application control

Results 276 - 300 of 306Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Nov 07, 2016
With the rise of companies such as Netflix and Uber, the marketplace is feeling the impact of digital disruptorsfast-moving, application-centric organizations that are taking advantage of digitalization to create thriving and market-changing business models. In an effort to stay competitive, more enterprises are adopting multi-cloud strategies as a means to optimize workload performance and cost across their IT environment, both on and off premises. The trend brief Top Trends Driving the Need for Unified Cloud Management discusses how a cloud management platform (CMP) enables IT organizations to accelerate IT services delivery and improve data center operations while maintaining control across multi-cloud environments. The brief highlights the VMware enterprise-ready cloud management platform based on VMware vRealize Suite and powered by Intel based server platforms.
Tags : 
    
VMware
Published By: CDW     Published Date: Apr 04, 2016
To power your new and legacy applications and workloads, different IT environments are required based on your unique industry and application needs. Organizations need the right mix of traditional infrastructure, private cloud, and public cloud with consistent management and control software to meet the demands for agility and excellent user experience.
Tags : 
infrastructure management, applications, information technology, cloud computing, content management, infrastructure, network management, wireless infrastructure
    
CDW
Published By: CDW-HPE Servers     Published Date: Apr 07, 2016
To power your new and legacy applications and workloads, different IT environments are required based on your unique industry and application needs. Organizations need the right mix of traditional infrastructure, private cloud, and public cloud with consistent management and control software to meet the demands for agility and excellent user experience.
Tags : 
infrastructure management, applications, information technology, cloud computing, content management, infrastructure, network management, wireless infrastructure
    
CDW-HPE Servers
Published By: Riverbed     Published Date: Aug 22, 2014
Businesses are rapidly adopting virtualization, cloud infrastructure, and SaaS applications broadly across the enterprise to minimize costs and enable seamless collaboration and communication. This is significantly straining the traditional network paradigm. IT organizations globally are faced with the challenge to transform network architectures to deliver the right performance and reliability cost-effectively while retaining control.
Tags : 
business performance, hybrid networks, virtualization, cloud infrastructure, saas, collaboration, communication, business process automation
    
Riverbed
Published By: VMware AirWatch     Published Date: May 19, 2016
Innovation in business mobility is adding up to opportunity for the enterprise opportunity to accelerate employee productivity, increase collaboration, and streamline business processes through mobile applications. At the same time, IT organizations are keen to control costs and maintain safeguards around their corporate information. With the goal of striking a balance between opportunity and control, increasing numbers of IT decision makers are adopting enterprise mobility management (EMM) solutions. But how do you know your organization is poised to make the move to EMM, or if you should be leveraging more from an existing EMM solution? Here are five cues to consider that the time is right to adopt EMM for your organization.
Tags : 
innovation, opportunity, best practices, productivity, mobile, application, mobile computing, application integration
    
VMware AirWatch
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
    
Trend Micro, Inc.
Published By: Spectrum Enterprise     Published Date: Jun 05, 2017
Download this Case Study to learn the value of Spectrum Enterprises and how Spectrum has helped Front Room Furnishings with: - Their ability to use more Internet-based applications with confidence - A real-time view of whats happening throughout the business - Greater control over systems, such as freedom from PBX phones -Virtually limitless scalability in upgrading and adding locations
Tags : 
    
Spectrum Enterprise
Published By: Fortinet     Published Date: Nov 11, 2013
This paper explores the limitations of Windows NLB and the benefits of deploying a hardware load balancing device to achieve optimum performance of MS Exchange 2010.
Tags : 
load balancing, exchange, exchange 2010, windows nlb, application delivery, ms exchange, application delivery controller, adc
    
Fortinet
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits
    
McAfee
Published By: F5 Networks Inc     Published Date: May 03, 2017
Application delivery services are critical for successful applications. Whether such services add scalability, reliability, or security, most applications rely on one or more. Application Delivery Controllers (ADCs), therefore, occupy a critical place in most application, cloud, and data center designs. But what does "performance" actually mean? In general, ADC vendors publish four main types of metrics to demonstrate performance: Requests per second (RPS) Connections per second (CPS) Transactions per second (TPS) Throughput (often measured in gigabits per second, Gbps) Download now to learn more!
Tags : 
application delivery controllers, cloud, data center, performance metrics
    
F5 Networks Inc
Published By: Cisco     Published Date: Sep 15, 2015
In a recent Enterprise Strategy Group (ESG) paper1, senior analyst Mark Bowker listed several requirements and best practices for building a private cloud. High levels of availability and scalability, policy-based automation and application control, workload portability, and unified visibility and management across infrastructures and applications were all cited as desirable attributes.
Tags : 
enterprise, policy-based, infrastructure, cloud, visibility, scalability, it management, enterprise applications
    
Cisco
Published By: CA WA 2     Published Date: Oct 01, 2008
Data Center Automation enables you to manage change processes, ensure configuration compliance and dynamically provision servers and applications based on business need. By controlling complexity and automating processes in the data center, your data center becomes more adaptive and agile. Effective Data Center Automation lets you leverage virtualization, manage capacity, and reduce costs and also helps reduce energy usage and waste.
Tags : 
it automation, ca wa 2, ca wa, data center automation, datacenter automation, configuration, server hardware, servers
    
CA WA 2
Published By: VMware AirWatch     Published Date: Dec 08, 2016
Todays workforce accesses corporate content from the office, home, and everywhere in between. They utilize non-Windows devices including iOS, Android and Mac, and demand that IT support the specialized apps they need to get the job done. Savvy organizations have embraced desktop and application virtualization to meet these demands. Download this asset to learn how Horizon Cloud with on-premises infrastructure represents a new approach to building, delivering and managing virtual workspaces. This radically simple and scalable service unifies the management of on-premises virtual workspace services (desktops and applications) through a centralized cloud control plane, enabling delivery of virtual desktops and apps for as little as $0.50/user.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: May 10, 2017
VMware Identity Manager provides single sign-on (SSO) to a broad range of SaaS applications, as well as legacy applications published via virtual desktop platforms from VMware and Citrix, and browser-based and native mobile apps. VMware Identity Manager also provides application provisioning and conditional (adaptive, or risk-based) access controls, and can be deployed either on-premises or in the cloud. In this report, 451 Research analyzes VMwares strategic effort to bridge the legacy on-premises world (which still represents most of its business) with the more highly distributed and heterogeneous worlds of mobile and cloud computing. 451 also examines VMwares re-entry into the IDaaS market is to extend their market reach beyond what VDI and EMM might accomplish individually.
Tags : 
    
VMware
Published By: VMware     Published Date: May 10, 2017
VMware Workspace ONE is VMwares digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. Download this white paper to discover the objectives that drove VMwares decisions of how and when to deploy, plus an overview of the business results achieved so far.
Tags : 
    
VMware
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Workspace ONE is VMwares digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMwares decisions of how and when to deploy, plus an overview of the business results weve achieved so far.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Workspace ONE is VMwares digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMwares decisions of how and when to deploy, plus an overview of the business results weve achieved so far.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: Feb 24, 2017
Workspace ONE is VMwares digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMwares decisions of how and when to deploy, plus an overview of the business results weve achieved so far.
Tags : 
    
VMware
Published By: VMware     Published Date: Jul 24, 2017
Workspace ONE is VMwares digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMwares decisions of how and when to deploy, plus an overview of the business results weve achieved so far.
Tags : 
    
VMware
Published By: Veracode     Published Date: Jun 26, 2019
Applications become vulnerable to an encapsulation attack when they fail to differentiate data or functionality within components. Without clearly defined boundaries between control spheres, bad code can creep across components and attackers can gain unauthorized access to data and functions.
Tags : 
    
Veracode
Published By: Qualys     Published Date: Jul 20, 2012
Welcome to Web Application Security For Dummies! Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures. This figure doesn't include vulnerabilities in custom-developed web applications, so it may be just the tip of the iceberg. This book is all about understanding how to quickly find and fix vulnerabilities in web applications. The goal is to prevent attackers from gaining control over the application and obtaining easy access to the server, database, and other back-end IT resources.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, web application
    
Qualys
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale
    
VeriSign Incorp.
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Tags : 
fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution, anti spam
    
Fortinet, Inc.
Published By: Citrix Systems     Published Date: Nov 10, 2014
Attend this webinar to learn how SDN helps address the challenges of virtualization. You will learn practical tips that can help you get started immediately. Agenda: How virtualization impacts the underlying network infrastructure Why and how SDN addresses the challenge of virtualization How SDN enables Just in Time networks for L4-7 services
Tags : 
application, deployment, research, enterprise, data center, controller, network, security
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
ADCs are advanced load balancers with functions and features that enhance the performance of applications. Today, companies of all sizes with geographical dispersal of people and different data constructs require ADCs to optimize their complex application environments from web applications, to Exchange, SharePoint and databases. It is interesting that before the term ADC was used more recently (in the last decade), companies relied on load balancers for website availability and scalability. In this paper we will describe the fundamentals of a load balancing system and its evolution to an ADC.
Tags : 
database, sharepoint, application, load balancer, performance, availability, website, scalability
    
Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.