api

Results 1 - 25 of 2254Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Tenable     Published Date: Aug 07, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : 
devops, dev sec ops, infosec, container security, idg, digital transformation
    
Tenable
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
The popularity of integration platform as a service (iPaaS) started with business users looking to gain control and share data among their proliferating SaaS apps?without needing IT intervention. iPaaS was then adopted by IT to support business users to ensure security measures were being maintained and to provide more of a self-service environment. Now, iPaaS has evolved from a niche solution to taking a much bigger role: Read this whitepaper to learn about: Drivers for cloud integration Five emerging uses cases for iPaaS that enable better responsiveness, APIs, event-driven capabilities, human workflows, and data analysis Questions to ask when evaluating your current solution
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
Maintaining a competitive edge today means building a Digital Enterprise capable of taking full advantage of social, mobile, web, cloud, “things,” (sensors and devices), and analytics technologies. Among the terms used to describe this business transition is “the API Economy,” an economy in which APIs are no longer just an IT concern, but the underpinnings of new revenue streams and new business models that are disrupting entire industries. Read this paper to learn about: New, modern applications being built for the enterprise Application ecosystems and extending the value of your company in the API Economy Two ways to integrate devices in the Internet of Things The microservices approach to application development The role of API management in the digital enterprise
Tags : 
    
TIBCO Software APAC
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: KPMG     Published Date: Jul 10, 2018
Alliances are becoming a key part of corporate strategy for organisations seeking to keep abreast of disruptive technologies. Is this the right route for your organisation – and how can you maximise the chances of success? Download this report to find out: • how alliances are reshaping industries worldwide • whether strategic alliances are a viable alternative to M&A • the factors that can make or break an alliance • three priorities for making an alliance work.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 11, 2018
Looking for a smarter approach to workforce planning? With robotics and artificial intelligence transforming the workplace, analysing supply and demand over 3–5 years doesn’t make sense. HR leaders need to find a more flexible approach to workforce shaping. Read this report to discover: • the key trends that will shape the future workforce • what early movers into intelligent automation can teach us • what’s involved in agile workforce shaping • how to use our 5C Framework to navigate the changes ahead.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG
Published By: IBM     Published Date: Jul 05, 2018
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
IBM
Published By: IBM     Published Date: Aug 09, 2018
Forrester analyzed the Total Economic Impact of IBM API Connect and the benefits and costs that resulted.
Tags : 
    
IBM
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: Workday     Published Date: Aug 07, 2018
This e-book features 10 must-read articles on the rapidly evolving world of supply chain published by Becker’s Hospital Review. Articles cover a range of topics, from new entrants pushing into healthcare to how new business collaboratives are shaking up conventional distribution models.
Tags : 
    
Workday
Published By: NAVEX Global     Published Date: Jul 31, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Use this document to identify when bribery and corruption activities are most likely to be occurring within your business. Next to each bribery and corruption ‘red flag’ we have provided some suggested responses and best practices an organisation can use to address these issues and minimize the risks for your business. You’ll learn: What procedures should I have in place for third party engagements? Are there particular red flags that indicate increased corruption risk? How should I respond to high-risk third-party red flags?
Tags : 
    
NAVEX Global
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Oggi la tecnologia digitale è ovunque: cloud, mobility, social network e Internet of Things stanno cambiando il modo in cui tutti noi lavoriamo e ci divertiamo. Questo mondo digitale in rapida evoluzione sta anche rimodellando il rapporto tra le aziende e i clienti, che ora si aspettano dai propri brand preferiti un'esperienza utile e interattiva. Anche la sicurezza è motivo di preoccupazione. Azienda e clienti si scambiano un volume in continuo aumento di dati sensibili, aumentando i fattori di rischio.La trasformazione del mercato sta inoltre intensificando la concorrenza. Come osserva l'analista Mark Raskino, "Come conseguenza, tutti i contendenti hanno rielaborato le proprie strategie e si sono risvegliate alla potenza del business digitale nello stesso momento. Il conflitto è quindi inevitabile.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
La crescita aziendale è una priorità costante. In parallelo all’espansione dell’economia delle applicazioni, è probabile che stiate considerando iniziative di business digitale. Tra gli obiettivi più promettenti di una simile strategia:• Fornire esperienze digitali di qualità superiore ai consumatori attraverso il mobile • Ampliare mercati e flussi di ricavi attraverso canali multipli• Collegare dipendenti e partner ai dati aziendali, sempre e ovunque • Avviare nuovi servizi innovativi nel contesto dell'Internet of Things (IoT)La corretta esecuzione di una strategia digitale richiede la capacità di lanciare nuove applicazioni e coordinare la vostra presenza digitale con i partner. Le API (Application Programming Interface) generano la connettività necessaria per condividere i dati aziendali e i contenuti digitali con quelle applicazioni e con quei partner, tramite Internet. Le API sono una componente essenziale del business digitale: mettono gli sviluppatori in condizione di crear
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
L'avvento delle API (interfacce di programmazione delle applicazioni) rappresenta al contempo un'opportunità di business e una sfida tecnologica. Per i leader di business, le API sono un'occasione per generare nuovi flussi di ricavi e massimizzare il valore offerto ai clienti. Ricade però sugli architetti aziendali la responsabilità di creare API che consentano di riutilizzare i sistemi backend in nuove applicazioni web e mobile.È fondamentale che tutti gli stakeholder comprendano la stretta correlazione tra gli obiettivi aziendali e le sfide tecniche di un programma API. Spetta ai manager del programma la responsabilità di comunicare con chiarezza gli obiettivi di business primari delle API proposte agli architetti che poi realizzeranno materialmente l'interfaccia. Gli architetti devono invece focalizzarsi su tali obiettivi durante le fasi di implementazione dell'infrastruttura API e di progettazione dell'interfaccia stessa. Tutte le decisioni tecniche devono contribuire alla creazion
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nell'economia digitale, le API (Application Programming Interfaces) sono essenziali per concretizzare rapidamente le idee e approfittare delle nuove opportunità di business. Rappresentano la chiave per la digital transformation, consentendo alle aziende di offrire una customer experience eccezionale, creare nuovi flussi di ricavi e permettere a dipendenti, partner, app e device di accedere ai dati ovunque e in qualsiasi momento.Le API non sono necessariamente una nuova tecnologia, ma nel mondo digitale di oggi hanno assunto una particolare rilevanza in ogni aspetto del business. Questo ha accresciuto l'esigenza di implementare una soluzione di API Management realmente efficace. Ma quali sono le caratteristiche di una soluzione efficace?
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nel suo libro Psicologia della scienza, pubblicato nel 1966, lo psicologo americano Abraham Maslow analizzò la teoria secondo cui coloro che operavano in ambito psicologico necessitavano di un approccio alla cura da più punti di vista per favorire la genesi di nuove idee, senza limitarsi a utilizzare le stesse teorie e le medesime tecniche create da Freud e dai suoi seguaci in un passato ormai remoto. Partendo dal presupposto che può risultare difficile cambiare il proprio punto di vista, Maslow scrisse: "[...] La tentazione, se l'unico strumento che hai è un martello, è di trattare tutti i problemi come se fossero chiodi". Abbiamo fatto tutti questa esperienza. Siamo talmente abituati a fare le cose come si facevano in passato che a volte non ci chiediamo neppure più il motivo per cui continuiamo a farle oggi.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
En su libro publicado en 1966, “The Psychology of Science”, el psicólogo norteamericano Abraham Maslow abordó la idea de que los profesionales de la psicología necesitaban acometer sus métodos de tratamiento desde diferentes perspectivas para poder contar con ideas nuevas y no simplemente seguir usando las mismas teorías y técnicas creadas por Freud y sus seguidores tantos años atrás. Consciente de la posible dificultad de cambiar de punto de vista, Maslow escribió: “Si la única herramienta de la que se dispone es un martillo, es tentador abordarlo todo como si de un clavo se tratara”. Todos nosotros hemos vivido esta experiencia. Nos acostumbramos tanto a la manera en la que se han ido haciendo las cosas que a veces no nos cuestionamos las razones para seguir haciéndolo así.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
El crecimiento de su empresa es una prioridad continua. Además, a medida que la economía de las aplicaciones sigue creciendo, es probable que busque iniciativas de negocio digital para fomentar gran parte de dicho crecimiento. Algunos de los objetivos más prometedores de dicha estrategia son los siguientes: • Ofrecimiento de experiencias digitales superiores para consumidores a través de dispositivos móviles • Expansión de los flujos de mercados e ingresos a través de varios canales• Conexión de empleados y partners con los datos de la empresa en cualquier lugar y en todo momento • Lanzamiento de servicios nuevos innovadores en el Internet de las cosas (IoT)
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
El auge de la interfaz de programación de aplicaciones (API por sus siglas en inglés) representa una oportunidad de negocio y supone un reto técnico. Para los líderes empresariales, las API representan una oportunidad para abrir nuevos flujos de ingresos y maximizar el valor ofrecido al cliente. Sin embargo, los arquitectos empresariales son los encargados de crear las API que posibilitan la reutilización de sistemas back-end en las nuevas aplicaciones web y móviles. Resulta esencial que todos los implicados comprendan que los objetivos de negocio y los retos técnicos de un programa de API están estrechamente relacionados. Los gestores de los programas deben responsabilizarse de comunicar con claridad los objetivos de negocio clave de una API propuesta a los arquitectos que deberán construir la interfaz.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
En la economía digital, las interfaces de programación de aplicaciones (API) son esenciales para ejecutar ideas con rapidez y aprovechar nuevas oportunidades de negocio. Constituyen los pilares fundamentales de la transformación digital, ya que permiten a las organizaciones ofrecer experiencias de cliente excepcionales, crear flujos de ingresos nuevos y conectar a los empleados, los partners, las aplicaciones y los dispositivos con los datos en cualquier momento y lugar.Las API no son necesariamente una tecnología nueva, pero en el mundo digital actual, han adquirido mayor relevancia y se han vuelto importantes para todas las facetas de la empresa. A su vez, esto ha aumentado la demanda de una gestión de API eficaz. Ahora bien, ¿cómo es una solución eficaz?
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Nei Project Management Office di alcune delle aziende più importanti e affermate del mondo è in corso una trasformazione radicale. In qualità di provider di soluzioni globali di project and portfolio management, con clienti che includono più della metà delle aziende Fortune 100, CA Technologies si trova in una posizione unica per comprendere come questo cambiamento si sta evolvendo rapidamente nei vari settori.
Tags : 
cinque, pilastri, del, pmo, oggi
    
CA Technologies EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

Free Magazines

Hundreds of free magazines!