Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

application environment

Results 76 - 100 of 389Sort Results By: Published Date | Title | Company Name
Published By: Red Hat     Published Date: Jun 23, 2016
Cisco is a leading provider of networking solutions that transform how people connect, communicate, and collaborate. A US $47 billion global company, Cisco develops intelligent networks and technology architectures for customers in industries ranging from government and military to healthcare and transportation. To help keep pace with rapidly changing customer demand, Cisco built its internal Lightweight Application Environment on OpenShift Enterprise by Red Hat. With this solution, Cisco IT delivers application middleware quickly and easily to internal developers through a self-service portal. Cisco has decreased time to market for new applications, streamlined the infrastructure using containers, increased operational efficiencies, and improved the developer experience.
Tags : 
cisco, best practices, networking, software development, productivity
    
Red Hat
Published By: Tenable     Published Date: Aug 07, 2018
"Digital transformation is putting tremendous pressure on IT security. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, understanding and reducing cyber risk across your entire attack surface is tough. Get the CISO POV in this on-demand webcast and learn how to: • Minimize the attack surface • Expand visibility of assets beyond the perimeter • Enhance security practices to accommodate more dynamic IT environments"
Tags : 
cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
    
Tenable
Published By: Stratus Technologies     Published Date: Jul 25, 2008
Faced with a growing number of business-critical applications and services to support, SMBs and enterprises with remote environments are experiencing a real need for high availability.  This paper discusses an easy-to-use, affordable high-availability and virtualization solution using standard x86 servers.
Tags : 
high availability, virtualization, ha software, stratus avance software, fault-tolerant hardware, ftserver systems, stratus
    
Stratus Technologies
Published By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
    
Oracle APAC
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security, networking, it management
    
CDW-Trend Micro
Published By: Oracle     Published Date: Jul 20, 2016
This analysis explores the financial benefits - as well as the security and reliability benefits - of moving to the cloud. With cloud delivering 2.1 the ROI of on-premise applications with lower initial and ongoing costs, and the environmental benefits of going cloud, it’s hard to argue against the cloud.
Tags : 
cloud, finance management, roi, data management, cloud computing
    
Oracle
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
Is your WLAN under increasing pressure from more users, more types of connected devices, and more bandwidth-intensive applications? It’s time to consider a better solution. With Ruckus Cloud Wi-Fi you get simple, centralized cloud-based management and the best performing Wi-Fi access points for high-density environments. Your job gets easier and your Wi-Fi gets better. Get visibility and control of your distributed Wi-Fi network with bandwidth to spare.
Tags : 
    
Ruckus Wireless
Published By: Carbonite     Published Date: Apr 09, 2018
No one ever wants a recovery to go south—whether it’s your first or 50th time completing a data recovery operation. But your organization will experience a bit more anxiety when it goes to perform its first recovery using a new solution. If the phrase “successful recovery”, in your experience, has applied to only a few applications or a limited set of files, it’s understandable that you may be anxious the first time you test a recovery of your entire environment. Know this: you can successfully conduct a full recovery of your environment the first time as well as every time thereafter. This is the challenge and opportunity that I face every day in my role: to deliver successful cloud recovery for my clients no matter what. While we never guarantee that a recovery will occur without some hiccups during the process, I can point to the fact that every cloud recovery that I have overseen has met our agreed upon service levels whether that guarantee is for a 1-hour recovery, a 24-hour rec
Tags : 
    
Carbonite
Published By: Singlehop     Published Date: Oct 01, 2014
As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.
Tags : 
cloud security, infrastructure threats, security data, chp infrastructure, security, it management
    
Singlehop
Published By: Cisco     Published Date: Sep 08, 2016
This white paper summarizes the main architectural features that make the Cisco CloudCenter solution a unique and powerful choice for any IT organization or service provider seeking to deploy and manage applications in a mix of data center and cloud environments.
Tags : 
    
Cisco
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, whitelisting solutions, application control, encryption, business scanning
    
Lumension
Published By: CloudHealth by VMware     Published Date: Aug 26, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Published By: NEC     Published Date: Aug 12, 2014
Server virtualization is revolutionizing the datacenter by making applications mobile, increasing application uptime, and allowing IT admins to allocate computing resources more efficiently. The technology has been deployed widely enough that the role of the computer server has evolved from directly hosting operating systems and applications to hosting fully virtualized environments. Server that can support more virtualized machines (VMs - complete application stacks) allow their users to gain higher return on their IT investments. Private Cloud can extend the virtualization benefits in ways that broaden the benefits of virtualization to all parts of the organization. In this white paper, you will learn how Corporate IT uses these tools to meet the increasing demand for IT services.
Tags : 
tier 1, cloud, machines, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, enterprise applications
    
NEC
Published By: IBM MidMarket Demand Generation     Published Date: Apr 09, 2012
IDC studied a group of enterprises that had deployed SAP applications on IBM Power Systems servers running Linux server operating environments and had been working with those systems for several years.
Tags : 
ibm, technology, sap, tecnology product, linux server, technology platform
    
IBM MidMarket Demand Generation
Published By: Puppet     Published Date: Mar 09, 2017
If you work in IT, you can’t escape the buzz about containers. Containers are a lightweight way of building and deploying applications as a set of composable microservices that abstract away the underlying infrastructure. As containers and microservices become more mainstream, you need to understand the path to adoption, and which tools come into play. Download this guide to get an introduction to containers, explore their value, and see how configuration management applies to containers. We also discuss how to: • Adopt and scale containers faster. • Move existing services to containers. • Eliminate the friction between development, QA, and production environments.
Tags : 
    
Puppet
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: Cenzic     Published Date: Nov 11, 2008
This white paper highlights Cenzic’s recommendation of a process of continuous assessment for applications in development and production environments -- a process that can equally apply to Intranet and public facing applications alike. Continuous testing can now be easily and safely done in a virtualized environment; no longer putting production web applications at risk. Companies can now easily and quickly, add vulnerability testing to their list of activities for all of their Web applications including production applications. Using a testing methodology across a company’s Web application portfolio will significantly enhance the security of all Web applications.
Tags : 
web application security, testing web applications, cenzic, assessments for web applications, security
    
Cenzic
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Use of instant messaging applications-like AOL Instant Messenger, Yahoo! Messenger, MSN Messenger and ICQ-and peer-to-peer applications has grown significantly. Although the benefits of real-time communication offer a productivity benefit to corporate environments, instant messaging and peer-to-peer applications add significant vulnerabilities and risks to an enterprise's security posture.
Tags : 
instant messaging, instant messenger, icq, internet security, web security, virus, anti virus, anti-virus, antivirus, worms, vulnerability management, internet security systems, it management, bandwidth management
    
Internet Security Systems
Published By: HPE     Published Date: Feb 11, 2015
Protecting your business-critical applications without impacting performance is proving ever more challenging in the face of unrelenting data growth, stringent recovery service level agreements (SLAs) and increasingly virtualized environments. Traditional approaches to data protection are unable to cost-effectively deliver the end-to-end availability and protection that your applications and hypervisors demand. A faster, easier, more efficient, and reliable way to protect data is needed.
Tags : 
    
HPE
Published By: IBM     Published Date: Mar 28, 2008
For many organizations, applications have been moved to an SOA environment and now must be extended to offer a service interface to new sets of users that were not originally planned.  Extending resources in this way requires that you reassess your security risk. To minimize any risk, you need the right level of security checks for user authentication and authorization.
Tags : 
security
    
IBM
Published By: Splunk     Published Date: Apr 16, 2012
Using Splunk, Cricket was able to identify system degradation and failures, even in the application area of Cricket's highly-automated and virtualized environment. Read about Cricket's impressive hard and soft ROI.
Tags : 
splunk, cricket communications, virtualization, automation, customer behavior, data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance, log management operations, operations
    
Splunk
Published By: AppDynamics     Published Date: Sep 25, 2017
IDC’s research shows enterprises around the world are using multicloud strategies to optimize the performance of modern and existing legacy applications running on-premises, in public cloud services, and on legacy systems. In the early days of enterprise cloud adoption, many organizations focused their cloud strategies on enabling net-new cloud-native applications written to take advantage of dynamic cloud infrastructure and pay-as-you-go consumption-based cost models. Early success with these implementations is convincing more and more enterprises to expand their cloud footprint and to migrate existing applications to cloud in order to enhance end-user experiences, optimize cloud resource utilization and costs, and create a more flexible and agile business environment.
Tags : 
    
AppDynamics
Published By: Rubrik EMEA     Published Date: Jan 04, 2019
Demand for flash storage is surging, but IT organizations are hard-pressed to align their data protection efforts with the realities of today’s infrastructure and application requirements in an increasingly flash-based environment.
Tags : 
: data, flash, storage, archiving, protection, recovery, workloads, applications, management
    
Rubrik EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.