> Research Library > Technology > Enterprise Applications
 

Enterprise Applications

Enterprise Application software performs business functions such as accounting, production scheduling, customer information tracking, bank account maintenance, and the like. It is almost always hosted on servers, and is used by multiple employees of the same organization. Major subcategories include ERP, CRM, and SCM.
Results 2601 - 2625 of 2738Sort Results By: Published Date | Title | Company Name
White Paper Published By: Tripp Lite     Published Date: Sep 30, 2015
This white paper: • Explains the staggering growth of digital data volume and the increasing demand for faster access • Examines the different types of data transmission • Outlines the two potential solutions for connecting 10Gb equipment with higher-speed equipment
Tags : 
equipment, higher-speed, data transmission, infrastructure, volume
    
Tripp Lite
White Paper Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring
    
Tripwire
White Paper Published By: U.S. Cellular     Published Date: Jun 13, 2016
Infographic Published By: U.S. Cellular See top reasons why your fleet is costing you money and how fleet management solutions can help your business save money and boost efficiency. Download now!
Tags : 
us cellular, business solutions, business continuity, best practices, fleet management
    
U.S. Cellular
White Paper Published By: U.S. Cellular     Published Date: Jun 13, 2016
Take your operations to the next level. Learn how fleet management solutions can help your business save time and money with features such as: • Real-time, location monitoring • Automated alerts for proactive vehicle maintenance • Route optimization See examples from different industries, ideas for overcoming common implementation challenges and strategies for adopting your own fleet management program. Download now.
Tags : 
us cellular, business solutions, fleet management, best practices, fleet management programs
    
U.S. Cellular
White Paper Published By: Ultimus     Published Date: Aug 16, 2007
By enabling Adaptive SOA, Ultimus Adaptive Discovery takes SOA to the highest level of rapid deployment and agility. It accomplishes this by enabling business processes to be developed rapidly, and to embrace change in real-time. More importantly, it empowers business professionals and analysts who own processes to discover and change processes with IT playing the supporting role to manage the infrastructure.
Tags : 
ultimus, bpm, business process management, automation, process discovery
    
Ultimus
White Paper Published By: Ultimus     Published Date: Aug 16, 2007
With the largest global installed base of pure-play BPM solutions, the Ultimus BPM Suite exemplifies the role of managing OSAP processes in the business process ecosystem. Customers worldwide use it to extend, maximize and complement their investments in SAP or other enterprise applications.
Tags : 
ultimus, bpm, business process management, automation, bpa
    
Ultimus
White Paper Published By: Ultimus     Published Date: Aug 16, 2007
Ultimus has been build from the ground-up with scalability in mind. Ultimus’ component-based, database centric architecture position it perfectly as a solution that allows you to effortlessly scale your enterprise business processes.
Tags : 
ultimus, bpm, business process management, automation, bpa
    
Ultimus
White Paper Published By: Unitrends     Published Date: Jan 05, 2017
Compliments of Unitrends. This Buyer’s Guide highlights the most robust and feature rich integrated backup appliances available on the market today. These backup appliances have many if not all of the features needed to protect both physical and virtual environments and will give you visibility into the new set of features that will define the next generation of integrated backup appliances.
Tags : 
unitrends, integrated backup appliance, backup, recovery, it management
    
Unitrends
White Paper Published By: Unitrends     Published Date: Jan 05, 2017
Compliments of Unitrends. DCIG's analysts have done the heavy lifting for you. This Buyer's Guide evaluates the full range purpose-built backup appliance product capabilities, including features that enable the long-term retention of backups in the cloud and even application recovery in the cloud.
Tags : 
unitrends, hybrid cloud backup appliance, cloud, recovery, backup
    
Unitrends
White Paper Published By: Unitrends     Published Date: Jan 05, 2017
Exchange Online, SharePoint Online, and OneDrive for Business are the applications your business relies on every day. But without a smart backup plan, finding and restoring lost Office 365 data can take hours, days, or even longer. The facts are that data loss can occur in cloud-based applications, including Microsoft Office 365 and deleted items will be permanently removed after 14 days. Read our eBook to learn how to broaden your backup and recovery plan to include purpose built protection for Microsoft Office 365.
Tags : 
unitrends, microsoft office 365, backup, recovery, data loss
    
Unitrends
White Paper Published By: Unitrends     Published Date: Oct 30, 2015
Usability—much less beauty—was never a priority for backup and recovery software. All that mattered was that large and complex applications, usually diverse independent applications from multiple vendors, worked. As a result, IT staff spent countless hours slogging through poorly designed systems. But it doesn't have to be like this.
Tags : 
unitrends, backup software, recovery software, it staff solutions, it solutions
    
Unitrends
White Paper Published By: Velaro     Published Date: May 06, 2014
Did you know that those who respond to a proactive online chat invitation are 6 times more likely to buy than the average website visitor? Download this paper for practical advice on using proactive chat to increase sales online sales and customer satisfaction.
Tags : 
live chat, live chat software, proactive live chat, online sales conversions, ecommerce
    
Velaro
White Paper Published By: Venafi     Published Date: Jul 27, 2015
According to Gartner, by 2017, more than ?50% of network attacks will use encrypted SSL/TLS. Most organizations cannot decrypt and inspect SSL communications to detect these threats, which creates security blind spots.
Tags : 
ssl traffic, venafi, tls, security blind spots, it security
    
Venafi
White Paper Published By: Veracode     Published Date: Oct 28, 2016
The Ultimate Guide to Getting Started with Application Security Application-layer attacks are growing much more rapidly than infrastructure attacks. Yet many organizations remain hesitant to create an application security program, believing it will require excessive time and resources. The reality is that any organization, of any size, can and should develop an applications security program. Download the Ultimate Guide to Getting Started With Application Security now for details!
Tags : 
veracode, security, devops, appsec, application security
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 28, 2016
Trends and Tactics: How IT Professionals are Approaching AppSec Today
Tags : 
veracode, security, devops, appsec, enterprise applications
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 28, 2016
Web application attacks are the most frequent pattern in confirmed breaches. But many security budgets don’t line up with this risk. Getting the budget for AppSec won’t be easy, but now is the time to make the case. Download this e-book to find out the reasons why AppSec is the most productive security spend.
Tags : 
veracode, security, devops, appsec, enterprise applications
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 28, 2016
DevOps practices, while relatively new, are spreading rapidly. And there are sound business reasons for executives to embrace these changes. This e-book from Veracode provides background into the evolution of DevOps and proposes five principles that must be addressed for those seeking to integrate AppSec into DevOps.
Tags : 
veracode, security, devops, appsec, enterprise applications
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 27, 2016
Veracode’s State of Software Security report provides security practitioners with tangible Application Security benchmarks with which to measure their own programs against. The metrics presented here are based on real application risk postures, drawn from code-level analysis of billions of lines of code across 300,000 assessments performed over the last 18 months. Download the report now!
Tags : 
veracode, security, software security, application security, security benchmark
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : 
veracode, security, devops, application security, enterprise applications
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : 
veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : 
veracode, security, supply chain security, web applications, application security
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 26, 2016
Web application attacks are now the most frequent pattern in confirmed breaches, and organizations know that application security is key to protecting their data. But many organizations lack the resources to develop a comprehensive AppSec program, and need to look to external services. Download this guide for a straightforward, four-step method for acquiring the services you need to support a comprehensive AppSec program.
Tags : 
veracode, application security, sans, security, enterprise applications
    
Veracode
White Paper Published By: Viavi Solutions     Published Date: Mar 21, 2016
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users—from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
viavi solutions, hybrid clouds, networking, it management, wireless
    
Viavi Solutions
Start   Previous    96 97 98 99 100 101 102 103 104 105 106 107 108 109 110    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee