• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

business cloud apps

Results 1 - 25 of 32Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jul 20, 2016
New research from IBM found that one-third of employees surveyed at Fortune 1000 companies are sharing and uploading corporate data on third-party cloud apps. Why? They’re tired of workplace apps that don’t perform like their personal apps: intuitively, on the go, and with some intelligence. Saying “yes” might feel good to your teams, but it can also turn your infrastructure into a Beast. You don’t know all the different apps being used, like file sharing or online meetings. Or how much they cost. Or if your content is safe and manageable. Can you give your teams what they want without getting trampled by the Beast? Yes you can. You can transform the Beast into a Beauty. But you need to consider three critical ways to make that happen.
Tags : 
ibm, enterprise social solutions, enterprise solutions, business operations, business technology, third-party cloud apps, workplace apps, enterprise applications
    
IBM
By: BMC ASEAN     Published Date: Dec 18, 2018
Big data projects often entail moving data between multiple cloud and legacy on-premise environments. A typical scenario involves moving data from a cloud-based source to a cloud-based normalization application, to an on-premise system for consolidation with other data, and then through various cloud and on-premise applications that analyze the data. Processing and analysis turn the disparate data into business insights delivered though dashboards, reports, and data warehouses - often using cloud-based apps. The workflows that take data from ingestion to delivery are highly complex and have numerous dependencies along the way. Speed, reliability, and scalability are crucial. So, although data scientists and engineers may do things manually during proof of concept, manual processes don't scale.
Tags : 
    
BMC ASEAN
By: K2     Published Date: Apr 27, 2015
This paper describes how a business-app platform from K2® can help you provide simpler, more cost-effective ways to empower people by connecting them with data that is dispersed across different systems.
Tags : 
erp and legacy systems, data volume, business processes, cloud crm system, system complexity, business apps, enterprise applications
    
K2
By: Cisco and NVIDIA Corporation     Published Date: Feb 26, 2018
These are interesting and challenging times to be in business. Digital forces, such as the cloud, big data, mobility, and mobile apps are disrupting tried-and-true business models, as well as entire industries. These transformational advances are producing complexity, while workers are demanding simplicity. They require centralized infrastructures to keep information safe, even as agility and flexibility rule the day. Read this eBook to learn more about powerful forces of digital business transformation!
Tags : 
    
Cisco and NVIDIA Corporation
By: Cisco and NVIDIA Corporation     Published Date: Apr 02, 2018
These are interesting and challenging times to be in business. Digital forces, such as the cloud, big data, mobility, and mobile apps, are disrupting tried-and-true business models, as well as entire industries. These transformational advances are producing complexity, while workers are demanding simplicity. They require centralized infrastructures to keep information safe, even as agility and flexibility rule the day.
Tags : 
    
Cisco and NVIDIA Corporation
By: Cisco and NVIDIA Corporation     Published Date: Apr 03, 2018
These are interesting and challenging times to be in business. Digital forces, such as the cloud, big data, mobility, and mobile apps, are disrupting tried-and-true business models, as well as entire industries. These transformational advances are producing complexity, while workers are demanding simplicity. They require centralized infrastructures to keep information safe, even as agility and flexibility rule the day.
Tags : 
    
Cisco and NVIDIA Corporation
By: Cisco EMEA     Published Date: Nov 13, 2017
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate owned laptops accessing the internet from other networks. More cloud apps, mean that users don’t need to be on the corporate network to get work done. And more branch offices connecting directly to the internet.
Tags : 
visibility, protection, deployment, management, platform, integration, cloud, infrastructure
    
Cisco EMEA
By: Cisco     Published Date: May 24, 2019
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate-owned laptops accessing the internet from other networks. More cloud apps, letting users get work done off the corporate network. And more branch offices connecting directly to the internet.
Tags : 
    
Cisco
By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron
By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
By: Citrix ShareFile     Published Date: Jul 02, 2019
Today's businesses need to drive innovation to seize new opportunity, but cloud complexities can slow the agility needed for that innovation. That doesn't have to be the case. In fact, over fifty percent of organizations now use a multi-cloud strategy to help determine their cloud needs, and if you don't have one, we can help. Citrix Workspaces helps reduce cloud complexity, minimize security risks, and deliver a better user experience. Download our e-book and find out how a secure digital workspace: • Centralizes workspace management • Secures your SaaS and web apps, data, and clouds • Makes it a lot easier to scale your cloud infrastructure as needed
Tags : 
    
Citrix ShareFile
By: Cloud Sherpas     Published Date: Aug 13, 2015
In the Top 5 Reasons Why Enterprises Are Going Google, Cloud Sherpas explores why leading organizations like these have prepared for the digital workplace of tomorrow by moving their email and collaboration platforms to Google Apps for Work, such as: Eliminating the need to manage hardware or software Embracing a mobile, BYOD culture Reducing IT costs and infrastructure
Tags : 
google enterprise solutions, google cloud applications, business cloud apps, google apps for business training, google app migration, migrating to google apps, cloud apps for business, google app development, google apps resellers, google cloud solutions, cloud enterprise solutions, google apps setup, google apps partners, google reseller, google apps authorized reseller, google apps for work, google drive for work, google chrome for work, google apps reseller, it management
    
Cloud Sherpas
By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron
By: MobileIron     Published Date: Mar 21, 2017
Modern enterprises are rapidly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services. As a result, these organizations are quickly outgrowing basic mobile device management (MDM) capabilities and apps like email and calendar. Building a secure mobile and cloud architecture now requires a comprehensive approach to enterprise mobility management (EMM). It requires a unified platform with defense-grade security, massive scalability, a broad ecosystem of technology partners, enhanced Office 365 security, and integrated desktop and mobile management. And it has to provide all of this without locking customers into a proprietary technology stack.
Tags : 
    
MobileIron
By: IBM     Published Date: Apr 15, 2015
What if your organization could take advantage of emerging business opportunities by deploying new applications dramatically faster than you ever could before? What if you could increase the value of your existing application investments by leveraging them in the cloud—and easily move your apps across off-premises and on-premises cloud options? These capabilities are available today. With IBM® PureApplication® solutions, companies can build and use a cloud environment faster, easier and with less risk than traditional methods to better engage with their customers and partners in new ways. The result: increased competitiveness and improved profitability in a changing business landscape. This paper describes a simpler way forward to gain these advantages.
Tags : 
ibm, business intelligence, applications, cloud computing, migration, application integration, application performance management
    
IBM
By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : 
byod, strategy, endpoint, management, uem, business, applications, data, mobile, device
    
MobileIron
By: Symantec     Published Date: Jul 11, 2017
CloudSOC can help you more easily determine which apps should be blocked and which should be allowed within your organization by assisting in identifying unsanctioned Shadow IT, providing customized Business Readiness Ratings™ for each cloud app tailored to your organization’s risk profile, and applying User Behavior Analytics (UBA) to identify hackers and malicious usage. Here you’ll learn how to guide your organization through the process of safely adopting cloud apps and services using Symantec CloudSOC.
Tags : 
cloud application, cloud app adoption, cloud security, cloud protection, shadow it
    
Symantec
By: Cloud Sherpas     Published Date: Aug 10, 2015
This white paper outlines exactly what the Google solution delivers and the top five reasons why more enterprises are choosing to move to the cloud with Google every day.
Tags : 
google enterprise solutions, google cloud applications, business cloud apps, google apps for business training, google app migration, migrating to google apps, cloud apps for business, google app development, google apps resellers, google cloud solutions, cloud enterprise solutions, google apps setup, google apps partners, google reseller, google apps authorized reseller, google apps for work, google drive for work, google chrome for work, google apps reseller, infrastructure
    
Cloud Sherpas
By: K2     Published Date: Apr 27, 2015
Download this free report to ensure you have the knowledge you need to retain your customers as you head into 2015.
Tags : 
business process management, cloud-based work orchestration, smart process apps, bpm market, "low-code" platforms, dynamic case management
    
K2
By: Box     Published Date: Jun 22, 2018
• Content is among an organization's most critical assets. It flows through every aspect of a company, from people to systems to processes. But as teams grow and the breadth of their content expands, these valuable assets get fragmented across the different tools they use. • What if you had a secure, open platform that connects all your tools in the cloud, allowing you to pull together best-of-breed technologies that fit your unique business needs? These native integrations keep teams happy and give IT full visibility and control, while boosting productivity and collaboration across the entire organization. • Download our ebook to see how Cloud Content Management from Box provides you with a central and secure content layer that unites all of your apps with seamless, native integrations. In it, you'll learn about our most popular integrations — like Microsoft Office 365, Okta, Slack and Salesforce — and how Box helps you future-proof your tech stack while also providing a unified exp
Tags : 
    
Box
By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
    
MobileIron
By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
    
MobileIron
By: MobileIron     Published Date: Nov 07, 2018
In recent years, the market for mobile and cloud technologies has completely shifted the behavior of enterprise users. People can now work anywhere, on any device, to access business apps and data from mobile apps and cloud services. Static, perimeter-based security can no longer keep up with all of the endpoints, users, apps, and data that travel far beyond the corporate firewall. Relying on old security approaches like password-only access control is no longer enough to secure this vast mobile-cloud infrastructure — especially since stolen user credentials were the top cause of data breaches in 2017.
Tags : 
    
MobileIron
By: OneLogin     Published Date: Oct 24, 2017
We’re living through a time where people, organizations and societies not only rely but thrive upon secure, simple and fast access to information. From small businesses, startups, enterprises and global conglomerates across all verticals; to local, state and federal governments; to educational institutions and nonprofits, we are continuously investing in our employees, devices, applications, networks and infrastructure that enable us to drive our collective missions forward. Ten years ago, business and technology leaders catalyzed a cloud app revolution that has changed the way organizations manage IT. However, through this transformative shift, the core requirements of IT remain the same. Technology leaders are responsible for ensuring that 1) information assets remain confidential and protected, 2) information systems are available and operational, and 3) people are empowered and productive with the apps and information they need. IAM is a technology and security discipline that has
Tags : 
    
OneLogin
By: Hewlett Packard Enterprise     Published Date: Jul 20, 2016
With many enterprises implementing a hybrid cloud environment to move applications to cloud, IT organizations must establish a decision-making framework for evaluating, deploying, and operating applications in the cloud. Businesses need to be able to deliver applications in the right way and on the right cloud, so IT organizations seek insight into setting policies for the best placement of applications across different cloud options. In this report, Gartner offers analysis and recommendations for moving traditional apps to private cloud and for brokering and managing apps across different private and public cloud options.
Tags : 
technology, best practices, cloud computing, infrastructure, best practices, business intelligence, business management
    
Hewlett Packard Enterprise
Previous   1 2    Next    
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter