• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

cloud based applications

Results 101 - 124 of 124Sort Results By: Published Date | Title | Company Name
By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : 
security, cloud, application delivery, authentication, access control, application security, silos, password fatigue, iam, identity management, password management, security management
    
F5 Networks Inc
By: Qualys     Published Date: Nov 05, 2013
Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.
Tags : 
qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services, disaster recovery, data security, vulnerabilities management, security services, web applications, virtualisation, mobility, network security, application security, internet security, security management, wireless security
    
Qualys
By: CDW     Published Date: Oct 10, 2013
Pairing a BYOD program with MDM technology, a California law firm serves up a mobile strategy that lets its lawyers work where and when needed — securely.
Tags : 
consumerization, mdm, mobile device management, manage devices, attorneys work, airwatch, cloudbased, ios, android, access mobile applications, mobile device, mobile management, byod, wireless, network management, network performance management, productivity, mobileiron, cloud computing
    
CDW
By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : 
mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
    
Webroot
By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications
    
Webroot
By: Arkadin     Published Date: Sep 11, 2013
Cost effective, simple to deploy, next generation HD video conferencing solutions are no longer limited to C-level boardrooms, today enabling face-to-face meetings at the knowledge worker level delivering high levels of engagement and increased productivity.
Tags : 
: video conferencing, video collaboration, cloud-based video conferencing, hd-video conferencing, mobile video conferencing, mobile video communications, enterprise video conferencing, saas video conferencing, remote video conferencing, video conferencing software, boyd video conferencing, video conferencing applications, software development
    
Arkadin
By: Symantec Corporation     Published Date: Aug 28, 2013
SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. For example, they protect remote communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL certificates to protect confidential information. In addition, SSL certificates are used to secure server-to-server communications for applications and data exchange. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services.
Tags : 
ssl certificates, communication, webmail, technical support, technology, data, security, knowledge management, data management
    
Symantec Corporation
By: Oracle     Published Date: Aug 15, 2013
The beauty of the cloud is that you can get up and running fast. The following e-book will provide you a greater insight into Oracle HCM Cloud Services that are a new generation of cloud-based juman capital management applications from the global leader in HR management software. Oracle HCM Cloud Services offer many powerful features and capabilities to accelerate your time to value.
Tags : 
hcm, cloud, cloud services, enterprise applications, human resource technology
    
Oracle
By: F5 Networks Inc     Published Date: Aug 13, 2013
While the promises of reduced costs and greater flexibility are driving companies to the cloud, these benefits can be negated by new management and processes which are often manual and disconnected from existing systems. This white paper explores strategies that enables IT departments to embrace the shift to being a services-based organization without relinquishing the control necessary to ensure the security, performance, and reliable delivery of applications.
Tags : 
cloud, security, performance, reliable delivery, networking, data management, application performance management
    
F5 Networks Inc
By: Oracle     Published Date: Aug 09, 2013
The beauty of the cloud is that you can get up and running fast. The following e-book will provide you a greater insight into Oracle HCM Cloud Services that are a new generation of cloud-based human capital management applications from the global leader in HR management software. Oracle HCM Cloud Services offer many powerful features and capabilities to accelerate your time to value.
Tags : 
hcm, cloud, cloud services
    
Oracle
By: Blue Coat Systems     Published Date: Jul 18, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.     
Tags : 
cloud, applications, network, bandwith, saas, infrastructure, network performance management
    
Blue Coat Systems
By: Backupify     Published Date: Jul 15, 2013
Data that once lived in basements and backrooms is being moved to cloud-based servers and SaaS applications. Historically, data backup has always been a key component of any IT strategy – whether it was stored on floppy disks, duplicate servers, or in custom built applications. With this shift to the cloud, backup shouldn’t be taken out of the strategy; rather, it should be re-thought to be more adaptable and cost-effective –the same reason you moved to the cloud in the first place.
Tags : 
cloud, backup, saas, it strategy
    
Backupify
By: Blue Coat Systems     Published Date: Jun 26, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.
Tags : 
network, bandwidth, saas, application, optimize traffic, performance, technology, cloud, networking, security, enterprise applications, data management
    
Blue Coat Systems
By: IBM     Published Date: May 22, 2013
In today's business environment, organizations of all sizes are struggling to maintain the advanced IT capabilities they need to be competitive while reining in cost and complexity. Shifting to off-premise hosted models, such as software-as-a-service (SaaS) and business process outsourcing, is a common activity undertaken to manage costs. One of the main challenges businesses face in adopting cloud and SaaS delivery models is the task of synchronizing data and integrating the multitude of systems already in datacenters with new cloud-based applications, not to mention within the cloud itself. Traditionally, this required organizations to leverage existing tools as well as custom development. This white paper looks at how two enterprises encountered problems with cloud integration and adopted IBM WebSphere Cast Iron to solve their immediate problems and extend use more broadly across their organizations.
Tags : 
saas, ibm, ibm websphere, websphere, cloud computing, web sphere, service oriented architecture, software compliance
    
IBM
By: Five9     Published Date: Apr 29, 2013
Some argue that a single enterprise provisioning applications to their own operations from an owned and operated data center is cloud.
Tags : 
five9, cloud, cloud computing, on-premises deployments, cloud application, cloud-based applications, networking, knowledge management
    
Five9
By: SafeNet     Published Date: Mar 29, 2013
The move to the cloud and virtualized environments along with an increasingly mobile workforce, emerging employee BYOD trends and the adoption of cloud based applications is blurring the boundaries of the traditional network security perimeter.
Tags : 
authentication, byod, mobile workforce, it security, key management
    
SafeNet
By: Okta     Published Date: Jan 06, 2012
These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.
Tags : 
okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud, password, access control, application security, email security, encryption, firewalls, intrusion detection, intrusion prevention, password management, ssl, application integration, application performance management
    
Okta
By: Aerohive     Published Date: Oct 12, 2011
Once you've enabled your people to work wirelessly from anywhere, anytime, on any device, you need to maintain security and control under constant pressure to drive down cost, while increasing productivity and growth. Enter the Cloud.
Tags : 
aerohive, wireless network management, cloud-based networking, cloud-enabled applications, cloud services, wi-fi management, mobile computing, mobile data systems, mobile workers, pda, smart phones, wireless communications, wireless infrastructure, wireless phones, wireless security
    
Aerohive
By: Vertica     Published Date: Aug 16, 2010
The Vertica Analytic Database is the only database built from scratch to handle today's heavy business intelligence workloads. In customer benchmarks, Vertica has been shown to manage terabytes of data running on extraordinarily low-cost hardware and answers queries 50 to 200 times faster than competing row-oriented databases and specialized analytic hardware. This document summarizes the key aspects of Vertica's technology that enable such dramatic performance benefits, and compares the design of Vertica to other popular relational systems.
Tags : 
vertica, ec2, elastic, cloud computing, workflow, benchmark, projections, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms, mpp, business analytics, business metrics, marketing automation, linux, application integration
    
Vertica
By: Vertica     Published Date: Mar 15, 2010
Revenue assurance analysts at a top-tier US-based carrier studied this every day. Primarily focused on detecting fraud, revenue sharing contract violations and incomplete revenue collections, they had the need to query and analyze call detail record (CDR) databases that grow by millions of new CDRs every day.
Tags : 
vertica, ec2, cdr, elastic, saas, dbms, sql, acid transactions, jdbc, odbc, etl, cloud computing, data management, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms
    
Vertica
By: Vertica     Published Date: Mar 15, 2010
In a world of growing data volumes and shrinking IT budgets, it is critical to think differently about the efficiency of your database and storage infrastructure. The Vertica Analytic Database is a high-performance, scalable and cost-effective solution that can bring dramatic savings in hardware, storage and operational costs.
Tags : 
vertica, ec2, cdr, elastic, saas, cdr, cloud computing, data management, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms, mpp, storage management, business analytics, business metrics, marketing automation
    
Vertica
By: Vertica     Published Date: Feb 20, 2010
For over a decade, IT organizations have been plagued by high data warehousing costs, with millions of dollars spent annually on specialized, high-end hardware and DBA personnel overhead for performance tuning. The root cause: using data warehouse database management (DBMS) software, like Oracle and SQLServer that were designed 20-30 years ago to handle write-intensive OLTP workloads, not query-intensive analytic workloads.
Tags : 
vertica, ec2, cdr, elastic, saas, cloud computing, data management, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms, mpp, application integration, best practices, business activity monitoring, business analytics, business integration
    
Vertica
By: Vertica     Published Date: Feb 01, 2010
How the Vertica Analytic Database is powering the new wave of commercial software, SaaS and appliance-based applications and creating new value and competitive differentiation for solution developers and their customers.
Tags : 
vertica, ec2, cdr, elastic, saas, cloud computing, data management, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms, mpp, business analytics, business integration, business management, business metrics, marketing automation
    
Vertica
By: Vertica     Published Date: Dec 01, 2008
Cloud computing is ushering in a new era of analytic data management for business intelligence (BI) by enabling organizations to analyze terabytes of data faster and more economically than ever before. The key change: cloud database software is provisioned within minutes, without data center overhead, and it's licensed on an on-demand basis.
Tags : 
vertica, ec2, elastic, cloud computing, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms, mpp, business analytics, business integration, business metrics, marketing automation, linux, application integration, analytical applications, configuration management
    
Vertica
Start   Previous    1 2 3 4 5     Next   End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter