application services

Results 1 - 25 of 618Sort Results By: Published Date | Title | Company Name
By: Adecco     Published Date: Sep 25, 2017
Until recently, the waterfall methodology of development and deployment had taken a strategic hold in the majority of enterprises. Enterprises have moved into the world of Agile, where different concepts are leveraged and the development process is handled in a completely different fashion. Agile development ideologies are proving to be a better way to deal with rapidly changing objectives and speeding the time-to-market for business applications, services and other customer- (or internal-) facing offerings. The ideas behind Agile extend beyond basic application development, and can benefit numerous projects by improving the process to achieve deliverables and garner improved productivity.
Tags : agile, agile development, development process, waterfall, app
     Adecco
By: Aerohive     Published Date: Oct 12, 2011
Once you've enabled your people to work wirelessly from anywhere, anytime, on any device, you need to maintain security and control under constant pressure to drive down cost, while increasing productivity and growth. Enter the Cloud.
Tags : aerohive, wireless network management, cloud-based networking, cloud-enabled applications, cloud services, wi-fi management
     Aerohive
By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : akamai technology, web application security, http, best practices, security
     Akamai Technologies
By: Akamai Technologies     Published Date: Mar 10, 2016
What digital trends are forcing CDN services to evolve? CDN services are changing, and web and application delivery professionals are navigating the evolving CDN landscape. Read the Forrester Research Report, "CDNs Extend to Web Performance Optimization and End-To-End Cloud Services" to learn what new capabilities are required from the Next Generation CDN.
Tags : cdns, akamai technology, web performance optimization, cloud services
     Akamai Technologies
By: Akamai Technologies     Published Date: Mar 15, 2016
Manufacturers, in an effort to succeed with digital transformation, are relying on the Internet and public cloud to deliver key enterprise applications and processes. As manufacturers continue to become more digital enterprises, their network architecture must as well. Read this paper to learn key considerations for architects to create a holistic network that takes today’s, and tomorrow’s, requirements into consideration.
Tags : network management, manufacturing, network optimization, network applications, cloud services, enterprise applications
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 07, 2016
Many industry experts advise financial services institutions (FSIs) to embrace digital transformation. At the heart of that mandate is the need to satisfy rising customer expectations for fast, secure, always-on services delivered seamlessly across all channels and devices. While it’s important to harness the digital technologies today’s customers turn to — especially when it comes to engaging the millennial generation — FSIs need to optimize web and mobile performance to deliver exceptional end-user experiences. Here are eight considerations. Get started on your journey – download the whitepaper today
Tags : online banking service, online banking services, online banking application, online banking applications, online banking app, online banking apps, financial services it, online banking solutions, digital transformation, digital disruption, infrastructure, cloud security, ddos, security breaches, web application security, cyber threats, cyber security, cloud applications
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 17, 2017
APIs are the unseen language of the Internet. They power digital transformation across industries by allowing applications to talk to one another and operate as crucial backend services to websites and mobile apps. As a dynamic and somewhat hidden technology, it can be challenging to find detailed information about the API space. We combined findings from our recent API survey of business leaders from over 400 leading technology companies with industry data to compile four need to know facts about APIs.
Tags : api, mobile app, technology, backend service
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 30, 2019
Attacks on financial services institutions are growing in both quantity and sophistication. Our new State of the Internet/Security report studies criminal behavior across this advanced and expansive financial services attack economy: from a popular authentication mechanism for staging credential stuffing attacks to the use of stolen identities to cash out ill-gotten gains. The report identifies leading DDoS and application-layer attack vectors, lucrative phishing variants, and how criminals stage decoy attacks to distract from their real targets. Attacks that prove successful in financial services often move on to other industries. Download the report, and see what petabytes of data tell us.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 30, 2019
The financial services industry is one of the largest and most sought-after targets for attackers. This particular industry revolves around trust and security, and because of this, these elements are quite often the key focal point for criminals. Successful attacks can quickly translate into the dissemination of massive amounts of personal information and monetary gains by the attacker. Criminals targeting the financial services industry do so by leveraging various attack surfaces, such as people, processes, applications, or systems. Regardless of where the financial institutions are located in the world, staying aware of the forefront of new attack trends is imperative for keeping their systems and customers safe. Understanding the ecosystem of attacks, how different layers interact, and the booming economy spawned by it gives financial services organizations the edge they need.
Tags : 
     Akamai Technologies
By: Amazon Web Services     Published Date: Oct 09, 2017
Amazon Web Services has a long history of successfully supporting Microsoft workloads, with hundreds of thousands of customers across a wide variety of industries running their Microsoft workloads on AWS. Customers have successfully deployed virtually every Microsoft application available on the AWS Cloud, including (but not limited to) Microsoft Office, Microsoft Windows Server, Microsoft SQL Server, Microsoft Exchange Server, Microsoft SharePoint Server, Microsoft Skype for Business, Microsoft Dynamics products, and Microsoft Remote Desktop Services. This guide covers the benefits of moving Microsoft workloads to the Cloud and how to get started.
Tags : cloud, amazon, web services, microsoft, security, customer success
     Amazon Web Services
By: Amazon Web Services     Published Date: Jan 23, 2018
Although no enterprise will be forced to migrate its core enterprise applications to the cloud, enterprises are on the cusp of facing the fork in the road that leads to the cloud. The release of a jointly developed cloud-migration test program from SAP and AWS (Amazon Web Services) will help enterprises address the uncertainty that they will face in estimating the actual time and cost of a migration of HANA to the AWS cloud. Provided by: AWS & Intel
Tags : sap, aws, program, hana, cloud, migrations, ovum
     Amazon Web Services
By: Amazon Web Services, Inc     Published Date: Sep 16, 2013
Deploy a Microsoft SharePoint 2010 server farm on the Amazon Web Services (AWS) Cloud in 6 simple steps. Save money on IT infrastructure costs with no long term commitments. Learn how with our planning and implementation Guide, which also includes deployment tools, templates, and a video tutorial. Download Today!
Tags : aws sharepoint, enterprise sharepoint, microsoft sharepoint, microsoft sharepoint download, microsoft sharepoint online, microsoft sharepoint solutions, ms sharepoint, ms sharepoint services, online sharepoint, portal sharepoint, sharepoint, sharepoint application, sharepoint collaboration, sharepoint enterprise, sharepoint enterprise cal, sharepoint enterprise trial, sharepoint implementation, sharepoint installation, sharepoint integration, sharepoint microsoft
     Amazon Web Services, Inc
By: AMD     Published Date: Jul 23, 2012
Virtualization deployment will continue to grow dramatically, fueled by a variety of factors, including continued use of virtualization to support consolidation efforts; growth of virtualization use in mission-critical applications and workloads; growth in virtualization among small and midsize organizations; successful deployment of virtualization as a strategic initiative to enhance business agility; and virtualization as the foundation for next-generation cloud computing services.
Tags : virtualization, microsoft hyper-v, incremental consolidation, it agility, business agility, business continuity, return on investment, roi, scalability, legacy applications
     AMD
By: Appcito     Published Date: Apr 09, 2015
Elastic Load Balancing automatically distributes incoming web tra?c across multiple EC2 instances. With Elastic Load Balancing, you can add and remove EC2 instances as your needs change without disrupting the overall ?ow of information. If an EC2 instance fails, Elastic Load Balancing automatically reroutes the tra?c to the remaining running EC2 instances. If a failed EC2 instance is restored, Elastic Load Balancing restores the tra?c to that instance.
Tags : cloud architect, web traffic, elastic load balancing, information flow, load balancer, application security, amazon web services, aws, visibility
     Appcito
By: Appcito     Published Date: Apr 09, 2015
Appcito CAFE (Cloud Application Front End) is an easy-to-deploy, uni?ed and cloud-native service enabling cloud application teams to select and deploy enterprise-grade L4 to L7 application network services. The multi-cloud CAFE service is available for the OpenStack open-source cloud computing software platform. OpenStack is a multivendor ecosystem used to deploy Infrastructure-as-a-Service (IaaS) solutions. It allows users to bring compute, storage, and networking resources into private and public clouds through a set of open APIs.
Tags : openstack, cloud applications, load balancing, application security, cloud application delivery
     Appcito
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com