Whitepaper Library
 

http

Results 1 - 25 of 58Sort Results By: Published Date | Title | Company Name
Published By: Amazon Web Services     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
Amazon Web Services
Published By: NEC     Published Date: Sep 29, 2009
Written by: IDC Abner Germanow, Jonathan Edwards, Lee Doyle IDC believes the convergence of communications and mainstream IT architectures will drive significant innovation in business processes over the next decade.
Tags : 
it architecture, idc, automation, automated order processing, soa, service oriented architecture, soap, http, xml, wsdl, uddi, esbs, jee, .net, crm, san
    
NEC
Published By: Cisco     Published Date: Oct 11, 2016
The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
cybersecurity, attackers, http, ransomeware, malware
    
Cisco
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: Red Hat     Published Date: Jun 17, 2013
A recent Gartner research note discusses the strides DreamWorks Animation has made during its 13 years using open source technology. Red Hat has found that with cloud, virtualization, middleware, and operating system products and services, DreamWorks Animation has streamlined processes, improved techniques, and significantly reduced costs.
Tags : 
dreamworks, animation, production, red hat, technology, gartner, virtualization, cloud, cloud computing
    
Red Hat
Published By: PernixData     Published Date: Jun 01, 2015
David Klee and Bala Narasimhan discuss the tips for DBAs and Infrastructure Admins to maximize the performance of their systems without massive restructuring of their environments. - See more at: http://www.pernixdata.com/resource/database-experts-bringing-together-databases-virtualization-and-storage#sthash.KKii86jl.dRQXxxik.dpuf
Tags : 
pernixdata, virtualization, storage, dbas, databases
    
PernixData
Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices
    
Akamai Technologies
Published By: VMWare EMEA     Published Date: Oct 23, 2017
To meet the challenges of managing such a complex environment, IT teams need an enterprise-ready cloud management platform that can support multivendor environments, automate application and service delivery, and facilitate operations and governance. VMware provides an enterprise-ready cloud management platform that delivers the industry’s most complete solution for managing a heterogeneous, hybrid cloud, and supports cloud management requirements across Day 1 and Day 2 operations for compute, storage, network and application level resources. The VMware solution is in use today across a wide range of industries and use cases, delivering benefits such as faster provisioning, optimized IT operations, and lower capital spending. To learn more about the VMware cloud management platform, visit http://www.vmware.com/virtualization/ cloud-management.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Intralinks     Published Date: Nov 23, 2015
There are multiple options for organizations with intellectual property and restricted information that must be shared between staff and business partners to adopt in order to avoid inadvertent release of restricted information to unauthorized personnel.
Tags : 
kuppingercole, information sharing, security, data, intralinks
    
Intralinks
Published By: Zoom     Published Date: Apr 06, 2016
Solar City provides a customer testimonial detailing how Zoom was able to help reduce executive travel costs, increase efficiency, and expand nationally and internationally. Learn more about Zoom today at http://zoom.us/
Tags : 
zoom, solar city, video conferencing, zoom rooms, conference systems, networking
    
Zoom
Published By: Mimecast     Published Date: Feb 28, 2017
Meer Informatie over Office 365™ Migratierisico's en hoe u de afhankelijkheid van uw SaaS-applicaties kunt beheersen. Als u als organisatie overweegt om naar Office 365™ over te stappen, moet u zich bewust zijn van een aantal belangrijke risico's voor uw e-mailinfrastructuur. De cloud lijkt misschien een eenvoudig, kosteneffectief alternatief voor lokale e-mail, maar de continuïteit en de veiligheid mag niet over het hoofd worden gezien. Download hieronder ons e-boek, Zonder Zorgen Uw E-mail naar de Cloud Verplaatsen: Aanbevolen Procedures voor het Beheersen van Risico's in een Office 365 Wereld" voor meer informatie over het beheersen van risico's met uw e-mail in de cloud. - See more at: http://info.mimecast.com/wakkerworden.html#sthash.xdcnYAbz.dpuf
Tags : 
office 365, e-mail, beveiliging, salesforce, schaalbaarheid
    
Mimecast
Published By: Mimecast     Published Date: Feb 28, 2017
Vervalsing van e-mail verpersoonlijking – ook wel bekend als CEO fraude of "whaling" aanvallen vormen een groeiende bedreiging voor bedrijven van elke omvang. Deze veiligheidsbedreiging heeft in de afgelopen 3 jaar meer dan 2 biljoen Euro aan schade veroorzaakt.* Denkt u dat deze aanvallen geen bedreiging voor u opleveren? Even wakker worden! Download nu het nieuwe Mimecast – e-boek: Anatomie van een "whaling" aanval, om meer te leren over deze bedreiging voor uw organisatie, de feiten, kosten en de schade die het kan veroorzaken – en hoe u het kan voorkomen. - See more at: http://info.mimecast.com/anatomievaneenwhalingaanval.html#sthash.rjajy1cW.dpuf
Tags : 
financieel, e-mail, phishing, veiligheid, whaling
    
Mimecast
Published By: Mimecast     Published Date: Feb 28, 2017
Lär dig mer om riskerna med att migrera till Office 365™ och hur du undviker en SaaS-monokultur. När en organisation överväger att migrera till Office 365, måste de vara medvetna om flera signifikanta risker för deras e-postinfrastruktur. Molnet kan verka vara ett enkelt och kostnadseffektivt alternativ till en lokal e-post, men kontinuitets- och säkerhetsaspekterna får inte förbises. Hämta vår e-bok, "Trygg flytt av er e-post till molnet: Bästa praxis för att hantera risker i Office 365”, nedan för att lära dig mer om hur ni undviker problem med molnbaserad e-post. - See more at: http://info.mimecast.com/dagsaattankaom.html#sthash.7mojzQPN.dpuf
Tags : 
office 365, e-post, säkerhet, salesforce, skalbarhet
    
Mimecast
Published By: VMware Citrix     Published Date: Jan 23, 2018
VMware Horizon and Workspace ONE is the most complete solution for delivering, managing, and protecting Windows desktops, applications, and online services across devices, locations, media, and connections. To learn more about how Workspace ONE delivers and manages any device by integrating identity, application, and enterprise mobility management: Visit http://www.vmware.com/products/horizon
Tags : 
vmware, horizon, workspace, delivering, managing, applications, desktop, online services
    
VMware Citrix
Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Cloud computing has a lot of appeal, from auto-scaling to lower costs, and it's all just a few clicks away. Thus, the big question is not "why cloud?" but rather "how cloud?"
Tags : 
cloud, cloud computing, autoscaling, lower costs, applications technology, applications platform, it productivity, application lifecycle, tomcat, java ee, virtualization, multiple platforms, platform-as-a-service, paas, developer productivity, maven, hudson, production support, production maintenance, cloud architecture
    
Red Hat, Inc.
Published By: Zebra ABM     Published Date: Dec 14, 2017
Meet the demands of your highest-volume POS lanes with Zebra MP7000 next generation multi-plane 1D/2D imager. To learn more about Zebra's MP7000, go to: https://goo.gl/693u8o.
Tags : 
webinar, video, multi, plane, scanner, zebra, technologies, mp7000, next generation
    
Zebra ABM
Published By: Zebra ABM     Published Date: Dec 14, 2017
The MP7000 is loaded with features that take scanning performance and simplicity to the next level for faster checkout lanes, increased cashier productivity and POS throughput — and a better shopping experience. To learn more about the MP7000, go to: https://goo.gl/693u8o.
Tags : 
zebra technologies, mp7000, multi, plane, scanner, webinar
    
Zebra ABM
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.
Tags : 
mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering, http traffic, application awareness
    
McAfee
Published By: Aria Systems     Published Date: Nov 02, 2015
The case for recurring revenue models has grown so strong as to be irrefutable, but putting these ideas to work for your business requires infrastructure, a plan, and proficient implementation. This Guide to Recurring Revenue Success was written by industry expert Bob Harden to inform you about the opportunity for recurring revenue, what’s necessary to succeed, and how to get started. You'll learn: • Why the recurring revenue model is spreading so rapidly • How to get started on developing a recurring revenue strategy • Which elements are essential for successful implementation • What lies ahead for companies which adopt recurring revenue models - See more at: http://info.ariasystems.com/recurring-revenue-success-guide.html#sthash.W65wlfVw.dpuf
Tags : 
aria systems, revenue models, recurring revenue success, bob harden
    
Aria Systems
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Understanding HTTP and how these headers control behavior of web-based applications can lead to better end-user performance, as well as making it easier to choose an application acceleration solution that addresses the shortcomings of HTTP and browser-based solutions.
Tags : 
fundamentals of http, web-based applications, http, application acceleration solution, browser-based solutions
    
F5 Networks Inc
Published By: ServiceNow     Published Date: Oct 11, 2017
https://www.servicenow.com/thank-you.d06267da-bd2d-4d8c-9fa8-d1c4afbc001e.html
Tags : 
    
ServiceNow
Published By: F5 Networks Inc     Published Date: Mar 23, 2015
A powerful but radically different version of the Web’s defining standard is coming soon and new research suggests many IT departments aren’t ready. While HTTP/2 enables dramatic improvements to both the speed and security of mission-critical Web applications, most companies are likely to find deploying it a complex and time-consuming task. An exclusive new survey from IDG Research reveals that large numbers of IT professionals know little about the new protocol or the technical challenges it can present and even fewer have a strategy in place for collecting HTTP/2’s considerable benefits without suffering its potential pitfalls.
Tags : 
http, web applications, mobile bandwidth, it security standards, mobile performance
    
F5 Networks Inc
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Private cloud is one of the critical deployment architectures IT teams are adopting as they transition to a service-centric delivery model. More than 75% of organizations? already use private clouds to lower costs, increase agility and exert greater control over security, data protection and compliance. The transition to private cloud represents a paradigm shift in how IT is provisioned and data centers are deployed. Virtualization is expanding beyond servers into storage and networking, while software-defined models allow new levels of agility through advanced automation and orchestration. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
cloud, security, guide, privacy, architectures, organizations, compliance, protection
    
McAfee EMEA
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.
Tags : 
watchguard xcs, security for retailers, zeus botnet, web security, web content filtering, https inspection, data loss prevention, targeted attacks, web applications, pci dss 2.0, spear phishing, application control, drive-by download, malicious activity, network security solutions, business continuity
    
WatchGuard Technologies
Published By: BMC Software     Published Date: Feb 12, 2014
IT as a Service (ITaaS) will transform future IT operations and service delivery. In the interim, Hybrid IT offers a rational, gradual approach in which some services move to SaaS while others remain on-premise. This white paper provides a strategy to move part or all of your ITSM suite to the cloud as a stepping stone to ITaaS. Please enjoy a video preview of this white paper here: http://www.bmc.com/videos/solution-videos/hybrid-it-white-paper.html To learn more please download the white paper now!
Tags : 
itaas, saas, cloud, itsm, integrating itsm, itsm integration, itaas, saas integration, bmc, cloud computing
    
BMC Software
Start   Previous   1 2 3    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.