Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

software installation

Results 1 - 16 of 16Sort Results By: Published Date | Title | Company Name
Published By: Aladdin     Published Date: Aug 21, 2009
The Spyware Neutralizer is a clientless add-on tool for the eSafe content security solution from Aladdin Knowledge Systems. Client-side software installation and without the need to implement, manage, or update any client-side software or agents.
Tags : 
phishing, security management, anti spyware, malware, security software, network management, remote access, remote network management
    
Aladdin
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Purchase price alone is not an accurate measure as to the true costs of a system. When evaluating the products offered by different vendors, the purchaser should take into consideration: purchase cost of equipment and software; cost of installing the infrastructure including data cable and mains power outlet and power cables; cost of installation; cost of maintenance; and more.
Tags : 
energy, power, energy conservation, cost, cost of operation, tco, total cost of ownership, power management
    
Borer Data Systems Ltd.
Published By: Commvault     Published Date: Jul 06, 2016
Forget about the complex task of building your own solution. Commvault offers a portfolio of integrated backup appliances that allow you to go from power-up to backup in less than an hour. Each appliance combines Commvault’s industry-leading software with pre-configured and optimized hardware, including an option that uses NetApp’s category-leading NetApp E-Series storage system. To further simplify ordering and deployment, the appliances include a licensing option aligned to the usable storage capacity (e.g., 36TB of NetApp E-Series storage includes 36TB of Commvault back-end terabyte licensing). Or you can purchase the hardware separately and use it with Commvault’s traditional front-end terabyte capacity licensing. Either way, Commvault serves as the single point of contact for software and hardware support issues, and the installation wizard allows you to be up and running quickly regardless of the option you choose.
Tags : 
commvault, backup appliances, netapp e-series, backup, industry leading software, netapp, turnkey solution, converged
    
Commvault
Published By: IBM APAC     Published Date: Sep 25, 2017
Industry convergence is collapsing the barriers between formerly distinct industries. According to “Redefining Connections: Insights from the Global C-suite Study – The CIO Perspective,” produced by the IBM Institute for Business Value, CIOs believe this is the biggest trend transforming the business arena.
Tags : 
organizational security, site security, communication security, application security, database security, software licensing, installation
    
IBM APAC
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
Setup Factory 7.0 is the result of over a decade of experience in creating software installation tools. Unlike other installer builders that require week-long training courses in order to get up to speed, Setup Factory was designed to be fast and easy to use.
Tags : 
software development, software installer, installer, indigo rose
    
Indigo Rose Corporation
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
TrueUpdate 2.0 allows any software developer to integrate automated update capabilities into their final product, providing a robust client/server framework for determining required updates, and then retrieving and applying the necessary patch or installation files using Internet or LAN protocols.
Tags : 
software development, updates, update installers, trueupdate, indigo rose
    
Indigo Rose Corporation
Published By: Jumpnode Systems     Published Date: Jun 12, 2007
Network monitoring software packages require complex installation, ongoing maintenance and additional costs for servers and third-party applications. Software-as-a-Service (SaaS) network monitoring alternatives greatly simplify implementation and maintenance, but they rely on uninterrupted Internet access to function, often require complex VPNs or firewall modifications, and typically provide limited access to historical data.
Tags : 
monitoring, software as a service, saas, high availability, network management, jumpnode, infrastructure, network performance
    
Jumpnode Systems
Published By: Microsoft     Published Date: Jul 20, 2018
When you’re in the software business, your resources can be spread pretty thin. You like to stay focused on building great software, but there are always distractions— from supporting sales opportunities to assisting with customer deployments and troubleshooting existing installations. With so much time spent maintaining the status quo, few cycles remain for modernizing your technology, streamlining internal operations, delivering new customer value, and broadening your customer base. More likely than not, your offerings are based on an on-premises approach, forcing you and your customers to spend considerable time on essential requirements like infrastructure, scalability, availability, and security. Today, you still must deliver on those essentials, but the solutions you’re building—or, more accurately, the solutions you want to be building—need to do a lot more: support millions of users, span the globe, make sense of petabytes of data, and wow users in new ways. At the same time, y
Tags : 
    
Microsoft
Published By: Network Engines     Published Date: Sep 21, 2007
Enterprise customers want software applications delivered as server appliances because they help to reduce IT costs and complexity. Appliances provide better performance, security and manageability. Learn from experts, about factors to consider and things to avoid with the appliance delivery model.
Tags : 
software as an appliance, hardware, server hardware, software appliance, software delivery, software management, enterprise software, software installation
    
Network Engines
Published By: Netwrix     Published Date: Apr 22, 2008
Windows’ newest technology, the User Account Control, found in the Vista operating system has been erroneously called an additional level of security by many computer security professionals. Instead, in the hope to reduce the incidence of malware, unauthorized software installation, and unintentional system changes the User Account Control separates standard user tasks from requiring administrator level password access.
Tags : 
vista, windows vista, microsoft, microsoft vista, netwrix, security breach, access control, user access control
    
Netwrix
Published By: Oracle     Published Date: Jan 28, 2019
Oracle Private Cloud Appliance is a converged infrastructure system designed for rapid and simple deployment of private cloud at an industry-leading price point. Whether customers are running Linux, Microsoft Windows or Oracle Solaris applications, Oracle Private Cloud Appliance supports consolidation for a wide range of mixed workloads in medium-to-large sized data centers. High-performance, low-latency Oracle Fabric Interconnect and Oracle SDN allow automated configuration of the server and storage networks. The embedded controller software automates the installation, configuration, and management of all infrastructure components at the push of a button. Customers need to enter only basic configuration parameters and create virtual machines (VMs) manually or by using Oracle VM Templates to get a full application up and running in a few hours. With Oracle Enterprise Manager, the Oracle Private Cloud Appliance is transformed into a powerful private cloud infrastructure that integrates
Tags : 
    
Oracle
Published By: Port25 Solutions     Published Date: Mar 09, 2012
The PowerMTA Management Console (PMC), v1.0, is a newly released web based enterprise and a scalable software solution. PMC allows for the centralized configuration, monitoring, and reporting of multiple PowerMTAT installations.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting
    
Port25 Solutions
Published By: SAP     Published Date: Nov 22, 2011
Learn how SAP BusinessObjects BI OnDemand offers complete, integrated business intelligence that extends your reporting and analysis of data in the Salesforce application from salesforce.com. This software-as-a-service (SaaS) solution is free to try and requires no dedicated hardware or software installation.
Tags : 
sap, business objects, technology, salesforce, bi ondemand, free trial, reporting
    
SAP
Published By: Symantec     Published Date: Sep 19, 2012
Symantec vulnerability assessments help to reduce the cost and complexity of vulnerability management with automated scans, actionable reports, and a cloud-based architecture that requires no software installation or maintenance.
Tags : 
hackers, information technology, symantec, verisign, web applications, security, network security
    
Symantec
Published By: Webroot Inc     Published Date: Aug 01, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 8.1 (64-bit) during July and August 2015. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Testing was performed on all products using 13 performance metrics, including: installation time, boot time, CPU Usage, Memory Usage, Browse Time and many others. Does your endpoint security measure up?
Tags : 
endpoint performance, software security, endpoint security products, performance metrics, security
    
Webroot Inc
Published By: Workday     Published Date: Jul 19, 2017
Multi-tenancy is a key feature of Workday and enables multiple customers to share one physical instance of the Workday system in a highly secure environment. Multi-tenancy is enabled through the Workday Object Management Server (OMS). Workday OMS allows servers to host multiple customer tenants simultaneously and builds “security walls” between each of the tenants. Thanks to Workday OMS, there is no way for any worker in one tenant to access the information of another tenant. Workday delivers its software using a continuous development model. Builds are rolled out weekly that contain new features, bug fixes, or performance improvements. Twice a year, Workday takes all the features put into preview and releases them to production for all customers. Workday customers are never landlocked on an old release, and all customers can utilize new features for the products they purchased as soon as they are live.
Tags : 
organizational security, site security, communication security, application security, database security, software licensing, installation
    
Workday
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.