortinet     Published Date: Nov 11, 2013
This whitepaper provides a step-by-step guide showing how easy it is to implement application and server load balancing using a Coyote Point Equalizer ADC.
Tags : 
load balancing, server load balancing, hardware load balancing, application delivery controller, adc, server optimization, coyote point, fortinet, kemp, a10, radware, enterprise applications
    
Fortinet
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Companies are increasingly moving data and applications to public cloud platforms. Sometimes these transitions happen with ITs approval and guidance; sometimes they dont. Regardless, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. Its difficult to gain visibility and control of the security posture when the organization relies on an assortment of disparate cloud platforms that all take different approaches to security and offer different tools. And its hard for a small security staff to stay on top of disparate solutions that fail to integrate.
Tags : 
    
Fortinet EMEA
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling these applications in order to discover and mitigate new hidden security threats.
Tags : 
fortinet, web application security, web application control, application threats, web 2.0, network security, application security, network security appliance, security management, vulnerability management
    
Fortinet, Inc.
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Tags : 
fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution, anti spam, anti spyware, anti virus, internet security, phishing, web service security, content management
    
Fortinet, Inc.
Published By: Gigamon     Published Date: Jun 07, 2019
You know that complex microservices-based apps can be difficult to monitor, but did you know Application Intelligence provides both the visibility and the context needed to discover, manage and secure these apps? Download the Gigamon white paper How to Gain Control of Complex Applications in the Time of Digital Transformation to solve the challenges of capturing application traffic on the network, identifying apps and microservices, extracting information and metadata and distributing that information to tools.
Tags : 
    
Gigamon
Published By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
Consider the volume of business content that your organization generates or receives every day: applications, forms, reports, office documents, audio, video, and even social media about your company. If it is poorly managed, not digitized, or disconnected from critical business processes, it creates chaos. This chaos impacts your ability to deliver exceptional customer service; it slows down important processes, increases security risk, and negatively impacts revenue. Conversely, controlling content chaos can significantly improve your analytics strategy by gaining insight and business value from dark or unstructured data sources. In this eBook, learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it as you grow.
Tags : 
business content, volume, cloud-based, enterprise content management, ecm
    
Group M_IBM Q1'18
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.