• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

enterprises

Results 1451 - 1475 of 1504Sort Results By: Published Date | Title | Company Name
By: Jamf     Published Date: Jun 07, 2018
A decade ago, Mac was an uncommon sight in many businesses and routinely ignored by corporate IT — but times have changed. Today, employee-choice programs are driving Mac growth in enterprises with 72 percent of employees choosing Mac over PC when given the chance. Now, the need to properly deploy, manage and secure Apple is at an all-time high. This white paper examines how purpose-built management solutions are essential to a successful Apple strategy, and walks you through: • The current state of enterprise management solutions • Features required for best-of-breed Apple management • How Jamf and Microsoft are delivering co-management to the enterprise
Tags : 
    
Jamf
By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle, enterprise applications
    
Veracode
By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : 
veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure, enterprise applications
    
Veracode
By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : 
veracode, security, supply chain security, web applications, application security, enterprise applications
    
Veracode
By: Juniper Networks     Published Date: Feb 05, 2018
At Juniper, we believe in building coherent networks to help simplify both the physical topology as well as the operations of the network itself. Once having done that, we can then secure it. And, by moving to micro parameters, we can do a much better job of protecting the applications. Then finally, automation, particularly as we get into micro parameters, micro segments and the need for agility, is where SDN really pays off.
Tags : 
network, applications, cloud, enterprises, foundation, principles
    
Juniper Networks
By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM
By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
By: IBM     Published Date: Apr 20, 2017
Ninety-nine percent of the enterprise workforce currently uses mobile devices – smart phones and tablets – to perform their jobs today. Nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. Reflecting on the survey results provides the opportunity to take a broad view of enterprise mobility and realize how business transformation has begun. Nearly all enterprises now incorporate mobility in their work, and a majority now sees tangible business results from mobility. Organizations are seeing greater efficiencies and productivity from mobile workers.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
By: IBM     Published Date: Jun 07, 2017
One of the biggest challenges for IT today, is that it is being asked to enable digital transformation and innovation within enterprises but is held back with aging, legacy infrastructure that does not scale and lacks the capabilities the business requires. Watch this video to hear IDC analyst Chandana Gopal’s viewpoint on why organizations need to create a modern B2B integration technology environment.
Tags : 
b2b, idc, b2b integration, digital transformation
    
IBM
By: IBM     Published Date: Jun 08, 2017
Digital transformation initiatives and the need for innovation are causing enterprises to rethink their IT landscapes including business-to-business (B2B) integration. Modern B2B integration is critical for enabling enterprises to achieve goals like increasing revenue, speeding up time to market, and improving efficiencies because these outcomes are dependent on having a successful business network. B2B practitioners have two goals — enable critical business initiatives and control costs — and cloud-based B2B services have been successful in helping enterprises achieve both goals. IDC interviewed eight IBM clients to understand how their use of IBM Sterling B2B Integration Services, part of the IBM B2B Cloud Services portfolio, has impacted their operations and businesses. These organizations reported achieving strong value with IBM Sterling B2B Integration Services, and IDC projects that their investment will yield an average three-year return on investment (ROI) of 308%, or more th
Tags : 
digital transformation, b2b integration, idc, ibm
    
IBM
By: Lookout     Published Date: Dec 09, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
    
Lookout
By: Lookout     Published Date: Dec 13, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
mobile security, device encryption, enterprise mobility management, integration, mobile indetity, security management
    
Lookout
By: Progress     Published Date: Jan 22, 2019
A great digital experience is no longer a competitive differentiator—it’s a must for doing business. Poor experiences quickly result in dissatisfied customers and lost prospects. For many enterprises, delivering a multichannel digital experience can be a daunting task—but it doesn’t have to be with the right technology. Learn how to conquer the five challenges for digital experience delivery in this whitepaper.
Tags : 
    
Progress
By: Dun & Bradstreet     Published Date: Feb 21, 2017
As the volume of data coming into organizations – from both internal and external sources – continues to grow and makes its way across departmental systems in many different formats, there is a critical need to create a single, holistic view of the key data entities in common use across the enterprise. Master Data Management (MDM) aims to accomplish this goal. Not surprisingly, MDM has become a significant priority for global enterprises, with the market expected to triple from $9.4B to $26.8B by 2020 according to analysts. The reality, though, is that while seemingly everyone is investing heavily in the tools to manage data, few are putting a great enough emphasis on the data itself. And that’s a problem. Poor data quality is said to be costing businesses $3.1 trillion annually – and that’s just in the US alone. The information being put into MDM tools must be mastered first and foremost.
Tags : 
managing data, data management insight, mdm, master data management
    
Dun & Bradstreet
By: Dun & Bradstreet     Published Date: Feb 21, 2017
It is becoming increasingly more obvious that for data to have any real value, it must be in motion. It must flow. “All entities move” Heraclitus added, “and nothing remains still.” These ancient musings have startling relevance to the modern challenges and benefits of Master Data Management (MDM) programs across global enterprises. The entities he referred to were more philosophical in nature, yet it is no coincidence that the entities of our commercial world – customers, vendors, prospects and the relationship between them – are in a constant state of movement and change.
Tags : 
mdm, data management, data fluidity, movement of information
    
Dun & Bradstreet
By: Oracle     Published Date: Feb 22, 2019
Market Perspectives: Making Blockchain a Reality in Retail Enterprises
Tags : 
    
Oracle
By: Datastax     Published Date: Aug 15, 2018
Built on a production-certified version of Apache Spark™ and with integrated search and graph capabilities, DSE Analytics provides highly available, production-ready analytics that enables enterprises to securely build instantly responsive, contextual, always-on applications and generate ad-hoc reports. Read this white paper to learn about the specific features and capabilities of DSE Analytics, and why DSE Analytics is designed for the Right-Now Enterprise.
Tags : 
    
Datastax
By: Datastax     Published Date: Aug 15, 2018
Today’s enterprises continue to differentiate themselves via their cloud applications. But differentiation is getting harder and harder to accomplish. To stand out, you need a flexible, nimble, scalable, always-on data platform that can deliver powerful, game-changing, customer-facing applications. Read this white paper to learn how DataStax Enterprise delivers comprehensive data management through a secure, operationally simple platform built on the best distribution of Apache Cassandra™.
Tags : 
    
Datastax
By: Datastax     Published Date: Aug 15, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
By: Datastax     Published Date: Apr 08, 2019
It is all about clouds: private, public, or a combination. 85% of enterprises have a multi-cloud strategy, as per the RightScale 2017 State of the Cloud Report. Most enterprises today have one or more application projects utilizing public cloud infrastructure providers. Having a data management strategy for hybrid cloud is a critical business need today.
Tags : 
    
Datastax
By: Datastax     Published Date: May 20, 2019
Hybrid cloud has arrived. Whether companies have intended to move to hybrid cloud or not, the hybrid cloud reality is here, and while the advantages are numerous, so are the challenges. From data governance to scaling real-time applications, this white paper explains the main issues enterprises typically face with hybrid cloud.
Tags : 
    
Datastax
By: Juniper Networks     Published Date: Aug 10, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : 
security, switching, routing, operating system, secure network, sdsn, solutions
    
Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
The impact of cloud computing and software-defined networking (SDN), including network virtualization, has convinced large enterprises and customers building private, public, and hybrid cloud networks to consider new approaches to help them meet their current and future data center switching needs. Data center switching platforms are constantly evolving, delivering increasingly better performance while simplifying network operations.
Tags : 
scaling, memory, asic platforms, broadcom, tomahawk platforms, juniper networks, multivector scaling, memory architecture
    
Juniper Networks
By: Pure Storage     Published Date: Apr 18, 2018
Everybody’s talking about big data. Huge promises have been made about its role in driving enterprises forward. But few organizations are realizing its true benefits. For those able to put data to good use, there’s much to be excited about. Data is transforming not only businesses, but entire industries, and the world as we know it. Today organizations are harnessing big data to do things like transform healthcare, provide eyesight for the visually impaired, and bringing us closer to autonomous cars
Tags : 
    
Pure Storage
By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Start   Previous    47 48 49 50 51 52 53 54 55 56 57 58 59 60 61    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter