RecruitingBlogscom

Follow Us:

 

web apps

Results 76 - 100 of 128Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: Nov 02, 2016
In its quest to increase agility and reliability, IT is adopting cloud services and related technologies like PaaS, micro-services, and containers to rapidly deliver applications that scale to real-world conditions. Application topology is often transient and unpredictably interrelated with countless other applications and services. This poses a serious challenge for performance monitoring since most techniques are still rooted to tiers or servers. During this webinar, discover: • The benefits and challenges of deploying apps across hybrid environments • Techniques that expose major, but often undiagnosed problems • Real-world examples where major performance issues were resolved"
Tags : 
    
Riverbed
Published By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : 
webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses, networking, security, enterprise applications
    
Webroot UK
Published By: Webroot UK     Published Date: Dec 20, 2013
The workplace technology landscape has changed dramatically over the past five years, and the security threats have changed along with it. This whitepaper will show you the growing factors that IT professionals can't afford to ignore.
Tags : 
webroot, mobile apps, mobile workers, mobile devices, accessing networks, workplace technology, security threats, infographic, mmas, mobile malware, webroot security, wireless
    
Webroot UK
Published By: Comcast Business     Published Date: Mar 24, 2015
It’s a transformative time in government information technology. Public sector organizations are moving to the cloud. At the same time, seemingly everything that can be virtualized is quickly heading in that direction. Immersive Web applications are enabling next-generation services, including innovative mobile apps that give agency staff members and constituents anytime access to valuable resources. Video seems to be everywhere, with one research firm estimating that video streaming accounts for more than 53 percent of all downstream traffic in North America. In this white paper from the Center for Digital Government (CDG), we break down what every IT leader needs to know about today’s networking to ensure project success.
Tags : 
high-performance networks, modern government, cloud, immersive web, mobile technology, networking, it management, data management, business technology
    
Comcast Business
Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: IBM     Published Date: Jul 10, 2009
Online social networking is expanding exponentially and making a huge impact on the enterprise. IBM offers cutting-edge technologies and tools to help you develop and deliver Web 2.0 applications that are simple to build, quick to remix and easy to extend.
Tags : 
ibm, web 2.0, ibm jazz, web application, mashup, rational appscan, security application, collaboration, knowledge management
    
IBM
Published By: SAP     Published Date: Jul 18, 2012
Mobile is not simply another device for IT to support with a shrunken Website or a screen-scraped SAP application. Rather, mobile manifests a broader shift to new engagement systems. CIOs must plan now for them and empower customers, partners, and employees with context-aware apps and smart products.
Tags : 
technology, mobile, apps, applications, cio, social, cloud, business technology
    
SAP
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: Qualys     Published Date: Nov 05, 2013
Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business. This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security
    
Qualys
Published By: Webtrends     Published Date: Jun 02, 2010
To succeed in mobile marketing, analytics must play a crucial role in the development of strategy and prioritizations of marketing spend. But this rigor isn't being consistently applied to this rapidly growing, emerging channel.
Tags : 
webtrends, mobile strategy, digital marketing, process, customer experience, multi-channel marketing, business intelligence, customer intelligence, mobile analytics, mobile apps, sms
    
Webtrends
Published By: Webtrends     Published Date: May 12, 2010
Whether you're new to email retargeting or a certified segmentation genius, Webtrends Email Exchange makes it easy to send timely, relevant and targeted emails based on your customers' web activity.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators
    
Webtrends
Published By: Webtrends     Published Date: May 03, 2010
Join Webtrends' Rachel Charlton and Peter Thelen from the Ad Director team for this information-packed webinar as they explain the benefits of bid optimization and demonstrate the results using real life examples from actual clients. This is a can't miss webinar for any marketer who uses paid search.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators
    
Webtrends
Published By: Webtrends     Published Date: May 05, 2010
You don't have to look far to find research that shows targeted marketing is most effective. Spray-and-pray tactics barely produce much more than annoyed customers.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators, targeted marketing, web analytics
    
Webtrends
Published By: Webtrends     Published Date: Dec 19, 2009
According to Forrester, 48% of marketers need help demonstrating ROI on testing. Join Casey Carey, VP of Product and Bob Garcia, Director, Product Marketing and discover how to get ahead of the curve with the business-case answers they provide in this webinar.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators, optimization, testing, site, pages
    
Webtrends
Published By: Webtrends     Published Date: Jan 21, 2010
This is a must-see webinar if you want to understand the fundamentals of multivariate testing (MVT), segmentation, and content targeting. Join Bob Garcia, Director of Product Marketing Optimize and Frans Keylard, Director of Optimization as they use real-life examples to explain multivariate testing and teach you where and how to start optimizing.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators, mvt, segmentation, optimization
    
Webtrends
Published By: Webtrends     Published Date: May 18, 2010
Mobile marketing investments will likely triple over the next five years. In the haste to stake a claim in the mobile gold rush, many businesses skip the lessons learned from the last big push: to be successful, you'll need to measure and quantify your results with mobile analytics.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators, targeted marketing, web analytics
    
Webtrends
Published By: Webtrends     Published Date: Jun 20, 2011
Marketers, managers and technologists all need real-time performance insights at their fingertips. Webtrends invites you to experience the award-winning Analytics 10, unified analytics uniquely made for digital marketing professionals in this webinar featuring Logitech and 3M.
Tags : 
webtrends, cmo, digital marketing, process, partnerships, go-to-market, customer experience, multi-channel marketing, optimization, data-driven marketing, web analytics, business intelligence, customer intelligence, crm, facebook, social media, mobile apps, lead generation, advertising, peer advice
    
Webtrends
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : 
security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection, business technology
    
Webroot
Published By: ClearSlide, Inc     Published Date: Nov 06, 2013
This Clearslide-commissioned profile of US enterprise sales leaders evaluates the current adoption trends surrounding sales engagement platforms as well as the challenges that sales leaders and sellers face, based on Forrester's own market data and a custom study of the same audience.
Tags : 
sales engagement plafform, customer engagement, shorten sales cycles, sales enablement software, sales analytics, clearslide, customer management software, sales prospect tracking, customer engagement tools, optimize sales process, sales predictability tools, sales productivity tools, sales web tools, mobile apps for sales, online collaboration tool, how to deliver a good sales pitch, email pitch, presentation sharing software, improve sales forecasting, improve sales management
    
ClearSlide, Inc
Published By: Qualys     Published Date: Jan 11, 2017
With attackers getting more sophisticated every day, manual methods of locating and testing web-based apps are no longer enough. The right Web Application Scanning (WAS) solution can help you systematically: discover web apps running in your network, determine whether or not they are vulnerable to attack, understand how to fix them, and protect your business while fixes are being implemented
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Intel Corp.     Published Date: Apr 25, 2012
Read the paper now and learn how to implement secure virtualization and discover the benefits that could be achieved.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition, cloud, private cloud, challenges, virtualization
    
Intel Corp.
Published By: Intel Corp.     Published Date: Apr 25, 2012
Download this guide, which is designed to help you better evaluate different cloud technology vendors and service providers based on a series of questions posed by three cloud infrastructure providers.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition, cloud, private cloud, challenges, virtualization, knowledge management, data management
    
Intel Corp.
Published By: Intel Corp.     Published Date: Apr 26, 2012
Learn about the business case for developing a private cloud and the basics of building a cloud for the organization.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition, cloud, private cloud, challenges, virtualization, data management
    
Intel Corp.
Published By: Intel Corp.     Published Date: Apr 26, 2012
Dealing with compliance, privacy, data and application security in the cloud
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition, cloud, private cloud, challenges, virtualization
    
Intel Corp.
Published By: Intel Corp.     Published Date: Apr 26, 2012
Download this report to read critical feedback from 200 IT managers in both SMB and enterprise organizations - find out how they are addressing challenges of cloud computing, especially cloud computing security issues.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition, cloud, private cloud, challenges, virtualization
    
Intel Corp.
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top