saas applications

Results 51 - 75 of 155Sort Results By: Published Date | Title | Company Name
Published By: ThousandEyes     Published Date: Aug 04, 2017
Technology trends like telecommuting, BYOD, VoIP and SaaS adoption bring new challenges to the underlying network infrastructure that connects branch offices and datacenters. This guide explains how to tackle the challenges faced by the internet-centric enterprise by intelligently monitoring your WAN, LAN, Wi-Fi and SaaS applications through a combination of Enterprise and Endpoint Agents.
Tags : 
telecommuting, datacenter, network infrastructure, lan monitoring
    
ThousandEyes
Published By: ThousandEyes     Published Date: Aug 04, 2017
Traditional enterprise performance management solutions were designed for applications running inside the corporate network and are unable to provide visibility beyond the corporate network perimeter. With the rapid adoption of Software-as-a-Service (SaaS) applications by enterprises, these performance management solutions that are completely blind to issues outside the enterprise, are unable to help IT teams troubleshoot performance problems with the SaaS applications.
Tags : 
information technology, software as a service, management solutions, corporate network
    
ThousandEyes
Published By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware
Published By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware AirWatch
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Published By: VMware     Published Date: May 10, 2017
VMware Identity Manager provides single sign-on (SSO) to a broad range of SaaS applications, as well as legacy applications published via virtual desktop platforms from VMware and Citrix, and browser-based and native mobile apps. VMware Identity Manager also provides application provision¬ing and conditional (adaptive, or risk-based) access controls, and can be deployed either on-premises or in the cloud. In this report, 451 Research analyzes VMware’s strategic effort to bridge the legacy on-premises world (which still represents most of its business) with the more highly distributed and heterogeneous worlds of mobile and cloud computing. 451 also examines VMware’s re-entry into the IDaaS market is to extend their market reach beyond what VDI and EMM might accomplish individually.
Tags : 
    
VMware
Published By: F5 Networks Inc     Published Date: May 03, 2017
Global adoption of the cloud is accelerating at a dizzying rate each year with businesses of all sizes realizing the cost-saving, flexibility, and scalability benefits of migrating and running applications in the cloud. In a 2016 survey*, F5 found that 67 percent of the respondents identified themselves as “Cloud First,” and three cloud models—private, public, and SaaS—dominated the top five IT strategic trends. As pressure to move applications to cloud and hybrid environments intensifies, IT teams must grapple with sometimes significant migration challenges. Though each migration is different, there are several common considerations to keep in mind to help you on your own cloud journey. This guide provides a blueprint to help you think through many of the long-term impacts of your migration options and establish a strong foundation for your cloud migration strategy. The end result should be a migration strategy that leaves you in a position to support your technology as your business
Tags : 
cloud, cloud computing, hybrid environment
    
F5 Networks Inc
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
A new survey commissioned by Palo Alto Networks and conducted by Enterprise Strategy Group explores why enterprise IT leaders are embracing CASB products, where they are using them, and what capabilities are most important to them. One of the most critical needs is securing the use of SaaS applications. Here’s what you need to know.
Tags : 
    
Palo Alto Networks
Published By: ThousandEyes     Published Date: Mar 14, 2017
This guide explains how to tackle the challenges faced by the internet-centric enterprise by intelligently monitoring your WAN, LAN, Wi-Fi and SaaS applications through a combination of Enterprise and Endpoint Agents.
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Mar 14, 2017
With the rapid adoption of Software-as-a-Service (SaaS) applications by enterprises, these performance management solutions that are completely blind to issues outside the enterprise, are unable to help IT teams troubleshoot performance problems with the SaaS applications.
Tags : 
    
ThousandEyes
Published By: NetApp     Published Date: Dec 05, 2016
Realizing market penetration and a fast path to revenue comes with a unique set of challenges for SaaS vendors looking to provide cloud-based software applications. Download the white paper to see if your infrastructure is up to the task.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Dec 05, 2016
Realizing market penetration and a fast path to revenue comes with a unique set of challenges for SaaS vendors looking to provide cloud-based software applications. Download the white paper to see if your infrastructure is up to the task.
Tags : 
    
NetApp
Published By: ThousandEyes     Published Date: Nov 17, 2016
Traditional performance management solutions were built for applications owned by the enterprise and run inside the corporate network. The explosive adoption of Software-as-a-Service (SaaS) and cloud applications have brought new performance management challenges that push the limits of the enterprise infrastructure and break these traditional approaches. In this white paper, we examine why existing solutions don’t work for the modern enterprise and discuss a fundamentally different approach that is needed to address the new challenges. Download now to learn more!
Tags : 
    
ThousandEyes
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
The rapid adoption of SaaS-based applications in organizations today continues at a breakneck pace. These applications provide critical functionality and enable greater productivity, but at the same time introduce potential new security and data theft risks if not properly controlled.
Tags : 
palo alto, saas, security, shadow it, applications
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Every year, record levels of money are spent on new IT security technology yet major breaches and compromises are more prevalent than ever. The concept of “layered security” in which an organization supports a wide variety of security technologies in order to discourage attackers doesn’t seem to be working. It’s time to rethink IT security not just the technology, but the way it’s approached from a strategic, architectural perspective.
Tags : 
palo alto, security, security architecture, saas, applications
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
SaaS applications continue to provide a tremendous value to end users with easy setup and collaboration capabilities that are changing the way organizations do business. The concern over the loss of data leaving the corporate network and opening the network to external threats through unknown collaborators has caused many organizations to take a "wait and see" approach to SaaS. Microsoft® Office 365™ changes all that.
Tags : 
palo alto, saas, data, microsoft office, security
    
Palo Alto Networks
Published By: MuleSoft     Published Date: Sep 08, 2016
Enterprises are adopting more and more SaaS applications and customers are interacting with companies from an increasing number of channels. Many companies are not ready to provide the level of engagement, service and support their customers demand. New applications are added to the company’s ecosystem, but not connected with the existing applications. Customer data is inconsistent and not synced across a customer’s lifecycle.
Tags : 
mulesoft, microservices, digital transformation, business value, it support
    
MuleSoft
Published By: CDW     Published Date: Aug 04, 2016
As IT advances, organizations are adopting infrastructures that enhance agility and improve efficiency. Data centers are evolving to a state that is almost unrecognizable from only a few years ago. Numerous forces, such as cloud computing and powerful orchestration solutions, are combining to fundamentally change data centers, making them more powerful, sophisticated, flexible and efficient. Many organizations are adopting a hybrid infrastructure data center model that combines a variety of technologies and methodologies, including virtualization, private clouds and other internal IT resources, along with external options such as hosting, colocation, Software as a Service (SaaS) applications and Infrastructure as a Service (IaaS) offerings.
Tags : 
data center, best practices, technology, data, cloud, cloud computing, business technology
    
CDW
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
best practices, storage, mobile workforce, technology, data, office 365, mobile device, business technology
    
Druva
Published By: Okta     Published Date: Jul 27, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and provisioning solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Red Hat     Published Date: Jun 23, 2016
CA Technologies, a software company servicing the majority of the Global Fortune 500, wanted to help its internal development teams get its world-class apps to market faster. By using OpenShift Enterprise by Red Hat, CA Technologies was able to provide a Platform-as-a-Service (PaaS) for its internal teams to more quickly build and deploy Software-as-a Service (SaaS) applications for its external customers. Development times dropped from months to weeks in most cases. In addition, the new system offers maximum scalability by automatically spinning up or spinning down servers based on user load.
Tags : 
technology, best practices, global fortune 500, development, productivity
    
Red Hat
Published By: Cloudroute     Published Date: Jun 01, 2016
Keep your employees productive on their essential applications and favorite devices, and your company data protected with enterprise mobility solutions. Deliver and support Single sign-on to thousands of popular SaaS applications like Salesforce, Concur, and Workday. Manage iOS, Android, and Windows computers and mobile devices from one platform. And, finally, get enterprise grade security for your organization by identifying threats before they can damage your business.
Tags : 
    
Cloudroute
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee