business application

Results 1451 - 1475 of 1484Sort Results By: Published Date | Title | Company Name
Published By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : 
veracode, security, supply chain security, web applications, application security, enterprise applications, business technology
    
Veracode
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
application management, application development, organization optimization, authentication, application security, enterprise applications, app blocking
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Not long ago, job roles were relatively easy to define and control. A person was an “accountant” or a “graphic designer” or a “business partner.” But as organizations grew and business software became more sophisticated, new roles were added. “Accountant, New York” might require different access to applications and data than “Accountant, Chicago.” The challenge comes from the recent explosion in the numbers and types of business roles.
Tags : 
identity governance, entitlements, authorized users, orphan accounts, business activities
    
IBM
Published By: Cox Business     Published Date: Dec 19, 2016
Businesses need to plan for unforeseen events that can disrupt productivity, impair the customer experience, and possibly even threaten a business’s existence. A disruption every business needs to plan for is any event that destroys valuable data, inhibits access to data, or causes downtime of core applications. Consider the staggering amount of information your company stores electronically. What if an unforeseen event destroyed all financial records, client contacts, and application data? You wouldn’t be able to send customers accurate invoices. Your marketing efforts might be undermined. You would lack key metrics for measuring quality, profitability, and more. The losses could be staggering. In every aspect of life, it’s smart to plan for unexpected events. That’s especially true for two plans every business must have: a disaster recovery plan and a business continuity plan.
Tags : 
    
Cox Business
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Progress     Published Date: Mar 26, 2018
Digital transformation has changed the face of business across the globe. New digital technologies— specifically, mobile devices—are opening new avenues for companies to engage their prospects and manage their operations with greater effectiveness and efficiency. However, in the healthcare space, the response to these technological innovations has been reserved. While it’s undeniable that digital transformation could bring great change to the healthcare space just as it has in other industries, obstacles like regulatory compliance and rigid systems of record discourage the adoption of new tools and technology. This has led to frustration from all sides of the healthcare ecosystem. Many people are accustomed to using intuitive digital applications in their everyday lives, so when healthcare applications deliver archaic user experiences, everyone is left wanting more. Patients and members want applications that enable them to manage their health more easily. Providers want to provide new
Tags : 
    
Progress
Published By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: OnBase by Hyland     Published Date: May 16, 2017
The role of enterprise content management (ECM) as a centralized document repository is well established. However, the value of ECM increases exponentially when it is leveraged as an information hub between line-of-business (LOB) systems to facilitate key processes, keep data in sync and maximize investments in existing applications.
Tags : 
hyland, ecm, document repository, enterprise information hub, automated business processes
    
OnBase by Hyland
Published By: OnBase by Hyland     Published Date: May 16, 2017
To make informed decisions and serve customers, your employees need the right tools and access to key information, in the right context. But, when business-critical information is scattered across multiple off-the-shelf and custom-coded applications, your workers are less efficient and your customers’ experiences suffer. When it comes to your enterprise application strategy, are you thinking beyond build-versus-buy? Download this Forrester Consulting thought leadership paper to learn how Low-code rapid application development platforms offer a faster, easier alternative that empowers your IT organization, your employees and your customers.
Tags : 
forrester consulting, hyland, application development platforms, rapid app development platform, it sprawl, it solutions
    
OnBase by Hyland
Published By: OnBase by Hyland     Published Date: May 16, 2017
With smartphones and tablets now standard-issue office gear,workers fully expect to have mobile access to critical data and business applications wherever and whenever the need arises.And it’s not just the average field worker or sales rep who stands to benefit from remote access. An IDG survey found that 61% of the executive managers saw value in accessing critical business data while offline via their mobile devices. This IDG whitepaper proves that offline access is the key to unlocking mobility’s promise.
Tags : 
hyland, offline access, mobility, remote access, mobile access, business applications
    
OnBase by Hyland
Published By: Juniper Networks     Published Date: Jun 22, 2017
Businesses increasingly recognize that their customers and workers are engaging in ways that were inconceivable when their essential applications were first architected, according to Chris Rechtsteiner, vice president of marketing for ServerCentral. “A group in one country has to have the exact same service levels as a location in another country, and half the people are internal end users, while the other half are external customers,” he says. As their businesses have globalized, their most strategic applications have struggled to keep pace. “Companies are coming to us, asking ‘How do we do this? How do we solve this problem?’ That’s really what it comes down to.”
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring. The mechanism of “Pull” processes—those triggered by an actual event instead of a forecast—is nothing new. It is at the heart of many successful manufacturing strategies. Recent technological advances in digitization, including the harnessing of Big Data analytics, the use of the cloud, Business Process Management (BPM), social media, IIoT, and mobility, have extended the power of Pull beyond Lean manufacturing. In the wake of the current technological innovation wave, it is not uncommon for manufacturers to not know what next step to take. In light of these new developments, this white paper will focus on the mechanism of business transformation enabled by these technologies, which can be attributed to two major forces: the power of Pull and digitization. Nine practical applications are detailed, showing how innovative manufacturers can better
Tags : 
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Business and manufacturing professionals are looking for new ways for operations to support improvements to their company’s products, services, and bottom line. This eBooks delves into: • Industry drivers and challenges • Accelerating success through people • Accelerating success through the process • Accelerating success through technology • Recommendations for accelerating your Operational Excellence journey Leading companies are aligning people, optimizing processes, and supporting both with MOM software applications in order to accelerate their Operational Excellence journeys. Make sure your company isn’t falling behind.
Tags : 
    
Dassault Systèmes
Published By: Pure Storage     Published Date: Jul 03, 2019
Man AHL is a pioneer in the field of systematic quantitative investing. Its entire business is based on creating and executing computer models to make investment decisions. The firm has adopted the Pure FlashBlade™ solution from Pure Storage to deliver the massive storage throughput and scalability required to meet its most demanding simulation applications.
Tags : 
    
Pure Storage
Published By: Google     Published Date: Dec 03, 2018
As businesses have embraced application development, they have also adopted cloud technologies that provide their teams lesser reliance on hardware. In this sponsored Economist Intelligence Unit report, we look at the real-life experiences of over 1,000 business executives and understand the importance of close alignment between development teams, C-suite, and the wider business. Read the report and find out how you can manage application development to unlock its full potential.
Tags : 
    
Google
Published By: Oracle Security Solutions     Published Date: Oct 16, 2017
Cloud adoption promises the benefit of increased flexibility and significant cost savings. Hence, migrating business-critical applications to the cloud is becoming a growing priority for companies of all sizes. A recent survey of more than 250,000 information security professionals revealed that more than 77 percent of organizations have already adopted cloud services and 10 percent of those companies using cloud services describe themselves as heavy users.
Tags : 
    
Oracle Security Solutions
Published By: Datavail     Published Date: Nov 03, 2017
The management of financial data in an organization is of paramount importance. Reporting, evaluating ROI, making adjustments across the business, and increasing revenue depend on good, accessible financial data that can be updated and integrated across systems and software. For these reasons, many organizations have turned to master data management (MDM) software in the effort to better store, access, search, retrieve, and analyze their financial data. These MDM solutions are able to collect data within a single unified, fully integrated, user-friendly platform. However, in order to be most effective, MDM applications must also have capabilities in data relationship management (DRM). DRM software is able to describe and enforce the relationships between data, no matter where it's located within an organization, to provide a holistic and consistent solution.
Tags : 
    
Datavail
Published By: Forcepoint     Published Date: Jul 30, 2019
How to boost results, cut costs and manage risk in an internet-connected world Digital transformation is driving change across the world, creating new opportunities to boost business productivity, while cutting the costs of infrastructure and operations. Increasingly distributed?organizations are re-architecting their networks and security to move their most valuable data?and applications to the cloud, in order to give their users much richer, faster, less expensive?access than ever before. Enabling remote sites and off-network users to securely connect?direct-to-cloud is the new challenge facing enterprises and government agencies.? How can distributed organizations achieve the reliable, secure connectivity to the cloud they?need? Many are now using internet technologies?for connect all of their users to cloud-based applications more productively and cost-effectively than ever before. Join Forcepoint for this informative discussion. In this session we will cover: How to accelerate
Tags : 
    
Forcepoint
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: IBM     Published Date: Jul 09, 2018
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 26, 2018
Over the past few years, business leaders have been the primary drivers of technology change, including making decisions to adopt new applications in the cloud, mandate a cloud-first strategy, offer new capabilities with an API-first strategy, and provide new applications to end users on mobile first. There are significant benefits to these cloud decisions because they decrease time to value, lower costs, and make it easier for organizations to experiment and innovate. But there are consequences as well, chiefly in the complexity of learning how to integrate applications and exchange data across a decentralized architecture that is largely driven by autonomous development decisions. This IDC White Paper answers the following questions about the need for hybrid integration: How are changes in business strategy and technology adoption requiring changes in how organizations approach integration? What are the major events that trigger integration adaptation? How are the roles involve
Tags : 
    
Group M_IBM Q418
Published By: ThousandEyes     Published Date: Jan 14, 2018
Read how Network Intelligence equips your team to deliver predictable digital experience in the cloud era.
Tags : 
thousandeyes, network intelligence, business application, application performance management, cloud applications
    
ThousandEyes
Published By: BigCommerce     Published Date: Feb 12, 2018
For many years, the Magento ecommerce platform has been the retail industry go-to running an enterprise online store. However, when most businesses first made Magento their solution of choice, it was the only viable option out there. Today, Magento is no longer the only option in the mid-market and enterprise retail sectors. SaaS platforms like BigCommerce have disrupted this market, allowing for deep customization, unlimited products, industry-leading average uptime of 99.99% and 100% during Cyber Week, 24/7 support, one-click application integration, and seamless product updates. All for a fraction of the cost. Learn the five more critical differences between the two leading platforms in this white paper.
Tags : 
bigcommerce, magento, ecommerce, shopify, shopping cart, website, dropshipping, amazon, ebay, google shopping, demandware, wesbite design, ecommerce website, best ecommerce, omnichannel, b2b ecommerce, erp, payment gateway, saas, sell online
    
BigCommerce
Published By: BigCommerce     Published Date: May 30, 2018
For many years, the Magento ecommerce platform has been the retail industry go-to for running an enterprise online store. However, when most businesses first choose Magento, it was the only viable option out there. Today, Magento is no longer the only option for mid-market and enterprise businesses. SaaS platforms like BigCommerce have disrupted this market, allowing for deep customization, unlimited products, industry-leading average uptime of 99.99%, 24/7 support, one-click application integration, and seamless product updates. All for a fraction of the cost. Learn the five more critical differences between the two leading platforms in this white paper.
Tags : 
    
BigCommerce
Start   Previous    46 47 48 49 50 51 52 53 54 55 56 57 58 59 60    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee