Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it environments

Results 326 - 350 of 887Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Dec 13, 2017
Security teams face sophisticated attacks that ‘hide in plain sight’ and often dwell in customer environments as long as 190 days1. And attackers increasingly employ stealthy techniques to move freely within a customer environment like using stolen credentials to masquerade as legitimate users. There has been a marginal decline in zero-day discoveries and an increase in ‘living off the land’ tactics that don’t rely on the traditional combination of vulnerabilities followed by malware. These tactics are more difficult to detect since they make use of legitimate tools.
Tags : 
security, software, detection, network
    
Symantec
Published By: IBM     Published Date: Jul 02, 2018
After several years of relentless hardware and software innovation, the mainframe is at an inflection point from being a supporting platform of transaction revenue to becoming a source of revenue growth and innovation. Organizations are evolving toward what IDC calls the “connected mainframe.” The platform is transforming from a revenue-supporting machine into a revenue-generating machine and is increasingly playing a central role in organizations’ digital transformation (DX) journey. Key steps in achieving the connected mainframe require organizations to modernize and integrate the platform with their internal and external environments. IDC finds that these modernization and integration initiatives lead to new business innovations, which in turn are driving revenue growth and improving organizational operational efficiency.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Across enterprises of all kinds, data is multiplying rapidly in both quantity and variety. Across multi-cloud environments, new sources are exponentially increasing the growing stream of information, including the Internet of Things, social media, mobile devices, virtual reality implementations and optical tracking.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 15, 2018
The enterprise data warehouse (EDW) has been at the cornerstone of enterprise data strategies for over 20 years. EDW systems have traditionally been built on relatively costly hardware infrastructures. But ever-growing data volume and increasingly complex processing have raised the cost of EDW software and hardware licenses while impacting the performance needed for analytic insights. Organizations can now use EDW offloading and optimization techniques to reduce costs of storing, processing and analyzing large volumes of data. Getting data governance right is critical to your business success. That means ensuring your data is clean, of excellent quality, and of verifiable lineage. Such governance principles can be applied in Hadoop-like environments. Hadoop is designed to store, process and analyze large volumes of data at significantly lower cost than a data warehouse. But to get the return on investment, you must infuse data governance processes as part of offloading.
Tags : 
    
Group M_IBM Q418
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
Is your WLAN under increasing pressure from more users, more types of connected devices, and more bandwidth-intensive applications? It’s time to consider a better solution. With Ruckus Cloud Wi-Fi you get simple, centralized cloud-based management and the best performing Wi-Fi access points for high-density environments. Your job gets easier and your Wi-Fi gets better. Get visibility and control of your distributed Wi-Fi network with bandwidth to spare.
Tags : 
    
Ruckus Wireless
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: SEMrush     Published Date: Nov 29, 2018
In highly competitive environments like the modern marketplace, obtaining accurate and timely data can make real the difference between keeping tabs on, getting ahead of, or being left behind the competition. Download now to learn more!
Tags : 
seo, semrush, e-commerce, market analysis, strategy
    
SEMrush
Published By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
As the foundation for most critical business decisions, today's data environments are not just a vital piece of IT infrastructure, but key component of corporate strategy.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 04, 2019
As more companies transform their infrastructures with hybrid cloud services, they require environments that protect the safety of their intellectual property, such as data and business rules. In addition, businesses need a set of hybrid cloud services that provides the best of both worlds: the elasticity and automatic provisioning of the public cloud with the economic viability of the private cloud. Welcome to IBM LinuxONE.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
IBM Institute for Business Value report discussing how multicloud environments are proliferating in surveyed organizations, the benefits of multicloud management and an approach to managing multicloud environments
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q3'19     Published Date: Jul 01, 2019
This white paper considers the pressures that enterprises face as the volume, variety, and velocity of relevant data mount and the time to insight seems unacceptably long. Most IT environments seeking to leverage statistical data in a useful way for analysis that can power decision making must glean that data from many sources, put it together in a relational database that requires special configuration and tuning, and only then make it available for data scientists to build models that are useful for business analysts. The complexity of all this is further compounded by the need to collect and analyze data that may reside in a classic datacenter on the premises as well as in private and public cloud systems. This need demands that the configuration support a hybrid cloud environment. After describing these issues, we consider the usefulness of a purpose-built database system that can accelerate access to and management of relevant data and is designed to deliver high performance for t
Tags : 
    
Group M_IBM Q3'19
Published By: Workplace by Facebook     Published Date: Jun 24, 2019
As the generation that pioneered the social media persona, Gen Y aren’t known for fading into the background – the average Gen Yer juggles four different social media accounts, crafting individual personalities on each. But despite their desire to stand out, today’s young people are especially keen to work together; so much so that 40% would even pay out of their own pocket for social collaboration tools at work Despite this, workplaces aren’t always giving them the tools they need to work effectively with one another. While 38% of Gen Y feel that outdated modes of collaboration obstruct a company’s ability to innovate, 71% say they face challenges using their company’s collaboration tools. As a result, they’re taking it upon themselves to create collaborative working environments, share innovative ideas and embrace the diversity of thought that comes along with it. Download this report to find out what Gen Yers expect from their workplaces today.
Tags : 
    
Workplace by Facebook
Published By: CyrusOne     Published Date: Jul 05, 2016
Many companies, especially those in the Oil and Gas Industry, need high-density deployments of high performance compute (HPC) environments to manage and analyze the extreme levels of computing involved with seismic processing. CyrusOne’s Houston West campus has the largest known concentration of HPC and high-density data center space in the colocation market today. The data center buildings at this campus are collectively known as the largest data center campus for seismic exploration computing in the oil and gas industry. By continuing to apply its Massively Modular design and build approach and high-density compute expertise, CyrusOne serves the growing number of oil and gas customers, as well as other customers, who are demanding best-in-class, mission-critical, HPC infrastructure. The company’s proven flexibility and scale of its HPC offering enables customers to deploy the ultra-high density compute infrastructure they need to be competitive in their respective business sectors.
Tags : 
environment, cyrusone, best practices, productivity, flexibility
    
CyrusOne
Published By: TeamQuest     Published Date: Sep 05, 2014
Today's IT must continuously operate at the center of business performance and IT efficiency. One way to make that happen is by optimizing the software defined data center. Understand how organizations can effectively manage today's complex environments and improve business benefits in this TeamQuest sponsored Webinar.
Tags : 
business performance
    
TeamQuest
Published By: K2     Published Date: Apr 01, 2016
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
sharepoint, microsoft, workflow, it management
    
K2
Published By: Mimecast     Published Date: Jun 22, 2015
Moving to an Office 365 environment can open the door to a wide range of business benefits. But what about continuity?
Tags : 
email continuity, microsoft office 365, mimecast, continuity plans, email downtime
    
Mimecast
Published By: Dynatrace     Published Date: Apr 16, 2018
Application performance management (APM) is an IT discipline that continues to evolve as new technologies appear. The new wave of microservices architecture and containerization has led to what is referred to as cloud-native development, and this approach has one of the fastest adoption rates of any new technology we have witnessed. With cloud-native environments there is the need to monitor and manage these new types of applications, but the challenge is that they are quite different from traditional monolithic systems. This report delves into what the differences are, how these affect how they are monitored, and how a new generation of vendors have stepped up and introduced novel solutions to meet these challenges. We also examine the incumbent leaders in the APM market that have transformed their solutions to expand and cover cloud-native environments.
Tags : 
    
Dynatrace
Published By: Dynatrace     Published Date: Apr 16, 2018
Internet-of-things (IoT) is increasing in excitement across all industries as they look to provide innovation in their product and services, and monitor risks and costs in their business operations. But IoT is not a single technology. It is an ecosystem of human and non-human touchpoints that span across multiple technologies. This creates a dynamic and complex environment that is difficult to see and manage in scope. The traditional monitoring approach of watching dashboards, responding to alerts, and manually analyzing doesn’t work anymore. Today’s hyper-dynamic, highly distributed IoT application environments have become way too complex and move too quickly. The volume, velocity, and variety of information is simply more than humans can keep up with using traditional tools.
Tags : 
    
Dynatrace
Published By: VMware Dell     Published Date: Jan 31, 2008
Aternity, Inc. is the leader in Frontline Performance Intelligence for Global 1000 enterprises. Two of the biggest challenges Aternity faces as a software developer are: 1) testing its software in different IT environments; and 2) deploying its software at customer sites.  Fortunately, VMware software was able to address both these challenges.
Tags : 
vmware, software testing, virtual, virtualization, virtualize, virtual server, server, servers, virtual machine, virtual machines, productivity, vmware, infrastructure
    
VMware Dell
Published By: VMware Dell     Published Date: Jul 02, 2008
Many companies have turned to virtualization technologies for their servers and in their data centers to simplify administration and to reduce management chores and operating costs while maintaining reliability and safeguarding against disasters. Seeing the significant benefits virtualization delivers in those environments, companies are now looking to apply the same technology to their desktop computers.
Tags : 
desktop management, desktop, virtualization, virtual infrastructure, vmware
    
VMware Dell
Published By: BMC ESM     Published Date: Sep 15, 2009
Many CIOs are looking to implement the power of Cloud computing, but they don't know where to begin. How do you take full advantage of this technology and implement the correct strategy for your environment? What services should you offer via the Cloud? Read the paper, "Cloud Computing In Perspective," by BMC Software Chief Technology Officer Kia Behnia.
Tags : 
bmc esm, cio, cloud computing in perspective, itil, cloud computing environments, public, private, hybrid, hipaa, payment card industry, pci, business service management, cloud computing, data center design and management
    
BMC ESM
Published By: BMC ESM     Published Date: Nov 06, 2009
Join BMC and learn how IT organizations have addressed these challenges, smoothly integrating new virtualized environments with their existing IT processes, tools, and staff. You'll learn about the major challenges that IT organizations face when embracing virtualization, and how BMC's complete lifecycle solutions have helped customers achieve reliable and cost-effective results.
Tags : 
bmc esm, virtual lifecycle management, virtualization
    
BMC ESM
Published By: ESET     Published Date: Jul 28, 2011
Join us as we dive into security environments and uncover what specific capabilities organizations need to look for when selecting their next endpoint security solution.
Tags : 
webcast, key consideration, eset, endpoint security, security, endpoint
    
ESET
Published By: SEEBURGER, Inc.     Published Date: Feb 23, 2012
By applying best practices, many best-run businesses have achieved a competitive edge from consolidating and modernising their EDI, B2B and file transfer environments - including their SAP processes. Learn their secret!
Tags : 
seeburger, streamline, mft, managed file transfer, network connections, trading partners, security, business integration server
    
SEEBURGER, Inc.
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.