application assessment

Results 26 - 39 of 39Sort Results By: Published Date | Title | Company Name
Published By: Progress Software BTA Financial     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance
    
Progress Software BTA Telecommunications
Published By: CEB     Published Date: Nov 09, 2015
As an HR professional, you know the spotlight is on recruitment functions to prove their value to the business. You’ve seen how the volume of job applications has risen over the last few years, yet all it has done is create more work and rarely better outcomes – for candidates, recruiters or employers. Based on CEB research, this eBook uncovers the insights and solutions to overcome these volume recruitment challenges: • How to create an effective employer brand • How to optimize the candidate experience • How to make the recruitment process more efficient
Tags : 
recruitment, recruiting, volume recruitment, volume hire, volume recruiting, high volume recruitment, high volume recruiting, applicant sifting, candidate sifting, sifting applications, large scale recruiting, graduate recruitment, pre-hire, pre-hire assessments, ability tests, employer branding, employer brand, candidate experience, talent assessments, human resources
    
CEB
Published By: Avi Networks     Published Date: Mar 24, 2016
This buyer’s guide for load balancers is based on research, best practices, and conversations with network administrators and IT operations teams at over 110 Global 2000 enterprises. It presents guidelines for choosing application services that mirror the needs of modern data centers and public cloud initiatives. The guide is organized in sections, starting with a pre-assessment of your current application delivery capabilities. With data gathered from your pre-assessment, you can review the considerations involved in creating a software-defined application services strategy; identify opportunities to improve automation of application services and operations. Finally, use the software-defined application services checklist at the end of the guide to identify key priorities in your choice of application service solutions for your enterprise.
Tags : 
avi networks, best practices, application services, modern data centers, public cloud initiatives, load balancer, load balancing, application delivery, application delivery controller, adc, software-defined networks, sdn
    
Avi Networks
Published By: SAP     Published Date: Jan 21, 2010
The goal of this article will be to contribute to the emerging dialog on the subject of business value by extrapolating from BI lessons learned and from DecisionPath Consultings experience working with Fortune 1000 customers and Government agencies.
Tags : 
sap, business intelligence, data warehousing, enterprise application, erp, scm, crm, manufacturing, process engineering, readiness assessment, roi analysis, business value delivery
    
SAP
Published By: Viavi Solutions     Published Date: Sep 30, 2016
Organizations planning to migrate all or a portion of their applications or services to a public cloud environment will benefit from the experiences of early adopters. As a leader in hybrid IT monitoring, Viavi Solutions® has been involved at all stages of the cloud-migration life cycle: during assessment, implementation, and after deployment. Based on Viavi’s and our technology partners’ experience and many conversations with customers, prospects, and others in the industry, this white paper offers insight into 6 key questions regarding cloud adoptions: 1. Why Migrate 2. What to Migrate 3. What are the Steps to Cloud Migration 4. When to Migrate 5. Where to Migrate 6. Who to Ask for More Help
Tags : 
    
Viavi Solutions
Published By: HP     Published Date: Apr 13, 2014
Learn how Isbank, Turkey’s largest bank, dramatically reduced testing times for Functional Testing automation from 6 man-days to a few hours. Read about the benefits of adopting an Application Lifecycle Management approach to improve software quality, automate testing processes and safeguard mission-critical applications while supporting growth.
Tags : 
application lifecycle management, application development, application testing, enterprise release management, financial services, functional testing, hp application, hp loadrunner, hp performance center, hp quality center, hp quick test professional, hp service, hp service test, hp software professional, it case study, lifecycle management, performance testing, quality planning assessment, services, test management
    
HP
Published By: Palo Alto Networks     Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Tags : 
palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security, social media security, network security
    
Palo Alto Networks
Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : 
application security, web application security, hacker detection, cenzic, cenzic hailstorm
    
Cenzic
Published By: Cenzic     Published Date: Nov 29, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks.  Find out how Cenzic's ClickToSecure solution can help you secure your applications.
Tags : 
compiance, internet application security, it spending, application security, vulnerability management, identity management, security assessment, security audit, web security, cenzic
    
Cenzic
Published By: Cenzic     Published Date: Nov 11, 2008
This white paper highlights Cenzic’s recommendation of a process of continuous assessment for applications in development and production environments -- a process that can equally apply to Intranet and public facing applications alike. Continuous testing can now be easily and safely done in a virtualized environment; no longer putting production web applications at risk. Companies can now easily and quickly, add vulnerability testing to their list of activities for all of their Web applications including production applications. Using a testing methodology across a company’s Web application portfolio will significantly enhance the security of all Web applications.
Tags : 
web application security, testing web applications, cenzic, assessments for web applications
    
Cenzic
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military
    
HP - Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"12-page white paper on workload placement: In this Frost & Sullivan report, they look at how the hybrid environment calls for a new way of thinking about “application performance.” They show how application performance is impacted by choice of deployment model (on premises and in the public cloud). They look at workloads whose performance requirements make them candidates for on-premises deployment, and identify the link between “optimal performance” and achievement of business goals. Finally, they offer suggestions for getting started with your workload assessment process. "
Tags : 
    
Hewlett Packard Enterprise
Published By: Skytap     Published Date: Aug 23, 2017
Cloud migration has exploded in popularity since General Electric’s (GE’s) flashy keynote at Amazon Web Service’s (AWS’s) re:Invent in September 2015. GE claims to be migrating all workloads not containing secret information. Enterprises are revisiting public cloud and exploring whether existing or systems-of-record applications have a place in that world. Infrastructure and operations (I&O) professionals on this path should avoid a one-size-fits-all approach to outsourcing and migration plans, opting instead for an app-by-app assessment.
Tags : 
    
Skytap
Previous    1 2     Next   
Search Resource Library