Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

enterprise it

Results 1 - 25 of 3852Sort Results By: Published Date | Title | Company Name
Published By: FNT     Published Date: Jan 29, 2018
This report contains a holistic perspective on key emerging markets in the enterprise IT space.
Tags : 
colo, colocation, datacenter, connectivity, cloud, multi-tenant data center, mtdc, hybrid it, fnt_white_papers
    
FNT
Published By: Server Technology     Published Date: Oct 11, 2016
For many enterprises, the data center powering their workflow is located someplace far removed from where the people using it are located. Typically the data center is either close to inexpensive power, or located in a facility that is off campus somewhere not necessarily convenient to those administering and using it. This brief explores remote power management as a way of ensuring that your data center works for you and not the other way around.
Tags : 
networking, it management, data center
    
Server Technology
Published By: QTS     Published Date: Oct 12, 2017
In every industry, IT professionals are watching their roles and objectives evolve rapidly. The world is now digital and data is at the core of how enterprises, governments and individuals manage their core functions. The impact of data is being felt beyond the IT department; it is reverberating through every aspect of our lives.
Tags : 
data center, cloud computing, software-defined, it infrastructure, telecom
    
QTS
Published By: Citrix     Published Date: Jul 14, 2016
This White Paper goes some way to finding a solution to your Data Center security problems. Citrix Netscaler, is the latest application delivery controller for building enterprise cloud networks. Today's enterprises can leverage their infrastructure to establishand extend a robust cost-effective for Nex Gen security. Download FREE today.
Tags : 
citrix_uk/eu, security, data center, cost effective, networking, it management, telecom
    
Citrix
Published By: Citrix     Published Date: Oct 07, 2016
For the digital enterprise, the advantages of a high-performing network are clear. A powerful network supports mobility and a remote workforce with digital media. It manages high volume and traffic peaks. It maintains up-time and security. We explore how Citrix have delivered clients business objectves
Tags : 
networking, security, data center, citrix_case_studie
    
Citrix
Published By: SimpliVity     Published Date: Jan 07, 2016
This Forrester Total Economic Impact ™ (TEI) study examines the return on investment (ROI) that enterprises realize by deploying SimpliVity technology. The study, which was commissioned by SimpliVity, found that customers who deployed SimpliVity hyperconverged infrastructure realized storage efficiencies of 60:1 on average, with a composite ROI of 224% and payback on their initial investment in just 6.6 months.
Tags : 
storage management, hyperconvergence, simplivity, convergence
    
SimpliVity
Published By: Interxion     Published Date: May 11, 2017
This briefing paper provides IT and business professionals with insights into the impact of the digital transformation on data center strategies. In particular, it argues that, in the cloud-mobile era, workload location matters more than ever and that placing workloads in colocation centers needs to be a component of the data center strategy of a Digital Enterprise.
Tags : 
colocation, enterprise, digital transformation, interconnection, networking, telecom, data center
    
Interxion
Published By: Panduit     Published Date: Apr 21, 2015
DCIM tools support the diverse needs of colocation providers, large enterprises/managed service providers and midsize enterprises. This research provides data center managers with insight into seven DCIM tools and their ability to support these three uses cases.
Tags : 
dcim tools, data center infrastructure
    
Panduit
Published By: Trend Micro     Published Date: May 11, 2015
Deep Security and Enterprise Security Suite increase visibility and defend against malware to secure VMware and mobile users
Tags : 
visibility, data center, networking
    
Trend Micro
Published By: Server Technology     Published Date: Dec 07, 2015
It has been obvious for some time that the power distribution system within the data center is the key opportunity to focus upon in order to actively manage the rising costs of power and more specifically, identify problems and waste in real-time. With future-thinking organizations sharing knowledge between Facilities and IT, the push for more intelligence within this rack-based power infrastructure has become urgent with higher rack power densities. In fact, proactive power management at all stages in the distribution chain within enterprise data centers has become the requirement to feed efficiency studies and data center infrastructure management (DCIM) style optimization initiatives.
Tags : 
data centers, power, pdus, dcim, data center design and management
    
Server Technology
Published By: Citrix     Published Date: Oct 07, 2016
Digital transformation is creating disruptive change across every major industry, with customer expectation driving rapid innovation. Using the case of a typical online retailer as an example, we demonstrate how technology enables enterprises to turn disruptive change into operational and competitive advantage.
Tags : 
networking, it management, telecom, data center
    
Citrix
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
It’s time to make working together what it should be—intuitive. Cisco Webex Teams enables teams to meet, create and communicate continuously on a single easy-to-use platform. Tools adapt, so teams don’t have to. The same page? Everyone is on it, no matter what device or apps they like to use or where they are. Innovation and work keep moving forward, even after a meeting ends. And everyone enjoys an exceptional experience safeguarded by enterprise-grade security no matter how big the business scales.
Tags : 
cisco, webex, collaboration
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 05, 2018
This Technology Spotlight highlights the tangible benefits achieved by early SD-WAN adopters across key use cases and outlines a vision for sustained ROI and value creation from the solution.This paper also looks at the role of Cisco in the strategically important SD-WAN market. SD-WAN has arisen as the WAN's response to the migration of enterprise apps to the cloud. As the march of enterprise apps to the cloud gathers momentum,it is inevitable that SD-WAN gets the spotlight.
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Box     Published Date: Jun 22, 2018
• Enterprise Content Management is a market in transition. And as demand for modernization becomes widespread, long-time leaders are investing in new capabilities to keep up — and bringing more of the market to the cloud to meet the needs of users and IT managers alike. • • This report shows how a range of providers measure up to help companies make the right choice when • requirements are skewed to the needs of information workers who need to create, collaborate on, share, and find enterprise content. • • Use the 2017 Forrester Wave™ report to: o Get educated. Gain an understanding of how the ECM market is changing and why complex, on-premises ECM suites are giving way to Cloud Content Management platforms like Box. o Define your needs. Forrester ranks the top 15 ECM business content vendors based on current offerings, strategy and market presence to help you evaluate vendors that suit your needs. o Select a vendor. Learn how cloud content management platforms like Box are designed
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
more people than ever before. Whether it's your employees, partners or customers, all your people use enterprise content. And that means content management is becoming increasingly top-of-mind — but companies find it difficult to get it right. In this newsletter, Gartner shares how cloud content management helps you build your content management strategy from the bottom up, enabling you to: o Improve company-wide collaboration and become more customer-centric o Scale your business and reduce cost o Provide security and stability for your entire organization • Download the full Gartner newsletter, Reshaping ECM: New Opportunities in the Cloud. You'll learn about the emerging requirements of top ECM vendors, as well as discover real-world use cases of Cloud Content Management.
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
• In today's ever-evolving world, content management is a moving target. With content flowing from a multitude of places, keeping up with the speed of business requires a content management strategy that's more flexible than traditional Enterprise Content Management (ECM). • As digital transformation forces organizations to rethink their processes, it's never been more important to focus on deploying a platform that works across all of your content so you can get more value out of each asset and protect yourself against technology stagnation. • Check out our ebook, 5 Considerations For Transforming Your ECM Strategy With Cloud Content Management, and learn how to bring your people and information together in the cloud.
Tags : 
    
Box
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Derzeit liegen nur wenige Daten dazu vor, wie effizient Unternehmen Private Clouds in der Praxis implementieren. Gehen sie effizient vor oder stehen sie in Bereichen wie Leistung, TCO und Kapazität gewissen Herausforderungen gegenüber? Hewlett Packard Enterprise hat 451 Research beauftragt, diese Themen mithilfe einer Befragung von IT-Entscheidungsträgern und von Daten aus dem Cloud Price Index zu erforschen.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The moats and castle approach is an antiquated, yet a common way, of protecting the enterprise network. This paper describes a new way to protect the enterprise which hides applications from the Internet, outside of the firewall, with zero open ports and a minimal attack surface.
Tags : 
security, enterprise security, eaa
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : 
vpn, proxies, security, security breach, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
dns, cybersecurity, malware, phishing, ransomware, data exfiltration
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : 
security, perimeter security, zero trust, cloud, enterprise security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: DigiCert     Published Date: Jun 19, 2018
Code signing is at a crossroads. In many enterprises, the traditional approach remains standard procedure: you purchase a code-signing certificate, download it, and deploy it locally for all your code-signing needs. When carefully managed, this approach can still be very effective in guarding against malware. But recent events have shown that many companies are finding it a challenge to manage their code signing certificate deployments—and failures in certificate management can have serious consequences. To discover how our Secure App Service solution can help you manage your codesigning efforts and provide enterprise-level support, all at a predictable cost, download this whitepaper today and find out more.
Tags : 
    
DigiCert
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.