application control

Results 126 - 150 of 306Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Oct 19, 2015
Next-Generation Firewalls Deliver Better Protection Through Application-Aware Security and User Role-Based Controls.
Tags : 
juniper, firewall, application, security, protection, data, network, firewalls, application integration, application performance management, business intelligence, business management
    
Juniper Networks
Published By: IBM     Published Date: Oct 13, 2015
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.
Tags : 
ibm, threat, data, security, trusteer apex, malware protection, stateful application control, cybercriminal, software development, enterprise applications
    
IBM
Published By: Cisco     Published Date: Sep 15, 2015
In a recent Enterprise Strategy Group (ESG) paper1, senior analyst Mark Bowker listed several requirements and best practices for building a private cloud. High levels of availability and scalability, policy-based automation and application control, workload portability, and unified visibility and management across infrastructures and applications were all cited as desirable attributes.
Tags : 
enterprise, policy-based, infrastructure, cloud, visibility, scalability, it management, enterprise applications
    
Cisco
Published By: HP Ecommerce     Published Date: Aug 31, 2015
This July 2015 Forrester Research report is provided compliments of HP. Modern application delivery leaders realize that their primary goal is to deliver value to the business and its customers, faster. For many, this is a significant shift from the past, when they primarily focused on cost control and efficiency. Today, they must connect the work they do and the results they produce to business outcomes. To do this, application development and delivery (AD&D) leaders use a new set of metrics that help them monitor and improve the value they deliver, based on feedback from business partners and customers. In this report, we highlight these new metrics that connect business outcomes to app delivery performance as well as the practices and tools that modern application delivery teams and their AD&D leaders use to collect and report them.
Tags : 
    
HP Ecommerce
Published By: Altiscale     Published Date: Aug 25, 2015
Hype abounds about Big Data. And it's hard to know how to effectively exploit its potential. Learn how to separate fact from fiction in this new webinar + research note titled "Amazon EMR is Easy and 7 Other Myths." If you're considering launching a new Big Data initiative, or if you are currently struggling with Amazon EMR, view this 30 minute on-demand webinar + research note and dispel the most common untruths about Amazon EMR, as determined by leading Hadoop experts. Specifically, you'll learn: The differences between Hadoop-as-a-Service and Amazon EMR Why Hadoop on Amazon is not elastic Why EMR is not a "plug-n-play" application How costs get out of control with Amazon EMR
Tags : 
amazon emr, big data, haddop
    
Altiscale
Published By: HP Ecommerce     Published Date: Aug 05, 2015
This July 2015 Forrester Research report is provided compliments of HP. Modern application delivery leaders realize that their primary goal is to deliver value to the business and its customers, faster. For many, this is a significant shift from the past, when they primarily focused on cost control and efficiency. Today, they must connect the work they do and the results they produce to business outcomes. To do this, application development and delivery (AD&D) leaders use a new set of metrics that help them monitor and improve the value they deliver, based on feedback from business partners and customers. In this report, we highlight these new metrics that connect business outcomes to app delivery performance as well as the practices and tools that modern application delivery teams and their AD&D leaders use to collect and report them.
Tags : 
    
HP Ecommerce
Published By: Citrix Systems     Published Date: Jul 28, 2015
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates several Citrix NetScaler ADC models vs. that of comparable products.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
At long last, datacenters have a more efficient high-availability deployment option for application delivery controllers. According to new research, thats welcome news among IT leaders.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
Learn more on the challenges of defending against todays modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution.
Tags : 
    
Citrix Systems
Published By: IBM     Published Date: Jul 09, 2015
This webinar talks about actionable insights through sentiment analysis of app ratings and reviews, as well as continuous and frictionless quality feedback loop from testers, beta users to end users in both pre-production and production.
Tags : 
application control, application management, quality feedback, sentiment analysis, user experience, mobility, mobile, enterprise applications, mobile computing, mobile workers, content management
    
IBM
Published By: VMTurbo     Published Date: Jul 08, 2015
This paper examines the evolution of enterprise applications, the data centers in which these applications reside and the increasing expectations of businesses and end-users on the Quality of Service (QoS) their applications deliver.
Tags : 
application control, application performance, enterprise applications, cloud-based applications, apm, application performance monitoring, data center, infrastructure performance, infrastructure, network performance management, application integration, application performance management, best practices, business integration, business management, enterprise software, performance testing, server virtualization, project management
    
VMTurbo
Published By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. Its time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus mousetrap, without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management, database development, database security
    
Lumension
Published By: Lumension     Published Date: Jun 03, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. Its time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus mousetrap, without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management, database development, database security
    
Lumension
Published By: Riverbed     Published Date: Apr 24, 2015
Read this white paper to learn how to: Architect an integrated WAN to support evolving application deployment models using the Internet in concert with MPLS. Create a WAN solution that can optimize traffic flows between the Internet and the MPLS for all applications and between both internal and external users. Deploy a solution across all independent network services that can monitor, report, control and optimize end-to-end path forwarding for all endpoints.
Tags : 
enterprise wan, integrated wan, public cloud services, connectivity, application performance, networking, software development, it management, wireless
    
Riverbed
Published By: Cisco     Published Date: Apr 10, 2015
The evolution from business connectivity to business mobility is unlike previous compute transitions because it redefines how people work. Historically, companies provided access to the necessary applications and data from corporate-issued devices such as laptops and desktops in controlled operating environments. This tightly integrated environment tethered workers to a specific device and operating system, and even sometimes to a location. Mobility breaks these shackles and enables workers to change the way they work.
Tags : 
cisco, zk research, mobile workplace, mobile deployment, mobile computing, it management, mobile data systems, mobile workers, wireless hardware, wireless infrastructure
    
Cisco
Published By: Appcito     Published Date: Apr 09, 2015
Social media marketing ?rm ViralMint rolled out a new feature that proved so popular that the increased customer tra?c swamped the capabilities of the existing load balancer solution and greatly increased application response times. Lacking visibility into the volume or nature of its tra?c, ViralMint had no clues for how to address its issues. A fortuitous conversation led to discovery of the Appcito Cloud Application Front End (CAFE) service, which allowed ViralMint to gain control of its cloud application tra?c, retain its customers trust and build on its unexpected success.
Tags : 
customer traffic, load balancer solution, application response times, visibility, cloud application service, cloud application delivery, aws, amazon web services, enterprise applications
    
Appcito
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro, security, it management
    
CDW-Trend Micro
Published By: VMTurbo     Published Date: Mar 25, 2015
Virtualization 1.0 vs. Virtualization 2.0: Where Are You? Virtualization 1.0 is marked by the ability to virtualize, monitor, and react to problems across the environment as they occur. Ever cognizant of the performance limitations that typify higher workload densities, Virtualization 1.0 hesitates to virtualize the critical applications that would be most beneficial. Virtualization 1.0 is limited by the inherent complexities of virtualization. Virtualization 2.0 is marked by complete, proactive control over the virtual environment. Virtualization 2.0 virtualizes up to 100% of its applications, guided by an intelligent abstraction that continually drives the environment to its desired state. Virtualization 2.0 is the promise of virtualization brought to fruition.
Tags : 
vmturbo, virtualization, it economic model, virtual environment, it management solutions, it management, knowledge management, enterprise applications, data center
    
VMTurbo
Published By: ServiceNow     Published Date: Mar 24, 2015
IT departments and the organizations they serve can reap dramatic benefits by codifying and automating unique processes through the development of custom applications. These applications can lower costs, improve agility, quicken time to value, give IT greater control,and bolster productivity throughout IT and among enterprise users. In fact, with the right tools in place, organizations can enable a new class of citizen developers who work either in or with IT to create applications and services that are highly responsive to business needs. A platform to enable this type of innovation is not only available, cost efficient and simple to deploy, but it may already be part of your IT environment.
Tags : 
codifying and automating, custom applications, it control, applications and services, business needs, cost efficient, it environment, it management, enterprise applications
    
ServiceNow
Published By: Okta     Published Date: Feb 24, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity and access management, saas applications, single sign-on, active directory, management solutions, access control, identity management
    
Okta
Published By: IBM     Published Date: Feb 18, 2015
UrbanCode Deploy provides extensive capabilities for configuring WebSphere Application Server (WAS) through plug-ins: Application Deployment for WebSphere - which enables the auto-discovery of WAS cells; and Middleware Configuration for WebSphere - which allows for management of WAS configurations. When combined, UrbanCode Deploy and these plug-ins enable a rapid, controlled method for continuous delivery to WebSphere Application Servers.
Tags : 
application delivery, websphere, ibm, urbancode, application server, it management, knowledge management, enterprise applications, application integration
    
IBM
Published By: NexGen     Published Date: Feb 09, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now! - See more at: http://www.findwhitep
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
    
NexGen
Published By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
    
Box
Published By: CenturyLink     Published Date: Jan 02, 2015
With core competencies like security, facility management, and carrier access, CenturyLink provides comprehensive global colocation services that extend your IT infrastructure into a more efficient virtual environment. You manage your own hardware, software, and applications to maintain complete control while gaining the cost and growth benefits of colocation.
Tags : 
data center build, facility management, carrier access, global colocation services, it management, knowledge management, enterprise applications, data management, data center
    
CenturyLink
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.