Applications Whitepapers


Sort by: Date | Company | Title


Application Usage and Threat Report
By Palo Alto Networks | 5/1/2015
The Application Usage and Threat Report (June 2014) provides a global view into enterprise application usage and the associated cyber threat landscape. Accomplished by summarizing network traffic assessments conducted across more than 5,500 organizations worldwide between March 2013 and March 2014. This version of the report will analyse the relationship between threats and their application vectors. The most surprising data points being both the diversity of applications displaying threat activity and the high concentration of activity surrounding only a few key techniques.
Download this now


The new rules of enterprise mobility
By IBM Australia | 28/11/2014
This white paper outlines the driving forces behind businesses establishing corporate application stores, the benefits of such an approach, and what to seek in a solution that supports this strategy. • The next wave of mobility is coming at us in the form of mobile applications. • Savvy companies are deploying commercial and custom mobile applications for their lines of business • Organisations must devise a viable strategy for managing the applications that employees will use on mobile devices
Download this now


A simplified application acceleration architecture
By F5 Networks | 12/11/2014
This whitepaper gives an overview of networks and applications, describes basic principles of web application optimization, and then examines the benefits and drawbacks of various acceleration techniques to ultimately improve web application performance. •Most organisations want to improve web application performance for their users, but they can’t always justify the cost of implementing acceleration techniques •A simplified web application acceleration solution that lowers the operational and commercial barriers and improves user experience is idea •F5 offers a simple, low-risk, and low-cost acceleration solution that can significantly improve the end-user experience
Download this now


Redefine flash- Flash is transforming the way we think about storage.
By EMC Corporation | 1/9/2014
This helpful infographic details how Flash is transforming the way we think about storage and enabling innovation across IT, plus helps readers choose the best solutions for their business. Flash allows a new breed of applications, speed, leaner costs, and model efficiency Flexible options allow organizations to bring enterprise-level availability to mission critical, performance-intensive applications Experiencing the full effect of Flash depends on having the right architecture
Download this now


Facebook Secures Remote Access and Speeds Citrix XenApp Applications
By F5 Networks | 13/7/2014
Facebook, the world’s largest social networking site, needed to ensure that its remote access portal and Citrix XenApp virtual application environment could provide fast, reliable connectivity and Performance—without becoming a pathway for network intrusion and data theft. Read More
Download this now


Solve the application visibility challenge
By Citrix Systems Asia Pacific | 2/6/2014
The ability to observe, diagnose, and improve the performance of business-critical applications is essential to ensuring a positive user experience. This whitepaper discusses how enterprises can leverage existing application delivery controllers for both instrumentation and policy enforcement.
Download this now


From Infrastructure to Applications: The Future of IT is On-Demand
By CA Technologies | 29/5/2014
In this report From Infrastructure to Applications: The Future of IT is On-Demand Network World evaluates how IT departments are employing disruptive virtualisation and cloud computing approaches to support business growth and move IT into a value-adding profit centre.
Download this now


Securing the Mobile Cloud Connected Enterprise
By CA Technologies | 29/5/2014
The rise of mobile users and apps, coupled with the continued growth in SaaS, has transformed traditional business environments. Identity is the new perimeter. Learn what you can do with a centralized Identity Access Management (IAM) service across this hybrid IT environment.
Download this now


Enabling and Protecting the Open Enterprise
By CA Technologies | 29/5/2014
A decade or so ago, security wasn’t nearly as challenging as it is today. Users, data and applications were all centralized in data centers that, in effect, kept them contained within a network perimeter. This eBook outlines how the open enterprise has changed the role of security.
Download this now


TechInsights Report: What Smart Businesses Know About DevOps
By CA Technologies | 29/5/2014
Smart companies use DevOps to speed the rollout and quality of new apps and services to market. Read this report to see the findings from a survey of 1300 global IT leaders, including the real benefits a good DevOps strategy can bring to your business.
Download this now

Top Whitepapers

Featured Whitepapers