apps

Results 251 - 275 of 1107Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Mar 05, 2018
Migrating to a flash storage solution does much more than simply save you money. Read this ebook and learn the top three things to know about modernizing your SAN. Find out how you can accelerate your most important apps by up to 20 times compared to traditional storage—while minimizing downtime.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: MobileIron     Published Date: Feb 08, 2017
Enterprise organizations around the world are rapidly shifting their corporate apps and data to the cloud to drive IT efficiency and expand employee access to business processes. This applies not only to productivity suites like Microsoft Office 365, but also to enterprise mobility management (EMM) solutions like MobileIron.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Feb 15, 2017
The third edition of the Mobile Security and Risk Review is a must read and provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. The report also includes a list of the most popular business apps, Apple VPP and DEP adoption metrics, top blacklisted mobile apps and information about healthcare and financial services industries.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Mar 21, 2017
Over the past few years, organizations have used a variety of tools and technologies to enable basic mobile device management (MDM) and essential apps like email and calendar. But those capabilities are inadequate for companies that want to move beyond the basics and transform their business processes by securely moving apps and data to the cloud. For AirWatch customers, this means they should start evaluating leading enterprise mobility management (EMM) platforms like MobileIron in order to achieve their mobile transformation goals. Our platform is 100% focused on building today’s modern enterprise architecture, which is quickly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 24, 2017
The modern, mobile enterprise is expanding faster than ever, across every part of the world and in every industry. Increasingly, organizations are looking for comprehensive security blueprints to help them secure their mobile devices, apps, and data without compromising productivity or the user experience. For that reason, iOS has become the mobile OS of choice in a majority of enterprises because of its highly intuitive, user-friendly, and easy to manage design. With MobileIron’s enterprise mobility management (EMM) platform, IT organizations gain a comprehensive mobile solution that complements and augments the security features inherent in iOS.
Tags : 
ios security, it security, device security, applications security, malware protection, mobile device protection, data encryption
    
MobileIron
Published By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
    
MobileIron
Published By: Aternity     Published Date: May 18, 2015
This whitepaper provides an overview of Aternity Virtual Desktop Monitoring and how it monitors end user experience in a VDI environment. Aternity goes well beyond traditional Virtual Desktop Infrastructure assessment tools that are primarily focused on planning and testing virtual deployments. Aternity provides in-depth monitoring of end user experience in a production environment spanning tens of thousands of business users.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring, end user experience management, infrastructure monitoring, it performance analytics, it service management, it service optimization, mobile application management, mobile end user experience, mobile user experience, sla management, mobile app monitoring, virtual desktop monitoring, vdi
    
Aternity
Published By: Aternity     Published Date: May 19, 2015
Read this whitepaper to navigate through the End User Experience Monitoring (EUEM) landscape. Learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their workforce users are actually experiencing.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring, end user experience management, infrastructure monitoring, it performance analytics, it service management, it service optimization, mobile application management, mobile end user experience, mobile user experience, sla management, mobile app monitoring, virtual desktop monitoring, vdi
    
Aternity
Published By: Dell EMC     Published Date: Aug 22, 2017
Data is the foundation of the digital economy, but managing data growth poses a big challenge as organizations ramp up cloud adoption. Whether your organization is adopting a hybrid cloud strategy or building modern apps in the cloud, there are many challenges that can limit your effectiveness. With Isilon CloudPools and ECS, you can take advantage of cloud capabilities without a disruptive time-consuming migration of your data. In this webinar, we’ll discuss how Dell EMC puts you in control with a flexible cloud design, allowing you to take an application-centric approach to your data platform.
Tags : 
    
Dell EMC
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch
Published By: Okta     Published Date: May 09, 2016
Have you ever wondered which enterprise cloud apps are most popular? Or which industries tend to use Office 365 versus Google Apps? Did you know that 43% of Okta customers have enabled deprovisioning? From where we sit, Okta has a unique view into the adoption and utilization of cloud apps in the enterprise. Our Businesses @ Work report takes an in-depth look into how organizations and people work today, and the apps and services they use to be productive.
Tags : 
    
Okta
Published By: Okta     Published Date: May 09, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
    
Okta
Published By: CA Technologies     Published Date: Jul 20, 2017
e-book which lays out the case for machine learning and artificial intelligence for mainframe operational analytics. The mainframe is now part of a highly complex connected ecosystem driving trillions of mobile and web transactions critical to the functioning of the application economy. The emergence of new workloads and apps on the mainframe means that the status quo isn’t enough when it comes to Mainframe management. IT professionals alone – whether mainframe skilled or not – simply can’t keep up with the onslaught of performance alerts, false alarms. Machine learning deliver mainframe intelligence a more proactive and automated approach to handle this challenge.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 26, 2017
To deliver on the potential for transformative innovation, businesses must maximize the latent value of legacy application code and data—and fast. Talking Points: • Go Agile with Agile processes and tools that speed innovation on legacy applications • Onboard your team quickly with modern toolsets and languages that seamlessly integrate legacy code • Integrate legacy code and simplify how you manage the software development lifecycle
Tags : 
    
CA Technologies
Published By: Lucidworks     Published Date: Aug 24, 2016
In reality, we developed search technologies, not primarily as a front-end service but to alleviate the challenges of the back end: our data. Search grew in direct response to data problems. The search story can’t be told without the data story, and high-volume data would be nearly useless without search technology. Download this eBook to learn more about search technologies.
Tags : 
search, search query, search technologies, search apps, data problems, ecommerce search
    
Lucidworks
Published By: Lucidworks     Published Date: Dec 14, 2016
You feel you’ve got a pretty good handle on the following challenges—exponentially increasing amounts of data, ever-increasing user expectations, and limited IT resources—along with your technical requirements. That’s why you chose to build your search app with Apache Solr. Download now to learn more about Apache SoIr and Lucidworks Fusion.
Tags : 
    
Lucidworks
Published By: Veracode     Published Date: Oct 28, 2016
The Ultimate Guide to Getting Started with Application Security Application-layer attacks are growing much more rapidly than infrastructure attacks. Yet many organizations remain hesitant to create an application security program, believing it will require excessive time and resources. The reality is that any organization, of any size, can and should develop an applications security program. Download the Ultimate Guide to Getting Started With Application Security now for details!
Tags : 
veracode, security, devops, appsec, application security, enterprise applications, business technology
    
Veracode
Published By: Veracode     Published Date: Oct 28, 2016
Trends and Tactics: How IT Professionals are Approaching AppSec Today
Tags : 
veracode, security, devops, appsec, enterprise applications, business technology
    
Veracode
Published By: Veracode     Published Date: Oct 28, 2016
Web application attacks are the most frequent pattern in confirmed breaches. But many security budgets don’t line up with this risk. Getting the budget for AppSec won’t be easy, but now is the time to make the case. Download this e-book to find out the reasons why AppSec is the most productive security spend.
Tags : 
veracode, security, devops, appsec, enterprise applications, business technology
    
Veracode
Published By: Veracode     Published Date: Oct 28, 2016
DevOps practices, while relatively new, are spreading rapidly. And there are sound business reasons for executives to embrace these changes. This e-book from Veracode provides background into the evolution of DevOps and proposes five principles that must be addressed for those seeking to integrate AppSec into DevOps.
Tags : 
veracode, security, devops, appsec, enterprise applications
    
Veracode
Published By: Sprinklr     Published Date: Nov 22, 2016
A quick fact sheet that details the reach and audience of major messaging apps to help companies know which platform would be best suited to their audience.
Tags : 
messaging app research, messaging app data, social media data, social media intelligence, snapchat data, snapchat statistics, wechat data, wechat statistics, whatsapp statistics, whatsapp data, line statistics, line data
    
Sprinklr
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com