web server

Results 1 - 25 of 193Sort Results By: Published Date | Title | Company Name
Published By: Thawte     Published Date: Aug 09, 2013
SharePoint is a valuable collaboration tool. But your organization could be vulnerable if you don’t take the right steps. There’s no silver bullet for securing SharePoint because each deployment is unique. However, here are 10 best practices that everyone should follow when using this collaboration tool.
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, encryption
    
Thawte
Published By: Net Atlantic     Published Date: Mar 19, 2010
Net Atlantic's whitepaper, "15 Trade Secrets of Email Service Providers" uncovers the details behind email service providers (ESPs) and their practices. It highlights the differences between an email marketing server and a static web server, the methods used to avoid SPAM, and how ESPs achieve and maintain high deliverability rates. Marketers should know these secrets before embarking on an email marketing strategy, or entering into a deal with an ESP.
Tags : 
net atlantic, esp, email service provider, deliverability, spam, anti-spam
    
Net Atlantic
Published By: Oracle     Published Date: Jul 05, 2017
Your company’s website is up. Servers are churning transactions. The network is pumping data. Life is good. But everything in IT can change quickly. Today’s slightly sluggish network could become tomorrow’s downtime disaster. No matter what challenge may arise, you don’t get extra time, staff, or budget to deal with it. Plus, since the whole company relies on IT, everyone notices when you’re underwater.
Tags : 
revenue loss, tarnish brand, consumer confidence, dns services, high performing networks, workflow, dns
    
Oracle
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: IBM     Published Date: Oct 09, 2009
Succeeding in today's economy not only means utilizing technology to create intelligent, instrumented and interconnected solutions, but leveraging technology to optimize costs and do more with less. This brochure describes how the 3 key attributes of IBM's application foundation help deliver higher quality of service at a lower cost than JBoss.
Tags : 
websphere application server, ibm, jboss, application foundation, open source, tco, configuration, oss
    
IBM
Published By: Fugue     Published Date: Mar 27, 2017
Directed at cloud architecting concerns, this paper covers streamlining complexity at scale, knowing infrastructure state, and using easily repeatable patterns that bolster security, compliance, and disaster recovery. Get this white paper now.
Tags : 
cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration
    
Fugue
Published By: Blue Coat Systems     Published Date: Jul 05, 2011
A new generation of WAN optimization solutions can help network managers optimize consolidated data architectures internally, but also harness the power of the internet to reshape the way businesses leverage new technologies.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, cindy borovick, virtualization, idc, server
    
Blue Coat Systems
Published By: Epson     Published Date: May 14, 2018
Consumers worldwide continue to adopt and use technology in their shopping experience. Faced with rising customer expectations and increasing competitive pressures, retailers now are prioritizing in-store innovation. Many retailers have adopted multichannel implementations, in which mobile, web, and in-store shopping are enabled but not delivered consistently to the customer. The next step in this evolution is an omnichannel strategy, now being deployed by some retailers, which presents a consistent shopping experience across mobile, web, and in-store channels. Omnichannel also enables retailers to integrate back-end infrastructure technologies (e.g., servers, databases, etc.) and cloud-based services (e.g., loyalty programs, personalized recommendations, inventory management, etc.) to improve many aspects of store and enterprise operations. An omnichannel strategy relies on several core and supporting technologies. The key factors in evaluating any omnichannel-enabling solution includ
Tags : 
    
Epson
Published By: Akamai Technologies     Published Date: May 08, 2017
While the shift from disk to digital offers tremendous potential opportunities, it also presents a host of new challenges for gaming companies. As the online channel grows increasingly complex and the pace of innovation accelerates, many companies struggle to keep up. Not only are there websites and storefronts to manage, but also real-time gaming servers, large software downloads, and live-streamed competitions and events. Games are transforming from fixed, boxed products to dynamic, ongoing services – with frequently updated content, in-game micro-transactions, virtual goods and social interactions. Mobile adds another dimension to the trend, as consumers increasingly look to play on smart phones and tablets – or on multiple screens across devices. To successfully navigate this complex and changing landscape, gaming companies need an agile, high- performance infrastructure that allows them to turn the Internet into a reliable and effective online distribution channel. This requires f
Tags : 
akamai, akamai gaming, infrastructure, distribution channel, technological advancements
    
Akamai Technologies
Published By: VMware     Published Date: Aug 23, 2011
Join IDC Analysts and NewEdge's Global Head of Data to hear how a new approach to applications and data is driving revenue growth and cost savings.
Tags : 
application server, data management, application monitoring and management, web server load balancing, enterprise messaging, vmware virtualization, server virtualization, desktop virtualization
    
VMware
Published By: Reactivity     Published Date: Aug 21, 2009
Security is one of the main issues when deploying Web services in the enterprise. This white paper discusses the advantages of an appliance over an agent-oriented architecture for Web services security, how cross platform interoperation is immediate with a hardened appliance, and why web services security is different from web server security.
Tags : 
network architecture, quality assurance, xml, web service management, web service, web service security, web services security, security appliance
    
Reactivity
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 and both Oracle and BEA have collaborated on delivering market-leading Application Delivery Networking solutions. For BEA WebLogic Server 10, F5 has designed an integrated and adaptable network platform for delivering WebLogic applications across the LAN and WAN. The result is an intelligent and powerful solution that secures and speeds your WebLogic deployment today, while providing an optimized architecture for the future.
Tags : 
oracle, bea, weblogic applications, weblogic deployments, optimized architecture
    
F5 Networks Inc
Published By: VMWare - vFabric     Published Date: May 10, 2012
By migrating all web applications to VMware vFabric tc Server, DSD achieved fast testing and live deployments, proactive problem solving and high website availability. This case study is essential reading for anyone interested in quick turn around!
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware
    
VMWare - vFabric
Published By: Internap     Published Date: Nov 11, 2015
This benchmark analysis examines the relative performance of major VM components including virtual cores, memory, block storage, and internal network for Internap AgileCLOUD and Amazon Web Services (AWS) ECS/EBS.
Tags : 
internap, virtual machine, public cloud, servers
    
Internap
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking
    
Coyote Point Systems
Published By: Nginx     Published Date: Jul 15, 2014
Users demand fast application delivery and it is essential for the survival of your business. Meeting the expectations of your users is challenging. NGINX Plus offers a broad array of solutions to solve these challenges, allowing you to delight your users.
Tags : 
nginx, application delivery, web servers, application infrastructure, apache http server, high availability, load balancing, server performance
    
Nginx
Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance
    
Cenzic
Published By: Thawte     Published Date: Aug 08, 2013
This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
Tags : 
thawte, ssl certificate, application, web server, data collection, technology
    
Thawte
Published By: Red Hat     Published Date: Jun 18, 2012
Join Red Hat's CIO Lee Congdon for a c-level discussion of the key considerations and benefits of building an Open Cloud Architecture.
Tags : 
red hat, on-demand webinar, private cloud, virtualized server, cloud computing, virtualization
    
Red Hat
Published By: Cisco     Published Date: Dec 20, 2018
Cisco® Collaboration Flex Plan gives you access to Cisco’s collaboration products, allowing you to mix and match buying models and deployment models in a single subscription depending on your buying needs. One subscription covers entitlement and technical support for: (a) the cloud services Cisco Webex® Meetings, Cisco Webex Calling, Cisco BroadCloud Calling, and Cisco Webex Teams and (b) the software Cisco Unified Communications Manager and Cisco Meeting Server.
Tags : 
    
Cisco
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security
    
CDW-Trend Micro
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Find out how it works and why it's actually possible now to move the battle for web security off your web servers.
Tags : 
cloud-based web security, cybercriminals, watchguard reputation enabled defense, web-based attacks, threat management, malware, url filtering
    
WatchGuard Technologies
Published By: Extensis     Published Date: May 04, 2008
Integrated marketing communications agency, CMD, has an easy way of tracking the payoff from implementing Portfolio Server and Suitcase Server to manage their digital assets and fonts. It's called more billable hours.
Tags : 
cmd, extensis, font, website design, server, communications, digital asset management'
    
Extensis
Published By: Symantec     Published Date: Dec 04, 2014
Certificates are for more than just Web servers - and code-signing certificates in particular can make your enterprise more secure, make your software more accepted, and even stop malware in its tracks.
Tags : 
web servers, code-signing, malware, software, code-signing certificates, best practice
    
Symantec
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.