Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

san based

Results 1 - 25 of 43Sort Results By: Published Date | Title | Company Name
Published By: Raritan     Published Date: Sep 07, 2016
Learn how a simple USB port can save you hundreds of thousands by eliminating copper- based network infrastructure costs, facilitating PDU setup and upgrades, and increasing physical security.
Tags : 
usb, raritan, security physical security, network, ports, networking, security, software development
    
Raritan
Published By: Cisco     Published Date: Dec 20, 2018
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what your organization needs and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco® Digital Network Architecture (Cisco DNA™) is your team’s bridge to an intentbased network. It is an open, extensible, software-driven architecture that accelerates and simplifies your enterprise network operations, while lowering costs and reducing your risk. Only Cisco provides a single network fabric that is powered by deep intelligence and integrated security to deliver automation and assurance across your entire organization at scale. Cisco DNA gives IT time back from time-consuming, repetitive network configuration tasks so you can focus on the innovation your business needs. Cisco DNA automation and assurance are built on a Software-Defined Networking (SDN) controller, ri
Tags : 
    
Cisco
Published By: Intel Corp.     Published Date: May 15, 2018
Intel's factories rely on thousands of PCs for manufacturing automation; keeping these PCs up and running can prevent expensive downtime. To manage these systems, Intel IT is using the Intel vPro platform's hardware- based feature, Intel Active Management Technology (Intel AMT), to help reduce production downtime caused by PC incidents by 87.5 percent.
Tags : 
    
Intel Corp.
Published By: Digital Realty     Published Date: Feb 24, 2015
GoGrid needed a state-of-the-art data center in the heart of the financial district to be up and running within days. As a fast-growing technology company headquartered in the San Francisco Bay Area, they needed a scalable data center with a robust infrastructure and an experienced operations team to support the cloudbased services they provide to their customers. Find out why they turned to Digital Realty.
Tags : 
data center, infrastructure management, access control, physical security, it management
    
Digital Realty
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
secure web gateway, web-based threats, web, solution, technology, networking, security, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
gateway, web, security
    
Blue Coat Systems
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Founded in 1992 as a provider of integrated network, voice and data centre solutions, Colt’s business today has grown to encompass a wide range of IT services, spanning enterprise application hosting, business critical cloud and end-user computing solutions. Colt has 29 data centre locations supporting thousands of customers across 28 countries in Europe and Asia, including Swiss International Airlines, Shurgard, Berenberg, and Jaguar Land Rover. Colt’s award-winning solution portfolio is based on end-to-end data centre, network and IT services capabilities; its aim is to help its customers compete and win in their markets without being held back by hardware, licensing and resource limitations.
Tags : 
network management, best practices, network optimization, network applications, application management, technology, telecommunications, network architecture, network performance, network performance management
    
SolidFire_NetApp
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Storage infrastructure performance monitoring and management is the key to business continuity and availability solutions. To ensure application performance, storage managers must manage the performance of the array and the SAN based on the array. HP Storage Essentials software delivers a solution for these scenarios. This solution brief addresses how current performance management challenges can be resolved with HP Storage Essentials software.
Tags : 
performance management, hp storage essentials, software, san, infrastructure, network performance management
    
HP - Enterprise
Published By: Skillsoft     Published Date: Dec 13, 2016
Skillsoft has created an entirely new business skills portfolio based on in-depth research with end-users and eLearning enterprise buyers. The end result is a content pipeline of over one thousand, 3-5 minute micro-videos, packaged into over 240 new courses. Multi-dimensional and micro-sized, the new courses are flexible training and development solutions that target the need of diverse populations, at all stages of their career. The courses feature purposeful application of video treatments, including: • Well-acted, interactive scenarios • High-end animations • “TED-talk” style presentations • “How-to” videos • Whiteboard tutorials Watch a sample scenario-based course, Mobilizing Your Team to Take Action.
Tags : 
business skills, training and development
    
Skillsoft
Published By: Dell & Microsoft     Published Date: Feb 01, 2013
In this Technology Adoption Profile we explore the current state of replication in SMB IT departments and in particular the use of SAN-based replication. We find strong demand for both synchronous and asynchronous SAN-based replication, as well as the need to replicate data within the SMB’s own data center facilities, either to a colocated secondary array or to one within 5 km [approximately 3 miles](a campus or metro-style deployment). We also find that in order for SMBs to protect more data using replication, they need replication solutions that are non-disruptive, easy to use, and inexpensive.
Tags : 
data, san-based replication, synchronous, asynchronous
    
Dell & Microsoft
Published By: Lenovo - APAC     Published Date: Oct 11, 2018
Lenovo’s VMware vSAN-based hyperconverged solution reduces TCO by 40% within the datacenter. VMware-based hyperconverged solutions from Lenovo come with a set of certified components that can be deployed to create platforms that support a broad array of workloads, performance, and budgetary requirements. With VMware vSAN pre-installed, pre-configured, and pre-tested, Lenovo’s VMware-based hyperconverged solutions help improve productivity, and cut complexity quickly and easily. VMware-based hyperconverged solutions from Lenovo represent proven solutions that are enterprise-class and are already being leveraged within mission-critical environments around the world. Download IDC’s Infobrief on “The Real-World Value of Hyperconverged Infrastructure” and learn how you can: • Cut the cost of scaling infrastructure • Reduce time spent on infrastructure provisioning • Improve application performance • Eliminate complexity and cost related to refreshing traditional infrastructure
Tags : 
    
Lenovo - APAC
Published By: Fiserv     Published Date: Sep 14, 2017
Sanctions screening and fraud prevention solutions use real-time detection to prevent terrorist financing and financial crime; whereas anti-money laundering (AML) primarily follows an “observe and report” process. Such a process is all that is currently required by many regulators. Increasingly though, international compliance teams are choosing to stop transactions before they are executed – based on suspicions of money laundering activity. More and more, the industry has been asking itself if this approach of rejecting suspicious activity is a more effective strategy to prevent money laundering. This paper explores where and why AML real-time detection might make sense as a new paradigm for global financial institutions.
Tags : 
aml, anti-money laundering, compliance, regulatory compliance, financial crime, financial crimes, financial action task force, fatf, customer due diligence, cdd, aml monitoring solutions, currency transaction reporting
    
Fiserv
Published By: Okta     Published Date: Aug 03, 2016
Within 6 months of purchasing Okta, the average customer connects 10 applications, and once up and running, the number increases quickly. But, the average customer could be using twice as many provisioning integrations than they are. Using Okta for single sign-on and a centralized view of your cloud apps isn’t nearly enough. Watch this webinar for a live demo of Okta’s new Access Request Workflow and Access Discovery Report features and learn how Okta Provisioning can bring sanity to your IT processes. Learn about: • Provisioning Workflows • Role & Rule-based Access Control • Security-focused Compliance Reporting
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: CrowdStrike     Published Date: Aug 01, 2017
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShellattacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn:?Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more?The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model ?How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent attacks
Tags : 
    
CrowdStrike
Published By: Amazon Web Services EMEA     Published Date: Oct 17, 2019
Over the last 13 years, AWS and our partner ecosystem have helped thousands of organizations migrate applications to the cloud to lower their costs and improve their operational resiliency, gain business agility, and build a foundation for rapid innovation. Based on this experience, we’ve built the most complete and proven approach for migrating one to thousands of applications to the cloud so that you can have the confidence of realizing value from your cloud journey faster.
Tags : 
    
Amazon Web Services EMEA
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Today’s mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it.
Tags : 
    
Group M_IBM Q119
Published By: FireEye     Published Date: Feb 28, 2014
Organizations face a new breed of cyber attacks that easily thwart traditional defenses. These advanced attacks are targeted. They are persistent. And they are devastatingly effective at breaching your systems and stealing your sensitive data. This paper examines: The limitations of existing security solutions; Several security architectures, including sandbox-based products; An architecture built from the ground up to truly protect against today's advanced attacks.
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, small businesses, information security, security threats, fireeye platform, protecting data, cyber targets, cybercriminals, prime target, midsize businesses, security, it management
    
FireEye
Published By: VMware     Published Date: Jul 24, 2018
The right hyper-converged infrastructure (HCI) solution can yield tangible financial benefits for an IT organization. This paper explores how HCI powered by VMware vSAN improves an IT department’s financial outlook in terms of both Capital Expense (CapEx) and Operating Expense (OpEx). Its insights are based on comments from real users on IT Central Station.
Tags : 
    
VMware
Published By: VMware     Published Date: Jul 24, 2018
The right hyper-converged infrastructure (HCI) solution can yield tangible financial benefits for an IT organization. This paper explores how HCI powered by VMware vSAN improves an IT department’s financial outlook in terms of both Capital Expense (CapEx) and Operating Expense (OpEx). Its insights are based on comments from real users on IT Central Station.
Tags : 
    
VMware
Published By: Forcepoint     Published Date: Jun 06, 2019
In today’s average large enterprise, more than 1,000 cloud applications may be in use—whether sanctioned or unsanctioned by IT. But traditional security technologies can’t adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
    
Forcepoint
Published By: Gameffective     Published Date: Feb 26, 2019
Comdata Group is one of the world's largest business process outsourcing (BPO) providers. It operates hundreds of call-centers around the globe, with tens of thousands of employees offering, a variety of services, including sales and customer service. In a competitive BPO market, Comdata was looking for ways to increase the productivity and efficiency of its agents. It looked for a unified solution that would successfully engage employees, drive higher accountability and better focus them on their performance. Using Gameffective's platform, Comdata deployed gamified, real-time performance management. This process provides employees with the ability and motivation to self-track their performance against goals and benchmarks, and offers just-in-time coaching based on their needs. The results were impressive: 12% increase in sales per hour, and significant reductions in both new-hire learning curves and in ongoing training time. Read the case study to learn how Comdata: Increased emp
Tags : 
    
Gameffective
Published By: NetApp     Published Date: Jun 09, 2009
NetApp® SnapManager® for Oracle (SMO) is designed to significantly simplify all these tasks and more. In this article, we examine how you can deploy SMO to simplify and even automate data protection, recovery, and cloning across both primary and secondary storage. Learn more today!
Tags : 
netapp, snapmanager, oracle, smo, networked storage, snapmanager, dataontap, direct attached storage, das, data management, data integration, storage, storage efficiency, implementation, esg, it sandbox, microsoft office sharepoint server, moss, mission-critical, sql
    
NetApp
Published By: Dell-Intel     Published Date: Jul 16, 2009
The Business Ready Configurations for Dell PowerEdge blade servers, Dell EqualLogic SAN, and VMware Infrastructure provides a detailed reference architecture for deploying and using VMware virtualization on Dell blades and iSCSI storage environments. The Dell PowerEdge M1000e supports the recently announced 11th generation Dell PowerEdge M610 and M710 blade servers based on the new Intel Xeon processors.
Tags : 
data center, virtualization, xeon, dell, intel, equallogic, san, iscsi, vmware infrastructure, iscsi, poweredge, vmware distributed resource scheduler, drs, vmware, high availability, scalable, scalability, lan, failover, balancing
    
Dell-Intel
Published By: Marketo     Published Date: Jun 08, 2017
Unfortunately, we’ve all been there. Every now and then, we make cringe-worthy mistakes. But the mistakes that haunt us in our personal lives often aren’t as public as email marketing mistakes, which go out to hundreds and thousands of subscribers. Download this ebook to learn about the eight most common email marketing pitfalls and how you can avoid or fix them: Mistake 1: Unclear subject lines Mistake 2: Poor email list hygiene Mistake 3: Failure to measure email inboxing Mistake 4: No engagement segmentation Mistake 5: No re-engagement strategy Mistake 6: Using image-based CTA buttons Mistake 7: No mobile optimization Mistake 8: Bad testing decisions
Tags : 
continuously opened emails, engagement, unique clicks, multiple clicks, cleaning campaign, sender reputation, marketo, marketing
    
Marketo
Published By: IBM     Published Date: Feb 25, 2008
Enterprise Strategy Group (ESG) Labs performed a hands-on analysis of IBM's System Storage SAN Volume Controller storage virtualization solution in order to validate its value proposition to customers. ESG Labs found that SAN Volume Controller is a rock-solid, feature-rich platform that delivers on the promise of network based storage virtualization: reducing the complexity and cost of managing SAN attached storage.
Tags : 
hardware, ibm, san volume controller, roi, storage, storage management, storage virtualization, virtualization, ibm
    
IBM
Previous   1 2    Next    
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.