enterprise software

Results 601 - 615 of 615Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Mar 21, 2017
In 2017, BlackBerry customers will face a major IT challenge — rebuilding their entire mobile security infrastructure when BlackBerry officially end-of-lifes its Good for Enterprise email app. Migrating to BlackBerry’s offering involves more than just rolling out a new app; it will require IT to spend significant time and resources to redefine policies, retrain IT and help desk staff, and re-enroll hundreds or even thousands of users in the new software.
Tags : 
    
MobileIron
Published By: JBoss Developer     Published Date: Jan 25, 2016
Deploying open source software successfully in an enterprise environment requires careful evaluation. Not all open source software is designed for enterprise use, and not all open source communities serve the unique needs of enterprise development. Read this paper to learn about Red Hat's proven track record of delivering IT solutions to the Forbes Global 2000.
Tags : 
red hat, open source software, integration software, enterprise development, it solutions, it management, knowledge management, enterprise applications
    
JBoss Developer
Published By: Dell     Published Date: Jul 12, 2016
Today’s enterprise leaders are looking for a way to make apps run faster, IT management cheaper, and provisioning easier. The advent of hyper-converged software (HCS) has meant that organizations can now get much more out of their hardware than ever before. New data center options are emerging that save time, space and money — creating an industry pivot and a new focus on hyper-converged infrastructure (HCI).
Tags : 
    
Dell
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Hyperconvergence is making inroads in enterprises, as major system vendors acquire startups or bundle servers with HC software offerings. I&O leaders should focus on the capabilities and limitations of HCI software, which is offered by a wide range of server platform vendors via OEM partnerships.
Tags : 
    
Hewlett Packard Enterprise
Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle, enterprise applications, business technology
    
Veracode
Published By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : 
veracode, security, supply chain security, web applications, application security, enterprise applications, business technology
    
Veracode
Published By: Epicor Software Corporation     Published Date: Mar 21, 2017
Download Epicor BisTrack News and find out how you can best position your distribution company for profitable growth.
Tags : 
erp, erp system, enterprise resource planning, business system, epicor bistrack, distribution software, business intelligence, builders merchants
    
Epicor Software Corporation
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Whether we’re talking about a life partner, a business partner or an enterprise information platform, you don’t want to start any kind of relationship without all relevant information – or worse yet, go in blind. Selecting a case management solution provider is no different. Download this white paper to discover key considerations and questions to ask when evaluating case management vendors and software solutions.
Tags : 
case, management, software, solution, dynamic, onbase, hyland, knowledge
    
OnBase by Hyland
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
To compete successfully in today’s economy, companies from all industries require the ability to deliver software faster, with higher quality, and reduced risk and costs. This is only possible with a modern software factory that can deliver quality software continuously. Yet for most enterprises, testing has not kept pace with modern development methodologies. A new approach to software testing is required: Continuous Testing. In the first session in a series, join product management leadership to gain in-depth insights on how by shifting testing left, and automating all aspects of test case generation and execution, continuous testing, it enables you to deliver quality software faster than ever. Recorded Feb 5 2018 49 mins Presented by Steve Feloney, VP Product Management CA Technologies
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: Insight     Published Date: Nov 16, 2017
Enterprises around the world are confronted with new challenges driven by a workforce undergoing massive change on both cultural and technological fronts. Today’s workforce offers the potential to bring together five generations of workers within one company, including “digital natives” — those exceptionally comfortable with the rapid changes occurring across technology. This new, broad workforce is not only powerful in size, but also in its demand for new ways of working.
Tags : 
workforce management, enterprise it, insight managed office, device procurement, software licensing, cloud-based services
    
Insight
Published By: Tricentis     Published Date: Jan 08, 2018
QASymphony wrote this guide to share many of the best practices we have seen through hundreds of customer evaluations over the past few years. The following content will provide the key areas of focus for your evaluation process and help guide your selection of a new software testing tool.
Tags : 
    
Tricentis
Published By: Tenable     Published Date: Mar 07, 2018
Includes 5 tips for bridging the DevOps InfoSec gap. Across industries, in the public and private sector alike, the benefits of DevOps are undeniable: speed to market, improved service delivery and cost savings. At the same time, DevOps can create security blind spots that impact an entire enterprise. To understand why this happens and learn how you can bridge the gap between security and development, read: Information Security in the DevOps Age: Aligning Conflicting Imperatives. Topics covered include: - Rethinking the role of security - Shifting security left by focusing on code quality and prevention - Blind spots in containers and open source components - 5 tips for bridging the DevOps infosec gap Written by CyberScoop, this paper offers practical advice for DevOps and InfoSec professionals who want to realize the benefits of accelerated software development without jeopardizing enterprise security.
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: Workday     Published Date: Feb 04, 2019
Enterprise software upgrades have traditionally been a real headache. But do they have to be? See how the experience of a major application upgrade process differs for two CIOs – one using on-premise software and one using Workday.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: • Address software vulnerabilities and misconfigurations • Eliminate exposed ports & services • Reduce the chance of attacks delivered via email • Limit browser-based attacks • Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
Published By: Workday     Published Date: Sep 30, 2019
Workday started with a clean sheet of paper and created an enterprise software experience in the cloud that is fundamentally different by design.   Watch this video to hear from IT executives about the advantages of the Workday architecture.
Tags : 
    
Workday
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.