Skip to content
 

web environment

Results 1 - 25 of 118Sort Results By: Published Date | Title | Company Name
Published By: MuleSoft     Published Date: Jan 16, 2018
To achieve efficiencies in today’s turbulent economic climate, government entities need to integrate legacy applications with modern systems and web services. Orchestration between multiple systems across various departments and municipalities is needed to deliver quality public services. At the same time, public sector agencies face aggressive timelines and budget constraints, changing constituent needs, and open source policies. Learn how utilizing a lightweight, standalone Enterprise Service Bus (ESB) enables government entities to meet these key challenges and deliver vital public goods while cutting costs. Evalute important decisions: Achieving efficiencies in today’s turbulent budgetary environment Time to Delivery and Budget Constraints Constituent Needs and Public Value Open Source Policies & Initiatives The Software Architecture for Government Learn to deliver projects within tight schedules and fiscal constraints - download now.
Tags : 
    
MuleSoft
Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies
Published By: Red Hat     Published Date: Jan 01, 2012
A world-leading web content management and customer experience management system built its capabilities on the Ixonos Elastic Cloud – which is based on the Red Hat software stack, including value-rich Red Hat Enterprise Linux. Learn how Red Hat Enterprise Linux offered a stable, flexible environment for cloud deployments.
Tags : 
ixonos elastic cloud, software stack, red hat, ez systems, linux, cloud deployments
    
Red Hat
Published By: Red Hat     Published Date: Jan 01, 2013
Don’t let your web infrastructure limit the growth of your online business. Consider Red Hat Enterprise Linux – the ideal platform for transaction-intensive environments. Red Hat Enterprise Linux offers reliability, scalability, and predictable total cost of ownership – as well as a continuous stream of technical improvements – to keep you at the leading edge.
Tags : 
web, infrastructure, transaction-intensive environment, reliability, scalability, total cost, improvements
    
Red Hat
Published By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Nov 22, 2018
Modern marketers leverage insights on how consumers browse goods or make a purchase, to design smarter cross-channel programs and create relevant campaigns. Brands that leverage cross-channel marketing see a 91% customer retention rate. You can do this too. Learn how other marketers in ASEAN are leveraging cross-channel to create real business impact. Join this webinar and hear from Charlie Loo, an award-winning marketer and our Principal Consultant on: • five practical ways you can use cross-channel marketing • the importance of cross-channel in a mobile first environment • the difference between multi-channel and cross-channel
Tags : 
    
Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : 
blue coat, ssl, ssl visibility
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: IBM     Published Date: May 17, 2016
Join the webcast to learn how you can simplify and automate your app environment deployment, and watch a brief demo on how this is put into practice in your organization.
Tags : 
ibm, middleware, apps, applications, hybrid, cloud
    
IBM
Published By: New Relic     Published Date: Apr 07, 2015
Whether you've already moved to the cloud or are ready to migrate, New Relic helps Amazon Web Services (AWS) users improve performance. Here are five best practices that can help you improve the end-user experience, simplify management, and reduce the cost of your AWS environment.
Tags : 
    
New Relic
Published By: Optimizely     Published Date: Apr 06, 2018
We live in the age of the consumer. Across touchpoints, customer expectations for digital interactions and brand experiences are evolving. Today, it is critical for organizations to deliver high-performing, personalized encounters across the customer journey. To drive innovation and stay competitive, organizations need to reorient towards the customer—which means being able to understand their needs, adapt to their expectations, and quickly make improvements. But pinpointing where to make iterations across your tactics and digital entities like websites and landing pages can be a difficult task—especially in today’s multi-touch environment.
Tags : 
    
Optimizely
Published By: Palo Alto Networks     Published Date: Feb 24, 2016
This webinar, hosted by Palo Alto Networks, focuses on deployment of 'Zero Trust Network Segmentation' in industrial control systems in large scale, mult-plant environments. We begin with an explanation of the concepts behind 'Zero Trust', scalability, the best ways to adapt existing networking and segmentation without needing to reconfigure infrastructure, and how Palo Alto's platform adresses these needs. Speakers Lionel Jacobs is the Sr. ICS Security Architect at Palo Alto Netowrks Jonathan S. is an Information Security Architect at a Global F&B Manufacturer Del Rodillas (Moderator) is the Sr. Manager of ICS Initiative at Palo Alto Networks
Tags : 
zero trust, networking, network segmentation, ics, scale, infrastructure, enterprise
    
Palo Alto Networks
Published By: VMWare EMEA     Published Date: Oct 23, 2017
VMware vRealize® Suite is the market-leading cloud management platform* purpose-built for heterogeneous, multi-cloud environments. It provides a comprehensive management stack for IT services on VMware vSphere® and other hypervisors, physical infrastructure, OpenStack, and external clouds such as VMware vCloud® Air™ and Amazon Web Services, all with a unified management experience. With vRealize Suite, IT can provision and manage at scale—compute, storage, network, and application services across multiple private and public cloud environments.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Schneider Electric     Published Date: Jan 26, 2018
The first event in the Partnering with Certainy Webinar Series, "Customer Demands at the Edge." Trends like IoT are driving customer experience expectations in a way that demands resiliency in local edge environments. As a result, we’re seeing a rise of edge computing (compute power coming out of the cloud and into the access layer). Customer demands manifest themselves differently based on things like company size and segment. For example, a retail customer’s business imperatives might look different from a doctor’s office. But one thing remains constant: A standardized, redundant, and repeatable physical infrastructure can protect the availability of these now-critical access-layer IT assets. APC by Schneider Electric has: The solutions you need to deliver a standardized, redundant, & repeatable infrastructure to your customers The tools you need to configure them, The alliances & certifications you trust & rely on, The program to make it profitable. Fill out your information and click "Register" to watch the kick off our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Always On, Always Connected.” This webinar originally aired on October 5th, 2017.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 26, 2018
Part 2 in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." In our last webinar, we discussed how trends & technologies like IoT and its many applications have helped drive an Always On, Always Connected mentality that has completely evolved customer experience standards. These demands are driving a need for resiliency in local edge environments, meaning compute & storage capacity is now coming back on premise for many applications – especially in industries like Healthcare, Retail, Finance, and Education. In other words, this highly distributed access layer is now becoming a compute layer – one that is mission-critical to delivering a flawless (or at least acceptable) customer experience. These environments are often make-shift wiring closets (janitor’s closets, back rooms, etc.) with no dedicated IT staff per each location. More than ever before, Healthcare, Retail, Finance, and Education customers are turning to solution providers to be that “dedicated IT staff” to find and fix problems before they start, so that the customer (or patient, or student) experience they’re working to provide remains a good one. APC by Schneider Electric has: Connected Products making it easy to remotely monitor your customers’ environments Including our NEW Smart-UPS with APC SmartConnect – the industry’s first cloud-connected UPS! A Managed Service Program to help you develop & monetize power as a managed service Fill out your information and click "Register" to watch part 2 of our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Fix My Problem Before it Starts.” This webinar originally aired on October 19th, 2017.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 26, 2018
Part 3 in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." As distributed edge environments become more critical, physical security becomes more important. Nobody would leave their data center wide open for anyone to enter, but that’s exactly how many organizations treat their edge computing sites. Often, they consist of a rack or two of gear in a non-dedicated location, perhaps a janitor’s closet, with little to no physical security. Fill out your information and click "Register" to watch the third event in our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Protect me from Downtime!” This webinar originally aired on November 9th, 2017. In this webinar, we discuss physical security best practices, including environmental issues such as temperature and humidity monitoring. We also update partners on the physical security features of the latest APC racks and the NetBotz line of security and environmental appliances, cameras and sensors.
Tags : 
    
Schneider Electric
Published By: Keynote     Published Date: Apr 23, 2014
In the world of digital interactions, the margin between success and disengagement or abandonment is measured in milliseconds. With the exploding adoption of advanced smartphones and tablets, you need a mobile-first approach to engaging with customers and employees. And as your mobile initiatives are delivered at increasingly rapid rates, the quality and reliability of the mobile apps, mobile web and connected services that support them has become critically important. For the technology teams delivering customer and employee services in the mobile channel, it is important to understand that performance monitoring solutions which work for the desktop cannot be simply applied to mobile. Managing the mobile end user experience requires an understanding of the challenges posed by the complexities of the mobile environment. This paper will reveal the 4 pillars of mobile performance, plus offer strategies for accurately monitoring mobile end user experience so you can continuously improve.
Tags : 
mobile application monitoring, mobile application monitoring system, mobile app performance, mobile application performance, app monitoring, monitor mobile applications, web performance monitoring tools, performance monitoring, web application monitoring, mobile website performance, mobile website optimization, mobile web monitoring, keynote
    
Keynote
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Amazon Web Services     Published Date: Oct 09, 2017
Enterprise customers can take advantage of the many benefits provided by Amazon Web Services (AWS) to achieve business agility, cost savings, and high availability by running their SAP environments on the AWS Cloud. Many Enterprise customers run SAP production workloads on AWS today; including those that run on NON-SAP DBs (Oracle, MS SQL, DB2) or on SAP DBs (SAP HANA, SAP ASE). To support the demand of high memory instances, AWS have disclosed their SAP HANA instance roadmap (8TB and 16TB in 2018) and just made 4TB x1e instances available. A few examples of how AWS helped SAP customers cut costs, improve performance and agility include BP reducing 1/3 of their SAP infrastructure cost, Zappos successfully migrating to SAP HANA on AWS in less than 48 hours and enabling a major Healthcare and Life Science company to run BW on HANA with 30% better performance vs. on premise. This guide is intended for SAP customers and partners who want to learn about the benefits and options for running SAP solutions on AWS, or who want to know how to implement and operate their SAP environment effectively on AWS.
Tags : 
storage, networking, management, aws, sap, infrastructure, lower tco, capex, opex
    
Amazon Web Services
Published By: Looker     Published Date: Dec 03, 2015
The focus of modern business intelligence has been self-service; pushing data into the hands of end users more quickly with more accessible user interfaces so they can get answers fast and on their own. This has helped alleviate a major BI pain point: centralized, IT-dominated solutions have been too slow and too brittle to serve the business. What has been masked is a lack of innovation in data modeling. Data modeling is a huge, valuable component of BI that has been largely neglected. In this webinar, we discuss Looker’s novel approach to data modeling and how it powers a data exploration environment with unprecedented depth and agility. Topics covered include: • A new architecture beyond direct connect • Language-based, git-integrated data modeling • Abstractions that make SQL more powerful and more efficient
Tags : 
    
Looker
Published By: IBM     Published Date: Oct 28, 2016
In this webinar, you will learn: - How to create a safe environment for honest feedback so it’s an invitation, not an imposition - Best practices for collecting feedback, from unstructured conversations to regular pulse surveys - What to do with the data you’ve collected, and how to use insights to create action plans that result in happier employees and better business performance
Tags : 
ibm, engagement social, employee engagement, kenexa
    
IBM
Published By: Amazon Web Services     Published Date: Nov 07, 2018
As more enterprises are moving some, if not all of their data and applications to the cloud – cost effectiveness, network performance and security are top of mind. AT&T NetBond for Cloud provides a dynamic, private connect to Amazon Web Services (AWS). Its enhanced infrastructure makes it easier to securely connect applications, platforms, and services. With AT&T NetBond for Cloud, customers are getting a single, end-to-end solution from one provider that allows them to maintain a hybrid environment, meaning that can utilize their current investments in their on-premises infrastructure and strategy. Download this eBook to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands in real-time - How to take advantag
Tags : 
    
Amazon Web Services
Published By: DataStax     Published Date: Nov 02, 2018
Today’s data volume, variety, and velocity has made relational database nearly obsolete for handling certain types of workloads. But it’s also put incredible strain on regular NoSQL databases. The key is to find one that can deliver the infinite scale and high availability required to support high volume, web-scale applications in clustered environments. This white paper details the capabilities and uses case of an Active Everywhere database
Tags : 
    
DataStax
Published By: Datastax     Published Date: Nov 02, 2018
Today’s data volume, variety, and velocity has made relational database nearly obsolete for handling certain types of workloads. But it’s also put incredible strain on regular NoSQL databases. The key is to find one that can deliver the infinite scale and high availability required to support high volume, web-scale applications in clustered environments. This white paper details the capabilities and uses case of an Active Everywhere database
Tags : 
    
Datastax
Start   Previous   1 2 3 4 5    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.