Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

cloud tools

Results 1 - 25 of 223Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Sep 12, 2019
Applications are the modern lifeblood of the enterprise, and the desire to keep up with market demands has elevated most enterprise IT strategies from purely on-premises to hybrid and multi-cloud. But the desire to be even more agile and productive—and connect with end users in new and exciting ways—is pushing investments even further into new application environments, development processes, and management tools all leveraging cloud-native technology. In this executive brief, we home in on one component of the cloud-native movement, Kubernetes, and break down its role in achieving enterprise agility, experimentation, and innovation for competitive gain.
Tags : 
    
VMware
Published By: Red Hat     Published Date: Jun 26, 2019
When any organization starts planning for cloud-native applications, it is important to consider the entire time span: from selecting a development platform until an application is truly production-grade and ready for delivery in the cloud. It can be a long journey, with many decisions along the way that can help or hinder progress. For example, at the beginning of a move to cloud-native development, it is easy for inefficiencies to occur if developers begin selecting tools and frameworks before they know where the application will be deployed. While enterprise developers want choice of runtimes, frameworks, and languages, organizations need standards that address the entire application life cycle in order to reduce operational costs, decrease risks, and meet compliance requirements. Organizations also want to avoid lock-in, whether it is to a single provider of cloud infrastructure or the latest architectural style. In addition, given the steep learning curve in cloud development, con
Tags : 
    
Red Hat
Published By: NetSpi     Published Date: Sep 20, 2019
The cloud has become a valued part of modern infrastructure and there are now more resources than ever to help organizations secure their cloud environments. Even with all of the available tools and resources, there are still a million ways to configure services incorrectly. Public and non-public breaches seem to happen weekly and the maturity of the information security program doesn’t seem to influence the likelihood of the breach. One easy mistake in a cloud environment can be disastrous and it’s reasonable to be concerned when a new breach report hits the news. Just like anything in security, there are no magic bullets, but to help address these concerns, NetSPI recommends some general guidelines to help get ahead of the cloud security curve. These are general best practices that could be applied to any portion of your IT environment, but it’s good to keep these in mind while working with the cloud.
Tags : 
    
NetSpi
Published By: Gigaom     Published Date: Oct 24, 2019
A huge array of BI, analytics, data prep and machine learning platforms exist in the market, and each of those may have a variety of connectors to different databases, file systems and applications, both on-premises and in the cloud. But in today’s world of myriad data sources, simple connectivity is just table stakes. What’s essential is a data access strategy that accounts for the variety of data sources out there, including relational and NoSQL databases, file formats across storage systems — even enterprise SaaS applications — and can make them all consumable by tools and applications built for tabular data. In today’s data-driven business environment, fitting omni-structured data and disparate applications into a consistent data API makes comprehensive integration, and insights, achievable. Want to learn more and map out your data access strategy? Join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and special guests, Eric
Tags : 
    
Gigaom
Published By: AWS     Published Date: Oct 07, 2019
As companies like yours scale their cloud environment, the question has evolved from “what do I need to protect” to “how do I control and monitor what I am responsible for?” Many companies, especially those who are born on the cloud, or who are more cloud-mature understand the Shared Responsibility Model. Now, they are focusing on building a strategy that gives them greater control and visibility of their cloud environment. Gartner reported that “In 2018, the 60% of enterprises that implement appropriate cloud visibility and control tools will experience one-third fewer security failures.” Having the right monitoring strategy is beneficial for multiple reasons, and this eBook will detail how OneLogin implemented it in their AWS environment, and why you should consider implementing it in yours.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Discover HPE OneSphere, a hybrid cloud management solution that enables IT to deliver private infrastructure with public-cloud ease. With the proliferation of self-service, on-demand infrastructure, enterprise developers have come to expect infrastructure as a service. However, the constraints of existing infrastructure and tools make this mean heavier workloads for IT teams.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco EMEA     Published Date: May 15, 2018
Your employees, customers, and partners need the ability to connect and collaborate, at any time, from any location—across time zones or simply across the conference table. And those workplaces are expanding faster than ever, powered by mobile and cloud usage that makes virtual meetings essential. With scalable and secure voice, video, and content sharing, real-time collaboration can happen anywhere. Staying connected can lead to improved productivity and faster decision-making, as well as better customer service. But only if the technology offers a seamless experience and is intuitive enough to drive user adoption. While the need for better meetings is universal, not all conferencing tools are the same. Choosing the wrong tool could actually decrease productivity by wasting valuable meeting time troubleshooting the technology, or by providing a negative experience that will deter users from embracing it. This is especially true in situations where poor meeting quality could impact
Tags : 
    
Cisco EMEA
Published By: Cisco     Published Date: Jun 21, 2016
Enterprises are leveraging advancements in what IDC calls “3rd Platform” technologies — cloud, Big Data, mobility, and social — to create new business opportunities and gain competitive advantage. These trends are putting more pressure on IT organizations to transform their datacenter operations to better support business initiatives aimed at reducing costs, increasing revenue, and strengthening customer relationships. This has driven increased demand for converged or integrated systems that provide the tools needed to reduce capital costs, improve operational efficiencies and, ultimately, increase agility within the datacenter.
Tags : 
    
Cisco
Published By: Epicor     Published Date: Sep 20, 2017
More than ever, businesses are considering a cloud solution for their enterprise resource planning (ERP) deployment over an on-premises system. Cloud technology appeals to these companies because updates and fixes occur automatically with little or no effort from internal IT staff, and because cloud-based solutions provide access to real-time data from anywhere. Employees want tools that make it easier for them to complete everyday tasks and make informed decisions that help the business grow. Aberdeen’s research report, “Top Performers Know It’s Time to Migrate to Cloud ERP: Here’s Why and How,” uncovers the reasons successful companies are choosing cloud over on-premises ERP models. Download this SmartBite for a quick look at the report’s highlights.
Tags : 
    
Epicor
Published By: Oracle     Published Date: Oct 20, 2017
With cloud, mobile and all the new tools & frameworks that come with them, application development has never been so easy – or so hard. Join leading application development expert Mark Driver of Gartner as he answers your most pressing questions, including: What is the impact of lightweight and scripting applications traditional IT process? How has app development changed with the rise of cloud computing? How has mobile development changed expectations of developers and the apps they build?
Tags : 
    
Oracle
Published By: Dialpad     Published Date: Apr 19, 2016
Workplace expectations are changing and companies are ditching outdated technology in favor of flexible, cloud-based services, freeing their employees to work from anywhere. From modern office spaces to popular business tools, this eBook breaks down the top trends of the workplace revolution, including: 1. The age of Millennial workers 2. Modern workspaces 3. Improving employee productivity and satisfaction 4. The rise of remote work
Tags : 
communication, internet, network management, best practices, business intelligence, business management, mobile, content management
    
Dialpad
Published By: VMware     Published Date: Feb 24, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration.
Tags : 
    
VMware
Published By: Riverbed     Published Date: Jan 25, 2018
Applications underpin today’s cloud and digital transformation initiatives. As a result, it’s imperative for modern IT organizations to implement a holistic, expert approach to managing applications for maximum performance and optimal business execution. Read this insights paper from ESG and Riverbed to discover: How performance management expertise drives critical business outcomes. Why mature organizations are better equipped to embrace DevOps and other modern IT practices. What tools, factors, and behaviors correlate to expert performance management practices.
Tags : 
    
Riverbed
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dome9     Published Date: Apr 25, 2018
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Companies are increasingly moving data and applications to public cloud platforms. Sometimes these transitions happen with IT’s approval and guidance; sometimes they don’t. Regardless, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. It’s difficult to gain visibility and control of the security posture when the organization relies on an assortment of disparate cloud platforms that all take different approaches to security and offer different tools. And it’s hard for a small security staff to stay on top of disparate solutions that fail to integrate.
Tags : 
    
Fortinet EMEA
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco
Published By: Dell     Published Date: May 04, 2015
Read this white paper and learn how: • Cloud technology bridges the gap between IT and the business, but on-premises cloud deployments often offer a lower TCO than the public cloud. • Dell enables organizations to create and manage cloud solutions customized to unique needs. • Organizations have several options for building a cloud infrastructure based on Dell solutions. • In the realm of cloud computing, Dell differentiates itself through servers, storage, networking, and integration with infrastructure and management tools. • Implementing a cloud environment requires stakeholder identification, as well as resources and capabilities.
Tags : 
    
Dell
Published By: Cisco     Published Date: Jun 21, 2016
Enterprises are leveraging advancements in what IDC calls “3rd Platform” technologies — cloud, Big Data, mobility, and social — to create new business opportunities and gain competitive advantage. These trends are putting more pressure on IT organizations to transform their datacenter operations to better support business initiatives aimed at reducing costs, increasing revenue, and strengthening customer relationships. This has driven increased demand for converged or integrated systems that provide the tools needed to reduce capital costs, improve operational efficiencies and, ultimately, increase agility within the datacenter.
Tags : 
    
Cisco
Published By: Avaya     Published Date: Feb 06, 2015
This White Paper provides information on how mobile, cloud and UC make perfect business sense. When everyone works together, things get done. Decisions are made faster, actions are taken effectively, and results improve. That’s why tomorrow’s market leaders are acting now to harness the power of Unified Communications and Collaboration tools and unleash the potential of their business.
Tags : 
unified communications, managing uc, uc becoming more powerful and useful
    
Avaya
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.