Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it environments

Results 101 - 125 of 888Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
Cisco
Published By: Webroot     Published Date: Nov 02, 2012
This paper examines the different endpoint security methods for virtualized environments and presents how Webroot® SecureAnywhereTM Business - Endpoint Protection security provides optimal performance, protection and manageability.
Tags : 
endpoint security, virtualization, virtualized environments, security
    
Webroot
Published By: VMWare - vFabric     Published Date: May 10, 2012
Learn how SQLFire's speed and scale make it perfect for app development while its simple linear scalability makes it the perfect database to run in virtualized environments.
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, sqlfire, applications, app development, scalability, databases, networking
    
VMWare - vFabric
Published By: Panasonic     Published Date: Aug 04, 2016
Maximizing productivity in challenging work environments is not easy, and that’s why selecting the right mobile computing solution is crucial. It’s not enough to simply hand your workers or technicians any mobile device; if the hardware can’t operate reliably in their typical work environment, they might as well be working with pen and paper.
Tags : 
mobile computing, best practices, productivity, mobile device
    
Panasonic
Published By: HP Inc.     Published Date: Feb 03, 2016
IT decision-makers weigh in Securing computers and their data against cyber-attacks and malicious applications is imperative in today’s business environments. IT professionals know this. But which methods are they using to secure laptops and desktops, and just how effective are these methods? See what 650 IT decision-makers had to say.
Tags : 
    
HP Inc.
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover the best practices for securing and protecting your Hybrid IT environments from HPE’s Advisory Consulting services. Businesses and organizations are building new hybrid infrastructures to deliver new IT services that require agility, resiliency and security. Success will require more automation, integration and end-to-end visibility supported by threat intelligence and threat analytics. This blueprint provides proven strategies and approaches based on the IT digital transformation experience and many customer engagements. It will help customers determine where to start and how to approach this topic
Tags : 
    
Hewlett Packard Enterprise
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Published By: Juniper Networks     Published Date: May 04, 2018
Business leaders are eager to leverage new technologies, and IT leaders can't afford to fall behind. Hybrid IT environments take advantage of private and public clouds but need enhanced security, automation, orchestration, and agility.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: May 04, 2018
PwC surveyed 235 IT leaders and interviewed another 35 from large, medium, and small enterprises to understand the buying decisions of IT leaders, across a wide variety of networking components (i.e., switches, SDN, and infrastructure monitoring solutions) within the data center. This report highlights the survey and interview insights to help Enterprise IT leaders understand the trends and implications of multi cloud environments.
Tags : 
    
Juniper Networks
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
    
Oracle APAC
Published By: Oracle APAC     Published Date: May 24, 2018
By optimizing their on-premises IT environments and moving processes and workloads to the cloud, businesses can reduce time-to-market, increase agility, and minimize total cost of ownership. Oracle’s Linux and Virtualization offerings are designed to help you easily optimize your current on-premises environment, and offer a clear path to cloud—so you can migrate your workloads when the time is right.
Tags : 
    
Oracle APAC
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics, integrated mitigation
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
cloud security, cloud management, it protection, api integration, credential verification, security efficiency
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
    
CA Technologies
Published By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : 
data security, data management, mobile security
    
Adobe
Published By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : 
data security, data management, mobile security
    
Adobe
Published By: Mimecast     Published Date: Oct 17, 2013
This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.
Tags : 
mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365, extensive use of email, primary file transport, content management systems, reduced employee productivity, extended productivity loss, it disruption, security management risks, content management risks
    
Mimecast
Published By: Riverbed     Published Date: Jul 17, 2013
To deliver IT performance, you need complete visibility. Riverbed Cascade offers a superior network performance management solution for discovering, monitoring and troubleshooting your network and your critical applications. Now you can resolve performance problems before they impact the business, while lowering your IT management costs. Cascade has an elegant and simple design that deploys easily in complex environments and provides true integration across the Cascade family. This cleaner architecture means superior visibility, management and troubleshooting, saving our customers both capex and opex. According to IDC, Cascade customers typically experience an 83% reduction in mean time to resolution (MTTR)
Tags : 
it performance, cascade, riverbed cascade, riverbed, it management, mttr, idc, infrastructure, ip networks, local area networking, network architecture, network management, network performance, network performance management
    
Riverbed
Published By: Riverbed     Published Date: Jul 17, 2013
Enterprises are rapidly adopting virtualization for dynamic service delivery and service management agility. IT challenges already exist in virtual environments and will only be exacerbated with the higher adoption of virtualization. The ability to proactively monitor traffic within these environments is critical for enabling predictable and reliable delivery of applications and for troubleshooting diverse IT infrastructures. Read this white paper to learn more.
Tags : 
traffic, virtualization, it infrastructures, bandwidth management, infrastructure, local area networking, monitoring, network architecture, network management, network performance, network performance management
    
Riverbed
Published By: Schneider Electric     Published Date: Oct 17, 2016
This white paper compares the cost of both scenarios, presents the advantages and disadvantages of each, and identifies which environments can best leverage the facility module approach.
Tags : 
    
Schneider Electric
Published By: NetApp     Published Date: Feb 15, 2017
How can hybrid-flash array users benefit from a move to all-flash? This case study profiles a large European organization that moved their VMware server and desktop environments from hybrid-flash to NetApp AFF all-flash systems
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Kaminario     Published Date: May 05, 2016
This IDC Buyer Case Study reviews how Cobb EMC, a regional not-for-profit electric utility company serving the greater Atlanta metropolitan area, addressed evolving IT infrastructure requirements with flash storage technology to improve performance and substantially improve IT efficiencies. This Buyer Case Study explores what drove Cobb EMC's initial interest in flash, how flash deployment has evolved in the company's environments, how the deployment has impacted its business, and what future plans exist for AFAs at Cobb EMC.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, infrastructure
    
Kaminario
Published By: Puppet     Published Date: Mar 09, 2017
System administrators and other IT practitioners spend as much as 50% of their time on routine, repetitive tasks. Does the following apply to your organization? • You go from one server to the next, installing the same package on all of them. It works nine times out of 10, but the tenth time causes a failure ... and you can't identify what went wrong. • You can't scale. When the business wants to move to the cloud, or asks for faster provisioning of development and test environments, you only have so many hours in the day — and you can't meet everyone's needs. • You don't have time to get to the work that matters. You spend too much time on routine system management, and can't prepare for the projects that will bring real business value to your team — and customers. With growing demands from all corners of your organization, you simply can't keep doing it all manually. Download this paper to learn how you can benefit from automation, and how IT infrastructure can become a strategic ass
Tags : 
    
Puppet
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.