critical software

Results 76 - 100 of 108Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.
Tags : 
saas, application, line-of-business owners, lobs, software-as-a-service, technology, strategy
    
Blue Coat Systems
Published By: IBM     Published Date: May 09, 2013
While software license costs are a major expense, most companies spend very little time managing this critical and widely distributed asset until an audit occurs or a cost reduction program forces attention. This should be the year you flip from being reactive to being proactive in dealing with software asset and license management. Costs savings and peace of mind are just two of the benefits that you will realize. In this Webcast an analyst from Frost and Sullivan will go over the results of a recently published white paper on this topic and Deloitte & Touche will discuss the benefits their customers have gained in automating their license management processes. View this Webcast to learn how you can reclaim licenses, avoid unnecessary license costs, achieve continuous compliance, and improve risk management.
Tags : 
software license, automate, reclaim licenses, compliance, improve, risk management
    
IBM
Published By: Business Software     Published Date: Apr 04, 2013
An ERP system combines methodologies with software and hardware components to integrate numerous critical back-office functions across a company. Made up of a series of “modules”, or applications that are seamlessly linked together through a common database, an ERP system enables various departments or operating units such as Accounting and Finance, Human Resources, Production, and Fulfillment and Distribution to coordinate activities, share information, and collaborate. In this white paper, Business-Software.com profiles the leading ERP software vendors. Download this white paper to learn more!
Tags : 
business-software.com, erp systems, methodologies, top 20, coordination, business software
    
Business Software
Published By: Peoplefluent     Published Date: Apr 02, 2013
With fewer people entering the workforce and a shortage of certain skills, develop strategies now to address skills shortages. Read about the opportunity presented by Baby Boomers and how to leverage Boomers for competitive advantage.
Tags : 
baby boomers, recruiting baby boomers, retaining baby boomers, contingent labor, workforce planning, skill gap challenges, changing workforce, critical skills deficit, workforce management, vendor management system, contingent workforce management, talent acquisition, talent management software, workforce planning software, recruiting software, employee retention, recruitment software, workforce management software, workforce talent management, leveraging baby boomers
    
Peoplefluent
Published By: McAfee     Published Date: Feb 06, 2013
It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss, ssdt, hardware assisted security, hardware enhanced security, zero-day malware, zero-day rootkit, kernel layer security
    
McAfee
Published By: McAfee     Published Date: Jan 23, 2013
Vulnerabilities lead to risk exposure and downtime. Protect your critical assets with virtual patching.
Tags : 
virtual patching, network breaches, critical patches, software patches, change management
    
McAfee
Published By: Red Hat     Published Date: Jan 01, 2013
IDC profiles a range of customers successfully employing Red Hat Enterprise Linux for a full spectrum of workload types, including high-end applications previously hosted on non-x86 servers.
Tags : 
linux, business-critical workloads, workload data, ecosystem, application software, development, deployment software, infrastructure software
    
Red Hat
Published By: Splunk     Published Date: Sep 17, 2012
Splunk has become a critical real-time monitoring and analytics tool for Bronto. Read more about Bronto Software's hard and soft ROI's by using Splunk versus extending their Hadoop deployment.
Tags : 
roi, enterprise management associates, real time monitoring, analytics, hadoop, email delivery system, enterprise business solutions
    
Splunk
Published By: Internap     Published Date: Dec 29, 2011
Performance plays a vital role in the success of your online applications and web-based content - whether you are processing millions of transactions, delivering business-critical software or servicing a massive gaming community. Research shows that even one second of delay on a typical website can result in 7% fewer customer conversions. For many businesses, that means lost revenue and damage to their brand. As cloud is becoming an increasingly viable infrastructure choice for enterprise applications, it is essential to select a high-performance cloud service that will support the best possible experience for your end users. Determining the right cloud solution for your needs also necessitates thorough analysis of the level of security, control, customization and support your business requires. In this webcast, thought leaders from Gartner and Internap outline the performance factors that affect your cloud decision-making process and discuss how to optimize your IT Infrastructure to create satisfied end users.
Tags : 
enterprise cloud, cloud computing, technology, cloud solution
    
Internap
Published By: CollabNet     Published Date: Dec 20, 2011
In this ever-changing world of software development, it's critical to keep up with technologies, methodologies and trends. Discover five tested and proven software development practices your team should be utilizing to accelerate software delivery.
Tags : 
agile, software development, continuous integration, alm, dev teams, accelerate delivery, developers, app dev
    
CollabNet
Published By: HP - Enterprise     Published Date: Nov 22, 2011
HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
Seven Steps to Delivering More Secure Software With all the processes that go into making an application more secure. Where do you start? Learn more
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
Six Steps to Secure Your Applications Learn why application security is more critical than ever to your business. Find out more now.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: Coverity, Inc.     Published Date: Nov 01, 2010
This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
Published By: Coverity, Inc.     Published Date: Aug 16, 2010
voke Names Coverity as a Transformational Company in the Testing Market Coverity has been rated as a Transformational company in the voke, inc. Market Mover Array Report for Testing Platforms. Coverity's rating is recognition of the impact that Coverity's software integrity strategy is making in shaping the future of the testing market.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
Published By: Software Security Solutions     Published Date: Jun 28, 2010
Legacy Antivirus Software slowing you down? If you are ready to change, this white paper shows how to choose what's best!
Tags : 
software security, antivirus software, malware
    
Software Security Solutions
Published By: Coverity, Inc.     Published Date: Feb 26, 2010
Find out how Coverity has helped Frequentis ensure a high level of software integrity to support its product mission of freedom from failure, while continually improving the productivity of its developers.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
Published By: IBM     Published Date: Oct 21, 2009
The Austin Diagnostic Clinic recovers critical data in less than an hour with IBM Tivoli Storage Manager FastBack software. ADC reduced backup window for electronic medical records from two hours to five minutes; were able to restore many services in under an hour; reduced time and cost of server consolidation initiative and achieved up to 75% reduction in testing times.
Tags : 
tivoli, ibm, austin diagnostic clinic, data recovery, storage, data protection, data recovery, it environment
    
IBM
Published By: webMethods     Published Date: Aug 21, 2009
Selecting the right business integration vendor is a challenge. While it is essential to focus on what is critical for your company, it is also important to evaluate vendors using a common set of metrics. This document uses customer feedback taken from a broad portfolio of evaluations to offer key factors and considerations to use when selecting an integration software vendor.
Tags : 
business integration, integration, return on investment, roi, business process management, bpm, vendor selection, business integration software, choosing a vendor, vendor, web methods, webmethods
    
webMethods
Published By: BMC Control M     Published Date: Jul 22, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster, cheaper, safer, technology, software, bmc contol-m, enterprise, management
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 16, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster, cheaper, safer, technology, software, bmc contol-m, enterprise, management
    
BMC Control M
Published By: Catapult     Published Date: Apr 23, 2009
Software-as-a-Service is changing the way companies purchase technology solutions. Rather than securing large capital budgets and tying up IT labor for months, business executives can now address mission critical initiatives with subscription-based software solutions that scale with their business and can be implemented in little to no time.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‐in, pay‐per‐seat, flat‐rate fee per transaction, salesforce.com, security, remote access, product information management, sales, sales strategies
    
Catapult
Published By: Concentric     Published Date: Mar 27, 2009
Email has become something of a critical utility, much like the electricity that powers our offices: it must be available 24 hours a day, it must provide reliable performance, and its cost must be reasonable. However, unlike electrical systems (at least from the user’s perspective), email systems require significant amounts of labor to manage well. Email systems must periodically be upgraded. New hardware must be introduced as organizations migrate to new systems. Security must be maintained and upgraded to protect the system from intrusions. Additional hardware must be deployed to protect against outages that could seriously harm user productivity. Plus, unexpected events, such as spam storms or natural disasters can drive up costs substantially in ways that were not anticipated.
Tags : 
concentric, email options, critical utility, killer app, small and mid-sized businesses, smbs, on-premise email solution, on-premise email costs, hardware costs, software costs, labor costs, resiliency, failover capability, concentric hosted exchange, microsoft® exchange 2007, outlook web access, owa, blackberry, activesync, pop3
    
Concentric
Start   Previous    1 2 3 4 5    Next    End
Search Resource Library