Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

broker

Results 51 - 75 of 97Sort Results By: Published Date | Title | Company Name
Published By: VSS Monitoring     Published Date: Apr 01, 2015
In May 2014 VSS Monitoring announced a significant expansion of its solution portfolio for providing packet visibility into high-speed 40G and 100G enterprise and service provider networks. With the release of the vBroker 6000 and vBroker 520, the company took aggressive and definitive steps to deliver high-performing solutions for high-density carrier and cloud infrastructure deployments and 100G transitions, allowing IT organizations to maintain operations monitoring and security integrity throughout upgrades to and new deployments of extreme high-speed networks.
Tags : 
ema, vss, 100g, visibility solutions, nvc, npb, it management
    
VSS Monitoring
Published By: Dell EMC     Published Date: May 29, 2015
EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together - This Analyst Report addresses the challenge of managing and administering both on-premises private cloud and off-premises public cloud models together. The EMC Enterprise Hybrid Cloud solution simplifies deployment of a hybrid cloud operating model, enabling IT to become a broker of trusted cloud services sourced from on-prem private clouds and off-prem public clouds, enabling IT to support the ever-expanding set of workloads their business requires.
Tags : 
cloud service, applications, workload, big data, software, hardware, portal, cloud computing
    
Dell EMC
Published By: Dell EMC     Published Date: Jul 27, 2015
EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together - This Analyst Report addresses the challenge of managing and administering both on-premises private cloud and off-premises public cloud models together. The EMC Enterprise Hybrid Cloud solution simplifies deployment of a hybrid cloud operating model, enabling IT to become a broker of trusted cloud services sourced from on-prem private clouds and off-prem public clouds, enabling IT to support the ever-expanding set of workloads their business requires.
Tags : 
enterprise hybrid cloud, cloud solutions, it solutions, private cloud, hybrid cloud operating model, cloud services
    
Dell EMC
Published By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The widespread adoption of cloud services has resulted in sensitive data assets being stored in cloud services. This solution brief takes a deep dive of McAfee’s unified approach to data security that protects both on premise and cloud-resident data from loss and to meet and maintain compliance
Tags : 
unified data protection, data protection, cloud adoption, cloud vsibility, cloud data protection, cloud access security broker, shadow it
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
    
McAfee
Published By: Sponsored by HP and Intel®     Published Date: May 10, 2013
Thanks to the emergence of cloud computing, it’s no longer possible for IT departments to be just a builder and manager of technology; you must also now be a broker of IT services across the enterprise. Consequently, you need to design an IT environment that offers the flexibility, efficiency, and security to meet these expectations and aligns services with business needs. This is a task that’s best achieved by striking a balance among IT domains, spanning traditional internal IT, private, and public cloud environments. But how do you achieve the right IT balance for delivering cloud services? Read this white paper to find out. To Learn about the HP Discover 2013 event in Las Vegas, click here: http://bit.ly/PTt3yD Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
it environment, cloud, all about service, it departments, it services
    
Sponsored by HP and Intel®
Published By: AcquireWeb     Published Date: Apr 07, 2008
This opinion piece, published by DM News in November 2007, addresses a common but less talked about problem with email marketing – over-mailing to positively effect otherwise mediocre results; which is likely the result of an acquisition email provider using a compiled response file, and guaranteeing high open and click rates in addition to a positive ROI. This article provides insight on what the marketer, broker or agency can do to ensure they are maximizing the ROI from a given campaign, while disincentivizing over-sending behavior.
Tags : 
email, conversion, conversion testing, email marketing, frequency, overdelivery, over-delivery, acquireweb, email marketing campaign, email campaign, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing
    
AcquireWeb
Published By: RingCentral     Published Date: May 14, 2013
Amerivest Realty - real estate in Naples, Florida; Is a full service brokerage firm that provides clients with a quality home-buying experience. Amerivest represents hundreds with quality homes, condos, and investment properties. By providing associates with a full suite of technology enabling them to do their jobs more efficiently, Amerivest serves clients on an elite level. Read this case study to learn why they turned to RingCentral when they were looking to expand their presence in new areas with a new telephone system.
Tags : 
case study, ringcentral, telephone system, service clients, business telephone systems
    
RingCentral
Published By: HP Software     Published Date: Oct 19, 2015
Delight users with systems of engagement
Tags : 
service support, systems, operations, service broker
    
HP Software
Published By: LifeLock     Published Date: Feb 24, 2017
If you’re not offering identity theft protection services as part of your portfolio, your competition could be.
Tags : 
    
LifeLock
Published By: Hewlett Packard Enterprise     Published Date: Jul 20, 2016
With many enterprises implementing a hybrid cloud environment to move applications to cloud, IT organizations must establish a decision-making framework for evaluating, deploying, and operating applications in the cloud. Businesses need to be able to deliver applications in the right way and on the right cloud, so IT organizations seek insight into setting policies for the best placement of applications across different cloud options. In this report, Gartner offers analysis and recommendations for moving traditional apps to private cloud and for brokering and managing apps across different private and public cloud options.
Tags : 
technology, best practices, cloud computing, infrastructure, best practices
    
Hewlett Packard Enterprise
Published By: HPE_OMG_7.16     Published Date: Jul 22, 2016
With many enterprises implementing a hybrid cloud environment to move applications to cloud, IT organizations must establish a decision-making framework for evaluating, deploying, and operating applications in the cloud. Businesses need to be able to deliver applications in the right way and on the right cloud, so IT organizations seek insight into setting policies for the best placement of applications across different cloud options. In this report, Gartner offers analysis and recommendations for moving traditional apps to private cloud and for brokering and managing apps across different private and public cloud options.
Tags : 
technology, best practices, cloud computing, infrastructure, best practices, business intelligence, business management
    
HPE_OMG_7.16
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
BlackBerry Cylance
Published By: Cisco     Published Date: Sep 07, 2016
This white paper discusses how the data broker along with Cisco Nexus 9000 Series Switches integrates with Cisco Application Centric Infrastructure to provide fabric traffic visibility for security, monitoring, and operations purposes.
Tags : 
    
Cisco
Published By: IBM     Published Date: Nov 22, 2014
In this first-release MQ, Gartner evaluates providers on service delivery, B2B Network/Collaboration, Integration Functionality and success in capitalizing on vision. Rated against an extensive 15-criteria evaluation, IBM earned one of only three Leader positions, and outpaced the competition in "completeness of vision," signifying our strength in delivering the most competitive solution to the marketplace.
Tags : 
integration brokerage, supply chain management, service delivery, integration functionality, b2b, it management, enterprise applications
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: IBM     Published Date: Oct 17, 2014
In this first-release MQ, Gartner evaluates providers on service delivery, B2B Network/Collaboration, Integration Functionality and success in capitalizing on vision. Rated against an extensive 15-criteria evaluation, IBM earned one of only three Leader positions, and outpaced the competition in "completeness of vision," signifying our strength in delivering the most competitive solution to the marketplace.
Tags : 
integration brokerage, service delivery, integration functionality, competitive solutions, it management
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
CASBs provide CISOs with a critical control point for cloud service visibility, security and compliance. Use Gartner CASB frameworks to support continuous cloud service discovery, adaptive access, verification, protection and the prioritization of CASB evaluation criteria.
Tags : 
ibm, gartner, cloud, cloud security, casb, ciso, security, cloud computing
    
IBM
Published By: IBM     Published Date: Dec 07, 2016
This IBM Redguide™ publication introduces Cloud Brokerage and highlights the business value of the solution. It provides a high-level architecture, identifies key components of the architecture, and discusses the hybrid cloud implementation framework, which includes other IBM product offerings. The guide describes example scenarios that use Cloud Brokerage to resolve common business problems.
Tags : 
ibm, cloud, broker, ibm cloud brokerage, broker software, enterprise applications
    
IBM
Published By: IBM     Published Date: Dec 07, 2016
IBM Cloud Brokerage lets you plan, buy and manage software and cloud services from multiple suppliers from a single dashboard.Get where you need to go and avoid costly mistakes. Navigate your path to IT as a Service.
Tags : 
ibm, cloud, broker, ibm cloud brokerage, broker software, hybrid cloud, enterprise applications
    
IBM
Published By: IBM     Published Date: Dec 07, 2016
Accelerate digital transformation through cloud brokerage. Our experts explain why Cloud is changing & using the technologies in business.
Tags : 
ibm, cloud, broker, ibm cloud brokerage, broker software, enterprise applications
    
IBM
Start   Previous    1 2 3 4    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.