What is the most used and powerful application in the Enterprise IT environment? Okay, the title of this article is what the FBI might call a clue. Seriously though, the modern browser is essentially an OS within your OS, minus … ...
Read moreEnhanced Visibility = Enhanced Security Does your ITOM visibility stop at the application layer? That used to make sense when applications were locked down in the intranet. However, most applications are now accessed via a browser, leaving IT managers and … ...
Read moreHappy New Year everyone. Here’s to hoping you’re all ready to tackle the challenges 2017 has in store. This is the time of year many people publish their forecasts and prognostications, so there are plenty of opinions out there as … ...
Read moreThe browser is now the core platform for end user workloads in the enterprise, with web applications outnumbering native Windows applications by 12:1. Yet modern IT organizations like yours lack the tools to properly manage this critical component of the … ...
Read moreWe recently released Ion 3.5, which delivers a huge leap forward in Ion’s ability to manage Java. In this post, we’ll drill deeper into the value Ion 3.5 delivers for any organization using Java in business-critical web applications. There are … ...
Read moreToday, Java is part of nearly every organization’s ‘standard’ desktop image, often used for mission-critical business applications. And Java usage is prevalent beyond with the enterprise as well. Oracle claims more than 3 billion devices are running Java globally. That large … ...
Read moreUpdate December 12: The video and Q&A from the December 10th webinar are now available. Join us next week for a 30-minute webinar featuring Browsium founder Matt Heller. Matt will discuss how Browsium Ion can help your enterprise keep current with … ...
Read moreSoftware, unlike fine wine, doesn’t get better with age. In fact, software doesn’t age well at all. A product that was great one day is hopelessly outdated the next. In that way, software is much more like milk than wine. … ...
Read moreConsumers generally access all content from the Internet, where the default security assumption should be that content is untrusted and barriers should be provided to protect the user’s system. Therefore most modern web browsers default to security settings that are … ...
Read moreJava is having a bad year. We’re barely three months into 2013 and there have been several security updates to Java 7, each one addressing issues discovered only hours or days after the previous security hole had been contained. At … ...
Read more