Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

legacy system

Results 1 - 25 of 188Sort Results By: Published Date | Title | Company Name
Published By: AppDynamics     Published Date: Sep 21, 2017
IDC’s research shows enterprises around the world are using multicloud strategies to optimize the performance of modern and existing legacy applications running on-premises, in public cloud services, and on legacy systems. In the early days of enterprise cloud adoption, many organizations focused their cloud strategies on enabling net-new cloud-native applications written to take advantage of dynamic cloud infrastructure and pay-as-you-go consumption-based cost models. Early success with these implementations is convincing more and more enterprises to expand their cloud footprint and to migrate existing applications to cloud in order to enhance end-user experiences, optimize cloud resource utilization and costs, and create a more flexible and agile business environment.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Sep 25, 2017
IDC’s research shows enterprises around the world are using multicloud strategies to optimize the performance of modern and existing legacy applications running on-premises, in public cloud services, and on legacy systems. In the early days of enterprise cloud adoption, many organizations focused their cloud strategies on enabling net-new cloud-native applications written to take advantage of dynamic cloud infrastructure and pay-as-you-go consumption-based cost models. Early success with these implementations is convincing more and more enterprises to expand their cloud footprint and to migrate existing applications to cloud in order to enhance end-user experiences, optimize cloud resource utilization and costs, and create a more flexible and agile business environment.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Sep 25, 2017
IDC’s research shows enterprises around the world are using multicloud strategies to optimize the performance of modern and existing legacy applications running on-premises, in public cloud services, and on legacy systems. In the early days of enterprise cloud adoption, many organizations focused their cloud strategies on enabling net-new cloud-native applications written to take advantage of dynamic cloud infrastructure and pay-as-you-go consumption-based cost models. Early success with these implementations is convincing more and more enterprises to expand their cloud footprint and to migrate existing applications to cloud in order to enhance end-user experiences, optimize cloud resource utilization and costs, and create a more flexible and agile business environment.
Tags : 
    
AppDynamics
Published By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : 
backup infrastructure, legacy systems, overload infrastructure, cloud, security, it management
    
Arcserve
Published By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : 
backup infrastructure, legacy systems, overload infrastructure, cloud, security, it management
    
Arcserve
Published By: Attachmate     Published Date: Feb 05, 2014
Watch this video and find out how easy it can be to make your legacy mainframe applications work with new technologies. Using Attachmate Verastream, you can roll out integrated, fully functional applications tailored to each line of business. They get the modern capabilities they need and you get quick development cycles because you don’t have to change host application code. The demo breaks the process down into some basic steps that will help you breathe new life into your legacy mainframe assets.
Tags : 
attachmate, verastream, functional applications, development cycle, best practices, legacy applications, legacy systems, legacy modernization, legacy integration, host applications, enterprise applications
    
Attachmate
Published By: Attachmate     Published Date: Feb 07, 2014
It’s time to rethink your move to mobility. Now your legacy mainframe applications—despite their infamous obstacles to integration—can play an active role in the mobility mix. And with Attachmate Verastream you don’t have to start from scratch, even when it comes to the most locked-down host applications. Watch this demo and learn three ways to exploit business mobility while your established mainframe systems continue to perform their everyday operations.
Tags : 
attachmate, verastream, mobility, legacy applications, host applications, business mobility, mobile enablement, legacy modernization
    
Attachmate
Published By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to National Cyber Security Alliance estimates. That’s not surprising when you consider how many small and medium-sized businesses (SMBs) still rely on legacy AV tools despite their repeated failures to stop modern malware, ransomware, and zero-day attacks. Legacy AV is a lose-lose-lose proposition for SMBs. Attacks get through and cause damage. IT staff struggle to keep up with endless signature file updates from their AV vendors. End-users complain about sluggish system performance during scans and signature file updates. Fortunately, next-generation solutions are now available that protect endpoints with artificial intelligence (AI) rather than signatures. Ready to learn more? Then read the new eSecurity Planet executive brief sponsored by BlackBerry Cylance.
Tags : 
    
BlackBerry Cylance
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Big data projects often entail moving data between multiple cloud and legacy on-premise environments. A typical scenario involves moving data from a cloud-based source to a cloud-based normalization application, to an on-premise system for consolidation with other data, and then through various cloud and on-premise applications that analyze the data. Processing and analysis turn the disparate data into business insights delivered though dashboards, reports, and data warehouses - often using cloud-based apps. The workflows that take data from ingestion to delivery are highly complex and have numerous dependencies along the way. Speed, reliability, and scalability are crucial. So, although data scientists and engineers may do things manually during proof of concept, manual processes don't scale.
Tags : 
    
BMC ASEAN
Published By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
• When it comes to the cloud, most businesses have moved from wait-and-see to a "how do we make it happen now?" approach. • But the complexities of moving valuable content from legacy systems to the cloud is still a daunting challenge. That's why some businesses are putting off the move even though they're painfully aware of the limitations of legacy infrastructure like network shares, enterprise content management systems and general purpose file servers. • The good news is the upside of migrating away from legacy infrastructure to a Cloud Content Management platform is far greater than the effort to get there. All you need is a plan. • Our new eBook, From legacy infrastructure to the cloud: A migration journey in 5 steps, gives you a clear, methodical process for migrating your organization to a Cloud Content Management solution.
Tags : 
    
Box
Published By: CA WA     Published Date: May 12, 2008
Although typically thought of as an artifact of legacy computing, batch processes remain vital to today’s real-time enterprises. Behind the real time systems that power the real time enterprise, such as customer order fulfillment, account management, supply chain scheduling and optimization, or financial trading systems, are regularly-updated back office business systems. Over the years, batch technology has evolved from script-based automation to rules or policy-driven workload automation.
Tags : 
bpa, business process automation, soa, service oriented, workload automation, ca wa
    
CA WA
Published By: CDW     Published Date: Aug 04, 2016
As data volumes grow, you need more than just storage space. Let us help you orchestrate a solution that brings you the scalability and agility you need to move your organization forward. Storage needs are changing rapidly, and legacy appliances and processes just can’t keep up. Old systems are running slowly and filling up fast. At CDW, we can help you evolve your storage with a smart solution that’s ready for what lies ahead.
Tags : 
data, technology, storage, best practices, best solutions, data center
    
CDW
Published By: Cisco     Published Date: Jun 21, 2016
The new age of digital manufacturing is expected to drive dramatic business improvements for companies transitioning from legacy automation systems. Manufacturers can create a foundation for a highly integrated and intelligent decision-making value chain by connecting existing industrial sub-systems, sensors and machines with enterprise applications.
Tags : 
    
Cisco
Published By: ColdSpark     Published Date: Feb 23, 2007
Though legacy open-source email network applications like sendmail and postfix are widely used, the escalating demands of today's enterprise environments have outpaced their capabilities. Large organizations must now look to implement a true enterprise mail transport platform to support the standards of their current and growing business. Learn how to modernize your email system now.
Tags : 
email, email infrastructure, sendmail, postfix, email server, email servers, email routing, email platform, email marketing, email automation, mta, mail transport, mail transport agent, email delivery, email archiving, email gateway, email backbone, email management, open source email, ironport
    
ColdSpark
Published By: Concur     Published Date: May 07, 2012
Though many leading enterprises have moved to automate their expense management, there are still corporations that continue to manage their travel and expense as two separate processes, or manage their expense claims either via a paper, a spreadsheet-based system, an out-dated and costly legacy system or one developed in-house. Download this whitepaper to learn more.
Tags : 
concur, expenses, automate, sme, smb, business finance, finance
    
Concur
Published By: Darktrace     Published Date: Jun 17, 2019
In recent years, the oil and gas industry has seen accelerated digitization of its operations. As the sector reaps tremendous benefits such as greater efficiency and increased agility, this move has also fundamentally shifted the security paradigm. Oil and gas companies must now protect connected field devices, sensors and control systems, as well as legacy systems, often in low-bandwidth, remote, and challenging environments.
Tags : 
    
Darktrace
Published By: Dassault Systčmes     Published Date: May 09, 2018
More connected, informed and demanding customers have the financial services sector looking closely at their processes and products. Collaborative digital platforms can transform your value network and approach. • Improve data insights: Transform legacy systems, manual processes and data silos for consumer-centric collaboration. • Compete with agile FinTech startups: Use disruptive technologies to meet clients’ changing needs. • Empower me to make my own decisions: Give self-directed customers exceptional experiences, like rapid enrolment and self-assessment tools. • Turn regulatory compliance to competitive advantage: Use digitization to improve compliance, reduce risk and enhance governance. • Improve customer experience through digitization: Reduce regulatory issues, gain insights, increase efficiency and customer-centric innovation. I invite you to download your targeted industry analysis and uncover the expectations to take into account at every stage to be disruptive in the age o
Tags : 
    
Dassault Systčmes
Published By: Datastax     Published Date: Mar 06, 2018
This person clearly didn’t work in the financial sector and clearly didn’t use real-time data management technology to power innovative financial apps. When it comes to numbers - specifically, money numbers and customer interactions - you really don’t want to leave your data at the mercy of a legacy system that doesn’t let you mine your data for all the instant insights it can offer.
Tags : 
    
Datastax
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.