Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

cloud and mobile applications

Results 1 - 25 of 28Sort Results By: Published Date | Title | Company Name
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Organizations everywhere are turning to virtualization, cloud computing, and mobile technologies to support anytime, anywhere access to today’s work load intensive, data-heavy applications. Dell PowerEdge 12th generation servers—built for high performance, 24/7 availability, and uncompromised reliability—can help IT organizations deliver the benefits of these transformative technologies.With cost-saving power, cooling, space, and management efficiencies, Dell’s new servers offer data centers unparalleled performance, efficiency, and reliability for a diverse range of enterprise applications.
Tags : 
data center, dell poweredge 12th generation servers, virtualization, cloud computing, mobile technologies, data-heavy applications, cost-saving power, management efficiencies
    
Dell & Microsoft
Published By: JBoss Developer     Published Date: Feb 05, 2016
Perhaps the biggest transformation in enterprise IT since the public cloud emerged is the move toward “mobile-first” application development. As mobility continues to become the new enterprise standard, developers are looking for frameworks that provide the tools they need to create innovative mobile applications without sacrificing their existing investments. While there are proven, enterprise-ready frameworks and platforms for developing and deploying traditional desktop applications, the mobile application development landscape is still evolving. Mobile Backend as a Service (MBaaS) attempts to fill the gap between traditional application platforms and mobile applications. It is the new middleware, exposing APIs and functions that enable developers to rapidly build new mobile apps and mobile-enable legacy enterprise applications.
Tags : 
jboss, red hat, gigaom, enterprise, mbaas platforms, cloud, mobile applications, it management, enterprise applications, cloud computing
    
JBoss Developer
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology
    
Microsoft
Published By: Okta     Published Date: May 09, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs. Provisioning devices to users should be simply an extension of the foundational identity lifecycle management system. And, mobility management should enable IT teams to implement simple policies to enable and secure access from mobile. This eGuide provides an overview of how Okta can power BYOD programs with integrated identity and mobili
Tags : 
    
Okta
Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security, application security, enterprise applications
    
Veracode
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. The age of perimeter-only security is over. Find out more today about how Cisco can help.
Tags : 
    
Cisco Umbrella EMEA
Published By: Okta     Published Date: Jul 19, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Ping Identity     Published Date: Feb 12, 2016
In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity protocols has been developed. OpenID Connect 1.0 uses the same building blocks as the modern application architectures and APIs it secures—REST and JSON. This allows it to profile and extend OAuth 2.0 to add an identity layer—creating a singular, cohesive framework that promises to secure APIs, mobile native applications and browser applications. This paper introduces OpenID Connect (Connect), detailing its features and its application in enterprise use cases.
Tags : 
    
Ping Identity
Published By: IBM     Published Date: Aug 08, 2016
Hybrid cloud has emerged as the cornerstone for digital transformation, enabling developers to create unique and compelling mobile, IoT, and web applications while extending their IT investments and capabilities. Attend this webinar to learn how you can leverage your WebSphere Application Server infrastructure and investments to maximize performance, lower costs, and successfully move forward into a hybrid cloud world.
Tags : 
ibm, cloud, hybrid cloud, middleware, application infrastructure, websphere application server, cloud, enterprise applications, cloud computing
    
IBM
Published By: MuleSoft     Published Date: Jan 25, 2016
IT used to be so simple. Companies owned their own technology equipment and purchased enterprise licenses for many of the applications anybody in the organization might care to use. But then the cloud emerged, and mobile, and social media, and IoT; the world of IT has never been the same. Today's businesses are software-driven enterprises with technology capability distributed throughout the company, utilizing countless third-party cloud-based applications. This new organization requires an cultural shift in the IT organization. Read this whitepaper to learn: -How businesses can reorganize themselves into lightweight, agile, modular businesses able to respond to innovations in SaaS, mobile, and analytics -How to build a technological architecture that can accommodate new technology yet still extract value from on-premises systems -The advantages of an API-led connected architecture vs. old SOA approaches
Tags : 
technology, enterprise applications, best practices, business optimization, technology architecture
    
MuleSoft
Published By: OneLogin     Published Date: Oct 24, 2017
Enterprises of all sizes are challenged to effectively provide secure access to a rapidly growing mosaic of cloud, on-premise and mobile applications. Whether sanctioned by the enterprise IT group of purchased by departmental shadow IT organizations, individually provisioned applications present a great management burden with multiple negative operational effects: • Time and money wasted by manual on-and off-boarding, and lost passwords. • Security risk from weak, easy-to-remember passwords, as well as from system access by former employees whose credentials are not promptly revoked. • Lack of visibility into who accesses which application, and from where. As a result, enterprises and users encounter a range of obstacles that prevent them from securely operating at speed. At best, users who clamor for access to applications are inconvenienced when they don’t get access quickly enough, or not at all. Worst case, because today’s IT footprint is large and porous, companies face headline-m
Tags : 
    
OneLogin
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
    
Group M_IBM Q418
Published By: CDW     Published Date: Oct 10, 2013
Pairing a BYOD program with MDM technology, a California law firm serves up a mobile strategy that lets its lawyers work where and when needed — securely.
Tags : 
consumerization, mdm, mobile device management, manage devices, attorneys work, airwatch, cloudbased, ios, android, access mobile applications, mobile device, mobile management, byod, wireless, network management, network performance management, productivity, mobileiron, cloud computing
    
CDW
Published By: Dell     Published Date: Sep 12, 2013
Organizations everywhere are turning to virtualization, cloud computing, and mobile technologies to support anytime, anywhere access to today’s work load intensive, data-heavy applications. Dell PowerEdge 12th generation servers—built for high performance, 24/7 availability, and uncompromised reliability—can help IT organizations deliver the benefits of these transformative technologies.With cost-saving power, cooling, space, and management efficiencies, Dell’s new servers offer data centers unparalleled performance, efficiency, and reliability for a diverse range of enterprise applications.
Tags : 
data center, dell poweredge 12th generation servers, virtualization, cloud computing, mobile technologies, data-heavy applications, cost-saving power, management efficiencies
    
Dell
Published By: Apstra     Published Date: Feb 21, 2019
IT organizations are facing new challenges as a result of digital transformation, widespread cloud and SaaS adoption, mobile proliferation and pervasive IoT deployments. They must build and operate their internal data centers to deliver high availability for mission critical applications, rapidly onboard new applications and scale capacity on demand – all within the mandate to be cost competitive with infrastructure as a service providers (IaaS) like AWS and Azure. They are architecting and building new Intent-Based Data Centers to deliver private cloud services to their internal and external customers.
Tags : 
saas, data center automation
    
Apstra
Published By: Cisco Systems     Published Date: Dec 23, 2013
Faced with trends like cloud and the rapid rise of mobile devices, IT needs a new, simpler model of building networks to support and optimize applications. In this Lippis Report, learn how the Cisco ISR Application Experience Router helps you improve application speed, security, and control. Read Now
Tags : 
cisco, lippis, centric networking, cloud computing, network engineers, bandwidth, wan, wide area networks, mobile devices, network building, networking, wireless, enterprise applications
    
Cisco Systems
Published By: Microsoft Office 365     Published Date: Mar 11, 2016
The cloud gives businesses of all shapes and sizes an opportunity to be mobile. Employees get flexible, secured access to important data and applications from virtually anywhere. Documents are safely stored, synchronized, and shareable at a moment’s notice—collaboration on the go has never been easier.
Tags : 
    
Microsoft Office 365
Published By: IBM     Published Date: Apr 01, 2016
Keep your workforce and systems current for faster DevOps, deployment, and management of cloud, analytics and mobile applications. Learn about updated, intuitive mainframe tools that are easy-to-to use for both millennials and baby-boomers.
Tags : 
ibm, agile, agile development, cloud, mobile, z systems, cloud computing
    
IBM
Published By: IBM     Published Date: May 24, 2016
Join Forrester and IBM to learn how, clients are leveraging mobile and cloud to transform their businesses and bring new innovations to market. Understand how organizations can continuously deliver high quality mobile enterprise applications that leverage Cloud computing to securely integrate with their IT systems opening up new sources of revenue and innovation. Forrester Principal Analyst John M. Wargo will share insights Forrester has gleaned from conversations with clients deploying packaged solutions and building custom applications using cloud services. IBM's Botond Kiss will provide insight into how leading organizations are using cloud to accelerate their mobile transformation.
Tags : 
ibm, forrester, cloud, mobile, mobile applications
    
IBM
Published By: IBM     Published Date: Jul 31, 2018
Manage identity and access across the full range of on-premises, cloud and mobile applications with IBM Cloud Identity.
Tags : 
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Manage identity and access across the full range of on-premises, cloud and mobile applications with IBM Cloud Identity.
Tags : 
identiry and access, ibm cloud identity, cloud and mobile applications
    
Group M_IBM Q1'18
Published By: Cisco     Published Date: Nov 17, 2015
The pace of change facing Cisco's IT department is accelerating as new applications, particularly from cloud and mobile environments, become key business enablers. Cisco's IT department, which is responsible for 4,067 production applications and inspecting 27TB of data daily, must be able to deploy such applications quickly, securely, and cost-effectively — and then make changes to them or remove them just as quickly and efficiently.
Tags : 
applications, systems integration, cloud, development, cisco, networking, it management
    
Cisco
Published By: SafeNet     Published Date: Mar 29, 2013
The move to the cloud and virtualized environments along with an increasingly mobile workforce, emerging employee BYOD trends and the adoption of cloud based applications is blurring the boundaries of the traditional network security perimeter.
Tags : 
authentication, byod, mobile workforce, it security, key management
    
SafeNet
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Most companies would love to move enterprise applications to the public cloud and cut the costs, complexities, and limitations of current infrastructure. Major public cloud providers, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud have done well in enabling web, mobile, and content applications in the cloud. These are cloud-native applications designed to use cloud “object” storage, and object storage is very popular for use cases such as backup and disaster recovery. However, enterprise applications typically require “block” storage. Although native cloud block storage exists, it has several shortcomings, particularly around reliability, durability, and lack of data mobility. So, enterprise applications have largely stayed on-premises or in private clouds. Now there’s an innovative new way to move enterprise applications to the public cloud while actually reducing risks and tradeoffs. It’s called multicloud storage, and it’s an insanely simple, reliable, secure w
Tags : 
    
Hewlett Packard Enterprise
Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle, enterprise applications
    
Veracode
Previous   1 2    Next    
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.