Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

web application

Results 1 - 25 of 640Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro     Published Date: May 11, 2015
Reports of server-side data breaches and zero-days found for widely used web applications continue have become quite common in recent years.
Tags : 
data center, security, networking
    
Trend Micro
Published By: Trend Micro     Published Date: May 15, 2015
Reports of server-side data breaches and zero-days found for widely used web applications continue have become quite common in recent years.
Tags : 
    
Trend Micro
Published By: Juniper supplement     Published Date: Sep 22, 2015
Web services An examination of those organizations using web services successfully and find that they have chosen their networking infrastructure carefully and taken advice about future upgrade strategies. SDN and NFV We look at whether software defined networking (SDN) or network functions virtualization (NFV) will solve the problem of the sheer volume of new applications, and when they are likely to fulfil their promise. 9 Infographic Inside information from Juniper Networks on how to avoid that cyberattack and if you can’t – how to neutralize it. 10 Internet of Things How will you deal with the 1.6 zettabytes of data the Internet of Things is preparing to throw your way? Get your smart spectacles out and read how! 14 Colocation We take a look at why the rapid growth in cloud Services could very well be a big help for co-location – a sector which is still growing very nicely thank you.
Tags : 
data center design and management
    
Juniper supplement
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Arup Headquarters: London, England Users: 13,500 Objective: Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with nextgen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Solution: Cisco Umbrella, Cisco Umbrella Investigate & Cisco AMP for Endpoints Impact: • Substantially reduced administrative time • Accelerated response and remediation process • Increased performance of cloud applications • Reduced time to investigate
Tags : 
    
Cisco Umbrella EMEA
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, load balancing, network architecture, network management, servers, small business networks
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, infrastructure, load balancing, servers, green computing
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network management, servers
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network architecture, servers, traffic management, cloud computing, data center design and management
    
Coyote Point Systems
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: Pitney Bowes     Published Date: Apr 20, 2009
This Executive White Paper, sponsored by Pitney Bowes Marketing Solutions, a provider of web-based marketing automation solutions, examines the competitive advantages offered by marketing automation portals and the potential impact of these types of portals on marketing campaigns deployed in complex, rapidly evolving markets.
Tags : 
pitney bowes, automated portals, marketing solutions, web-based marketing, competitive advantage, portal, channel marketing, sustainable, enterprise marketing, crm systems, crm, roi, partner, secure online marketing, marketing funds management, dashboard, list management applications, urls, seo, turnkey
    
Pitney Bowes
Published By: Akamai Technologies     Published Date: May 24, 2017
Webanwendungen sind wertvolle Tools für Unternehmen aller Größen. Sie ermöglichen Kunden die Kommunikation mit Kunden, Interessenten, Mitarbeitern, Partnern und anderen IT-Systemen. Webanwendungen sind naturgemäß offen, interaktiv und stets zugänglich. In ihrem Bericht beleuchten die Analysten von Frost & Sullivan, welche Anbieter von Web Application Firewalls (WAF) es gibt, wie die aktuelle Bedrohungslage für Webanwendungen aussieht und wie die Anbieter diesen Bedrohungen durch Skalierung entgegentreten.
Tags : 
    
Akamai Technologies
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: • Operational disruption • Loss of confidential data • Lost user productivity • Reputational harm • Damage to partner and customer relations • Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage – and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months – 98% said they had.
Tags : 
ddos, technical support, data security, application security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
Web applications are valuable tools for businesses of all sizes. These applications enable businesses to communicate with customers, prospects, employees, partners, and other information technology (IT) systems. By definition, web applications must be open, interactive, and accessible at all times.. This report, authored by Frost & Sullivan analysts, takes a comprehensive look at the current Web Application Firewall (WAF) vendor landscape and analyzes the current web application threat landscape and how vendors will scale to face it.
Tags : 
web applications, waf, ips
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 12, 2017
Online images used to be simple. In the past, they weren’t the focal point of a page — there were only a handful of images on a given page and all users were viewing online images on a desktop with dial-up. That has all changed. Today’s web pages are dynamic, filled with images and viewed by end users on different devices with varying connectivity. As audience expectations for rich web experiences have grown, so has the requirement to deliver increasingly image-heavy web applications. The problem? The cost and complexity of creating, storing, and delivering web images tailored for every device poses a significant challenge for businesses, but failing to address the increasing diversity across devices and networks will lead to a poor and inconsistent user experience. Current solutions don’t solve this problem completely.
Tags : 
cloud image management, online images, web applications, devices, web experience
    
Akamai Technologies
Published By: HP Enterprise Business     Published Date: Jan 20, 2017
A fresh approach to cloud-based website load testing is proving more effective in identifying and isolating application performance anomalies.
Tags : 
    
HP Enterprise Business
Published By: HP Enterprise Business     Published Date: Mar 02, 2017
Powered by data from 451 Research, the Right Mix web application benchmarks your current private vs public cloud mix, business drivers, and workload deployment venues against industry peers to create a comparative analysis. See how your mix stacks up, then download the 451 Research report for robust insights into the state of the hybrid IT market.
Tags : 
    
HP Enterprise Business
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
There’s a reason why web application firewalls have been getting so much attention lately. It’s the same reason we keep hearing about major security and data breaches left, right, and center. Web application security is difficult—very difficult.
Tags : 
owasp, web application safety, data breaches, firewalls
    
F5 Networks Inc
Published By: Oracle     Published Date: Oct 20, 2017
With cloud, mobile and all the new tools & frameworks that come with them, application development has never been so easy – or so hard. Join leading application development expert Mark Driver of Gartner as he answers your most pressing questions, including: What is the impact of lightweight and scripting applications traditional IT process? How has app development changed with the rise of cloud computing? How has mobile development changed expectations of developers and the apps they build?
Tags : 
    
Oracle
Published By: DataStax     Published Date: Mar 10, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
    
DataStax
Published By: Adobe     Published Date: Aug 30, 2017
Web content management now constitutes mission-critical software to help drive successful communications with customers. Application leaders focused on enabling effective digital experiences should use this document to help them in selecting the most appropriate vendor and solution.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 27, 2018
Web content management now constitutes mission-critical software to help drive successful communications with customers. Application leaders focused on enabling effective digital experiences should use this document to help them in selecting the most appropriate vendor and solution.
Tags : 
    
Adobe
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.