web app

Results 1 - 25 of 1004Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interaction—website visits, API calls to mobile apps, and others—is being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But that’s not all: they’re also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiences—perhaps a chatbot provides instant customer assistance on your site. What’s important is enabling the good bots and blocking the bad ones."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with next-gen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Impact: -Substantially reduced administrative time -Accelerated response and remediation process -Increased performance of cloud applications -Reduced time to investigate"
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
    
Cisco Umbrella EMEA
Published By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source
    
Black Duck Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Spe
Tags : 
    
TIBCO Software
Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
Big Data- und Analytik-Workloads bringen für Unternehmen neue Herausforderungen mit sich. Die erfassten Daten stammen aus Quellen, die vor zehn Jahren noch gar nicht existierten. Es werden Daten von Mobiltelefonen, maschinengenerierte Daten und Daten aus Webseiten-Interaktionen erfasst und analysiert. In Zeiten knapper IT-Budgets wird die Lage zusätzlich dadurch verschärft, dass die Big Data-Volumen immer größer werden und zu enormen Speicherproblemen führen. Das vorliegende White Paper informiert über die Probleme, die Big Data-Anwendungen für Storage-Systeme mit sich bringen, sowie darüber, wie die Auswahl der richtigen Storage-Infrastruktur Big Data- und Analytik-Anwendungen optimieren kann, ohne das Budget zu sprengen.
Tags : 
    
Infinidat EMEA
Published By: KPMG     Published Date: Oct 04, 2019
Around 70% of Agile projects are contracted using a Time & Materials approach (T&M). However, this leaves clients carrying all the risk rather than sharing it with their supplier. But there is a better way. Listen now to find out: • How alternative models for Agile contracting can improve risk-sharing and promote quality and collaboration • How Coca-Cola European Partners’ have optimised their approach to Agile sourcing (with Kai Uhlemann, Director, Collaborative Solutions, CCEP).
Tags : 
    
KPMG
Published By: ttec     Published Date: Sep 13, 2019
According to the annual report on fraud and internet crime published by the FBI’s Internet Crime Complaint Center (IC3), a staggering total of more than $2.7 billion was lost through online fraud and financial crime in 2018, the last full year available. And according to the Federal Trade Commission (FTC), there were more than 1.4 million fraud reports in that same time period. Many of these fraud events involved brand impersonation or illegal activities conducted via a brand’s website. In other words, the trust and faith the public has in your brand can be used as a cover for illegal activities, making fraudsters’ schemes appear authentic or trustworthy. To keep the trust within your brand, download the whitepaper to learn how and why identifying and stopping online fraud is essential.
Tags : 
    
ttec
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, data center design and management
    
Coyote Point Systems
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Amazon Web Services (AWS) offers scalable, cost-efficient cloud services that public sector customers can use to meet mandates, reduce costs, drive efficiencies, and accelerate innovation. The procurement of an infrastructure as a service (IaaS) cloud is unlike traditional technology purchasing. Traditional public sector procurement and contracting approaches that are designed to purchase products, such as hardware and related software, can be inconsistent with cloud services (like IaaS). A failure to modernize contracting and procurement approaches can reduce the pool of competitors and inhibit customer ability to adopt and leverage cloud technology.
Tags : 
    
Amazon Web Services APAC
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: AWS     Published Date: Oct 01, 2019
By 2020, Gartner predicts 100% of new entrants to IT – and 80% of historical vendors – will offer subscription-based business models to their customers. These organizations are prioritizing the cloud over on-premises data centers and legacy software, so they can more efficiently deliver highly available, scalable, and cost-effective service offerings. To remain competitive, you need to modernize your approach to .NET development – and Amazon Web Services (AWS) is the ideal place to start. This whitepaper will explore best practices for containerizing your Windows workloads on AWS, including how to design your containers, which AWS services to leverage, and how to modernize your existing .NET applications for the cloud.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 03, 2019
Christian Elsenhuber - AWS & Carsten Duch - SUSE Join our webinar and learn more about the SUSE Cloud Application Platform on Amazon Elastic Kubernetes Service (Amazon EKS). The webinar will show you how SUSE accelerates the use of applications in containers. With integrated automation and customization features, SUSE helps your DevOps teams deliver container applications, accelerate innovation, and improve the responsiveness of your IT.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
DigiCert implemented Imperva to protect their hybrid environment. They were already using Imperva’s WAF on-premises to defend against Layer 7 attacks, known threats, and zero-day attacks to rapidly identify the threats that required investigation. By expanding their usage of Imperva, DigiCert was able to extend protection to AWS and maintain their security posture both during and after migration. Imperva’s sophisticated threat detection technology draws upon vast experience in the WAF market. As traffic passes through their network, advanced client classification technology (together with crowdsourcing and IP reputation data) automatically analyzes it to identify and block web application attacks. These include SQL injection, cross-site scripting, illegal resource access, comment spam, site scraping, malicious bots, and other top threats. Granular filters and controls reduce false positives and prevent access from unwanted visitors, while IP address shielding hides the web server’s IP
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Armor provides a managed Security-as-a-Service (SECaaS) solution that helps strengthen and unify your AWS, on-premises, and hybrid security to enable rapid detection, prevention, and response to cyberthreats in real time—typically with a lower TCO. Armor’s protection can be deployed quickly to help boost application availability. This can also play a role in increasing the visibility and overall security awareness across all your apps, no matter where they reside, because they are always operational. This solution also puts the tools—like a Web Application Firewall—in place to provide appropriate protection while being managed from a single pane of glass. Your organization can also continue using your existing security resources because Armor provides the integration to unify their offerings with the tools you already have in place. In addition, Armor’s Security Operation Center (SOC) is incorporated to reduce high threat dwell times (the amount of time a threat has undetected access t
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
When determining the best way to protect their applications and data on Amazon Web Services (AWS), organizations are often challenged by the high total cost of ownership and threat dwell times found in other security solutions. Armor can help your organization overcome these barriers and increase awareness of what is being deployed, and where, so you can better control your security policies. Attend our upcoming webinar to see how Armor helps customers reduce their time to market, accelerate development timeline, and gain quick, secure application access.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production e
Tags : 
    
AWS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com