data access

Results 301 - 325 of 604Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: May 23, 2018
In today’s application economy, interaction between a business and its customers, partners and employees is increasingly through apps. And omni-channel access to these applications—from anywhere at any time—is dependent on APIs. These APIs provide an interface for developers to code against, and must be robust enough to support ever-growing demand. As a result, APIs are perhaps the most critical technology in digital business design today. APIs sit between your application clients —apps, websites and devices—and application backends. By leveraging APIs, you can securely stretch the boundaries of your enterprise by tapping into a broad array of digital businesses, digital customers and digital devices. But just as important as the API, is the application backend itself. Behind the API, the data access layer and application logic layer are doing the heavy lifting—implementing business rules, maintaining data consistency and managing interactions with various data sources. These three com
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
To move your business from its current state to the connected enterprise, you have to define a common API to your database and other systems, while providing the infrastructure to support the new model. The new systems must incorporate the security safeguards while ensuring the infrastructure can support the new growing, but variable, load. With the rapid adoption of mobile and web-based services across the industry, the REST architecture has emerged as the de facto standard for API integration across systems. This white paper addresses the concepts of REST, creating REST APIs for your databases and integrating with other systems: • What is REST? • Why use REST for database access? • Building REST infrastructure for database access • The REST enabled database • Integrating REST with other services • Criteria for selecting REST services platform
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
As cycles accelerate and timelines shorten, projects are being recognized—by necessity— as the delivery arm for strategy. In this environment, anything less than real-time access to real-time project data is too slow, because businesses need to know where they’re heading, not just where they’ve been. CA Project & Portfolio Management (CA PPM 15.3) has added new capabilities to support project, financial and resource management across individual initiatives and entire portfolios. We’ve also built new, embedded BI capabilities that make powerful data and insights more accessible to everyone.
Tags : 
budgets, project, cash, flows, finance, project, management
    
CA Technologies EMEA
Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA
Published By: Looker EMEA     Published Date: Sep 27, 2017
Want to know how Business Intelligence products vary in categories such as scalability, reliability, technical support, value for price paid, integrity, and whether the vendor is recommended? Read this report to get: • A side-by-side comparison of 28 BI tools • Ratings across 33 metrics for each vendor • Real customer feedback on performance
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Looker EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Much has been written about Payment Services Directive 2 (PSD2) and its potential to herald a new era of open banking where banks no longer have a monopoly on payment services. Instead they will be forced to provide full access to customer accounts to third parties looking to provide financial services of their own, on top of banks’ existing data and infrastructure. All of this could prove to be true, just not on January 13th 2018, the deadline for national governments to transpose PSD2 into law. This is because there is still so much to be decided and clarified. The European Banking Authority’s longawaited regulatory technical standards (RTS) on strong customer authentication (SCA) were issued in March 2017 but missing some of the finer details, such as the methods to remotely access customer data and account information and the measures around the use of application programming interfaces (APIs) and screen-scraping.
Tags : 
    
CA Technologies EMEA
Published By: Riverbed     Published Date: Feb 26, 2015
Nobody can afford to lose data. But managing data, including backup and availability, in locations can present many logistical and technological challenges that bring complexity, expense, and risk. It doesn’t have to be that way, though. A new branch converged infrastructure approach allows organizations to project virtual servers and data to remote offices, providing for local access and performance while storing the data in centralized data centers. Enterprises can now do business across the globe in any location without putting data at risk.
Tags : 
data center, lose data, infrastructure, data backup, infrastructure, data management
    
Riverbed
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
Organizations considering moving enterprise applications to the public cloud should ensure that they also move the application delivery services their applications rely on in the data center. In addition, cloud migration presents an opportunity to organize and rationalize security and access, gain visibility into cloud-based application traffic, and architect a strong disaster recovery plan. Download to read the 5 rules to follow when lifting and shifting apps to the the cloud.
Tags : 
apps, cloud, enterprise applications, public cloud, networking
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
Sixty-three percent of data breaches involve weak, default, or stolen passwords. Why? To put it simply, password fatigue. Think of all the passwords you keep track of for your personal needs—your mobile banking app, your Gmail, your Facebook account, your Amazon Prime… the list goes on. Best practices tell us that we should use a unique and complex password for every service, but due to increased cloud adoption—enabling anytime access to applications from any device—users lean toward convenient but risky password practices.
Tags : 
    
F5 Networks Inc
Published By: Tact     Published Date: Sep 06, 2016
Did you know that sales reps typically waste up to 16 hours per week on non-selling tasks? If your sales team is spending too much time on non-selling tasks, logging sales activities to Salesforce, hunting for customer information and documents, or copy-pasting data between separate systems, they might resist the rise of mobile CRM solutions like Salesforce1. However, it’s important to figure out how to enable these teams in the field, as 55% of salespeople will access sales applications exclusively through smartphones or tablets by the end of 2016. It’s not surprising that salespeople will increase their use of mobile apps 125% from 2015-2017. In this whitepaper from Tact, you’ll learn 1) common challenges facing field sales teams, 2) a framework for thinking about mobile sales productivity, 3) essential characteristics for evaluating mobile sales solutions, and 4) key trends in mobile sales.
Tags : 
salesforce, salesforce.com, crm, sales productivity, sales enablement, salesforce adoption, crm adoption, sales management, crm best practices, salesforce best practices, mobile applications, field sales, mobile field sales, tactile, tact, chuck ganapathi
    
Tact
Published By: ALE     Published Date: Dec 05, 2018
A highly resilient data and communications network that supports easy accessibility and cost efficiency is a requirement for hospitals and medical facilities that seek to leverage technology to digitally transform their processes. Alcatel-Lucent Enterprise (ALE) provides a broad range of robust and secure networking, infrastructure and communication products and services to connect patients, caregivers, staff and the entire healthcare ecosystem. ALE specialized data and communications networks for healthcare providers optimize the care pathway through improved communications and more efficient processes to provide more timely, safe and effective care. To find out more download this whitepaper today.
Tags : 
    
ALE
Published By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : 
pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss, data security standard, data encryption, access controls, activity monitoring, logging, retail, merchants, cardholder data, security
    
ArcSight
Published By: NetApp     Published Date: Jun 09, 2009
NetApp® SnapManager® for Oracle (SMO) is designed to significantly simplify all these tasks and more. In this article, we examine how you can deploy SMO to simplify and even automate data protection, recovery, and cloning across both primary and secondary storage. Learn more today!
Tags : 
netapp, snapmanager, oracle, smo, networked storage, snapmanager, dataontap, direct attached storage, das, data management, data integration, storage, storage efficiency, implementation, esg, it sandbox, microsoft office sharepoint server, moss, mission-critical, sql
    
NetApp
Published By: HP Data Center     Published Date: Apr 16, 2009
This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.
Tags : 
hp data center, 802.11n, architectural evolution, wlan, lan, scalability, collaboration, wireless, wireless networks, high-bandwidth, access points, aps, quality of service, qos, rf configuration, infrastructure, lan backbone, bottleneck, hp procurve, network architecture
    
HP Data Center
Published By: MicroStrategy     Published Date: Mar 16, 2011
This paper will discuss the security capabilities of MicroStrategy Mobile on Apple's mobile devices.
Tags : 
microstrategy, mobile business intelligence, bi application, security, data access, apple mobile device, data transmission, data storage, data protection
    
MicroStrategy
Published By: Quest Software     Published Date: Jul 28, 2011
In this white paper Quest's data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.
Tags : 
quest, storage virtualization, it management, systems management solutions, virtualization managemen, windows, database, application, oem, innovation accelerator, smb, recovery, data protection, identity management, development, optimization, access management, migration, consolidation, performance
    
Quest Software
Published By: Citrix Systems     Published Date: Apr 15, 2015
IT professionals are rethinking remote access strategies to enable a mobile workforce. Whether they are in the office or on the road, people need secure remote access that’s simple to use, so they can be productive from anywhere. Empower your mobile workers with the right level of access to Windows® apps and data, using a solution that IT can trust. Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, compliance, application security
    
Citrix Systems
Published By: Citrix Systems     Published Date: Oct 16, 2015
Cases for App Virtualization
Tags : 
app virtualization, data, secure access, productivity, corporate resource
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 17, 2015
Reduce the work need to provide better security.
Tags : 
data, data protection, access control, security task, application, desktop virtualization
    
Citrix Systems
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
    
ForeScout
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout
Published By: CDW     Published Date: Oct 10, 2013
Increasing staff productivity while lowering costs tied to this growing enterprise resource. A productive mobile program starts with holistic research and planning. Approaching mobility from a lifecycle standpoint will help an organization focus on optimizing each stage of the process. Having some guidance on what to expect at the different points of the mobility lifecycle is valuable for planning purposes.
Tags : 
mobile solutions, byod, mobile safety, mobile strategies, data access, secure foundation, applications, mobile app, app security, secure network
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Databases store companies’ most valuable information assets, but in most cases they’re poorly protected. It’s important to secure databases as well as or better than other systems in the enterprise. But it’s not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security
    
McAfee
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee