ComputerWeekly.com Research Library

Powered by Bitpipe.com

Applications Management Research

  • Application Delivery Network Buyer's Guide

    Sponsored by: ComputerWeekly.com

    The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.

  • API Management: The role of APis in digital business transformation

    Sponsored by: ComputerWeekly.com

    Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.

  • API Security 101: Your Expert Guide to API Defense

    Sponsored by: TechTarget

    As organizations take measures against common vulnerabilities, hackers have set their sights on a new target: APIs. This e-guide shines a light on API risks and vulnerabilities, as well as the tactics forward-thinking businesses can use to stay secure.

  • The Business Value of VMware NSX Advanced Load Balancer: A Study of Enterprises Using Next-Generation Application Delivery

    Sponsored by: VMware

    Existing application delivery infrastructure was designed for the client/server era, not the cloud era. As such, there is a need for application delivery to become more agile, more elastic, more distributed and more orchestrated. Download this IDC report to see firsthand the potential value of VMware’s NSX Advanced Load Balancer.

  • 8 Experts On Flawless App Delivery

    Sponsored by: Citrix

    In a world of distributed computing and componentized applications, securely building and deploying a successful application is a challenge. Poor execution can result in underperforming apps, security risks and unacceptable infrastructure costs. Download this Citrix guide to hear from 8 experts on how to flawlessly deliver applications.

  • Application Delivery Network Buyers' Guide

    Sponsored by: ComputerWeekly.com

    The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.

  • API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4

    Sponsored by: Traceable

    Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.

  • 5 Things To Consider When Choosing An APM Tool

    Sponsored by: Splunk

    To accelerate innovation and protect digital and cloud investments, organizations need to invest in modern monitoring and application performance monitoring (APM) solutions that are built for the new data age powered by the cloud. In this e-book, explore 5 things you must consider when picking an APM tool.

  • Application Modernization Field Guide

    Sponsored by: Deloitte Consulting LLP

    The best approach to application modernization depends on your existing estate. However, there are some best practices and general guidelines any team can follow for modernization insight. Save IBM and Deloitte’s Application Modernization Field Guide here.

  • NVMe Centralized Logging

    Sponsored by: Pavilion

    Access this white paper to see the general architecture necessary for centralized logging, the 11 benefits of using a shared NVMe-oF storage platform for centralized storage, and what logging in a containerized environment looks like.

  • Application Modernization Today: 6 Reasons To Choose A Consistent Infrastructure Platform

    Sponsored by: VMware Intel

    In this custom eBook, learn how to create and execute on a winning, future ready strategy for application modernization and discover 6 reasons to choose a consistent infrastructure platform.

  • Reduce API Security Risks with Automated and Continuous API Scanning

    Sponsored by: WhiteHat Security

    Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.

  • Why DevOps Has Not Become DevSecOps

    Sponsored by: WhiteHat Security

    Access this white paper to see the 6 myths that are contributing to the lack of DevSecOps adoption, watch as they are easily debunked, and learn 8 recommendations moving forward with this new understanding.

  • The Business Value of Red Hat Soultions and Cost Relationship to Unpaid Alternatives

    Sponsored by: Red Hat and TCS

    Review this data sheet to see the business value of implementing Red Hat Solutions including 3 key results and 3 key benefits.

  • API Management: The role of APis in digital business transformation

    Sponsored by: ComputerWeekly.com

    Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.

  • Computer Weekly - 7 April 2020: Adapting IT to the new normal

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.

  • Magic Quadrant for Application Performance Monitoring

    Sponsored by: Splunk

    Access this Gartner white paper to see their Magic Quadrant which evaluates the strengths and cautions of the leading application performance monitoring vendors.

  • Equifax Success in Security Transformation

    Sponsored by: Sonatype

    Access this case study to learn how Equifax achieved a security transformation through Sonatype Nexus Life cycle and Nexus Repository.

  • CONTRAST OSS HELPS DEVOPS MANAGE AND TRIAGE HIDDEN OSS LIBRARY RISK

    Sponsored by: Contrast Security

    Download this eBook to learn about a new approach to OSS security: Contrast OSS, and how it can help you prioritize critical vulnerabilities by tracking the libraries that actually get used during runtime operation.

  • Are your Communications Slowing you Down?

    Sponsored by: Avaya

    69% of employees waste up to 60 minutes per day navigating between apps. With an overload of apps in today’s businesses, employees are becoming disengaged due to poor user experience, and this disengagement trickles down to your customers. View this infographic for more on why your communications may be slowing you down.

  • SIG - SASE Convergence of Cloud Security and Networking

    Sponsored by: Cisco Umbrella

    It’s the new normal, and ensuring security for this cloud-centered reality is paramount. Businesses must deepen visibility, protection and control of internet traffic while simplifying security deployment and management. Watch this webinar to learn how Cisco is breaking new ground with a SASE as well as unified SD-WAN and cloud security offers.

  • SIG - SASE For Dummies

    Sponsored by: Cisco Umbrella

    Secure access service edge (SASE) delivers networking and security via the cloud, giving organizations the ability to securely enable remote users, devices and SaaS apps without inhibiting performance. Read ‘SASE for dummies’ to get a closer look at this technology and learn the key components of a SASE solution.

  • Readying-Legacy-Applications-for-the-Cloud

    Sponsored by: UKCloud

    Gartner suggests there are 5 application migration strategies for rehosting an application: Rehost, refactor, revise, rebuild, and replace. However, UK Cloud argues that there’s a 6th “R” to consider: Retire.

  • REALIZING THE BENEFITS OF RPA IN FINANCE AND ACCOUNTING

    Sponsored by: UiPath

    Access this ebook to learn RPA use cases in finance and accounting, insights from actual users on what constitutes an effective EPA platform, 6 benefits of implementing RPA, and much more.

  • UiPath Process Mining

    Sponsored by: UiPath

    Access this ebook to learn key business challenges and how automaton addresses them, how UiPath Process Mining accelerates RPA, and how UiPaths helps companies in specific industries.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences