Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

infrastructures

Results 226 - 250 of 319Sort Results By: Published Date | Title | Company Name
Published By: TopLayer     Published Date: Aug 21, 2009
This white paper is intended for Information Security and Information Technology professionals interested in understanding Zero-day Attacks, the various protection schemes available today and how Top Layer Network's Intrusion Prevention System (IPS) solutions provide the best mechanisms for protection from these types of attacks.
Tags : 
network security, intrusion prevention, ips, cso, server protection, toplayer, top layer, security
    
TopLayer
Published By: Red Hat     Published Date: Sep 25, 2014
Enterprises are increasingly adopting Linux as a secure, reliable and high-performing platform that lowers acquisition and operating costs while providing the agility needed to anticipate and react to changing business conditions. In particular, the Red Hat Enterprise Linux (RHEL) operating environment, which is based on the Linux open-source kernel, has become widely deployed by medium-sized and large businesses, by enterprises in their data centers, and in private and public cloud infrastructures. RHEL is distributed and supported by Red Hat Inc., the world’s largest provider of open-source software solutions, accounting for 74.7% of worldwide Linux operating system (OS) revenue. As a development and deployment platform, RHEL offers an efficient, scalable and robust operating environment with certified security and flexible deployment options in physical and virtualized environments.
Tags : 
enterprise solutions, open-source software, it management, data center
    
Red Hat
Published By: Dell and Nutanix     Published Date: Jan 16, 2018
Organizations increasingly require IT infrastructures that support the speed at which their businesses must operate through simplicity, efficiencies, agility, and strong performance. Hyperconverged infrastructure solutions, which enable organizations to minimize or nearly eliminate inefficiencies and complexity associated with maintaining storage and compute silos, have emerged as a strong potential solution for such organizations. IDC’s research demonstrates that organizations running workloads on Nutanix solutions such as Dell XC are benefiting are benefiting from cost and staff efficiencies, the ability to scale their infrastructure incrementally, very high resiliency, and strong application performance. This is helping interviewed Nutanix solutions customers better meet business challenges and has led many of them to establish plans for expanding their hyperconverged workload environment with Nutanix solutions.
Tags : 
technologies, infrastructure, data, social, mobile, cloud, nutanix
    
Dell and Nutanix
Published By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority ®-part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : 
desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security, real-time targetin engine, service packs, it infrastructure, patching, auditing, it management, data center
    
Dell Software
Published By: Juniper Networks     Published Date: Aug 03, 2017
Unprecedented trends are driving enterprise architects and engineers to reconsider their infrastructures. Nemertes reviews some of the design principles leading the way.
Tags : 
enterprise architects, automation, integrated security, infrastructure improvement
    
Juniper Networks
Published By: Avocent     Published Date: Aug 22, 2011
This whitepaper discusses how enterprises can take steps to optimize their data center infrastructures before experimenting with cloud computing.
Tags : 
avocent, data center infrastructure, cloud computing, power management, infrastructure, network architecture, quality of service, power and cooling, data center design and management, data center
    
Avocent
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: May 07, 2012
This presentation charts the likely evolution of the market for fabric-based infrastructures, to help IT leaders determine the most appropriate vendor approach.
Tags : 
power, cooling, space, lifecycle, operations, flexibility, serviceability, data center, redefine, expectations, productivity, experience, storage performance, servers, gen8, intel, proliant
    
Sponsored by HP and Intel® Xeon® processors
Published By: AWS - ROI DNA     Published Date: Jun 12, 2018
Traditional data processing infrastructures—especially those that support applications—weren’t designed for our mobile, streaming, and online world. However, some organizations today are building real-time data pipelines and using machine learning to improve active operations. Learn how to make sense of every format of log data, from security to infrastructure and application monitoring, with IT Operational Analytics--enabling you to reduce operational risks and quickly adapt to changing business conditions.
Tags : 
    
AWS - ROI DNA
Published By: EMC Corporation     Published Date: Feb 13, 2015
XtremIO all-flash-arrays (AFAs) have redefined everything you know about SQL Server database infrastructures. Through a ground-breaking, fresh approach to storage design, XtremIO is uniquely engineered for SQL Server database requirements utilizing a powerful and vastly simplified scale-out performance architecture, with in-memory always-on compression, deduplication and space efficient copy services enabling application acceleration, consolidation and agility.
Tags : 
all-flash-arrays, database infrastructures, sql server, database requirements, application acceleration
    
EMC Corporation
Published By: IBM     Published Date: Nov 04, 2014
Dominate trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amount of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core application and remote sites.
Tags : 
it trends, virtual environments, core application, data protection, networking, security
    
IBM
Published By: IBM     Published Date: Jan 23, 2015
Dominant trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amounts of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core applications and remote sites.
Tags : 
it trends, it environments, smarter physical infrastructures, data protection, it management, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
With modern IT infrastructures an intricate web of interdependencies, uncovering the total IT environment, including the logical relationships between physical, virtual and cloud elements, has never been more important—or more complex. This white paper discusses how IBM’s analytics for logical dependency mapping, ALDM, reengineers the IT discovery process to provide a more complete and accurate view of the IT infrastructure.
Tags : 
reengineering, it discovery, analytics, visualization, interdependencies, it environment, logic, logical relationships, virtual, cloud, logical dependency, logical dependency mapping, aldm, it infastructure
    
IBM
Published By: Forcepoint     Published Date: Jun 06, 2019
Traditional security infrastructures can't keep up with the growing complexity of today's distributed networks. To power true digital transformation via the cloud, you need to integrate connectivity and security in a way that allows for higher productivity, reduced costs, and easier compliance. Download our eBook to learn about a better approach to cloud security, including how to augment or replace expensive MPLS, the types of security needed for holistic protection, and the advantages of an integrated solution instead of a patchwork of point products.
Tags : 
    
Forcepoint
Published By: HP and Intel® Xeon® processors     Published Date: Nov 30, 2011
This technical whitepaper provides detailed information on how to integrate VMware vSphere 5.0 with HP P4000 LeftHand SAN solutions.
Tags : 
infrastructures, integrate, vmware, vsphere, solutions
    
HP and Intel® Xeon® processors
Published By: Hewlett Packard Enterprise     Published Date: Jul 20, 2016
The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and by financial pressures. A study by 451 Research reveals that the greatest barrier to cloud migrations is the twin challenges of security and compliance in the hybrid cloud space. Organizations are struggling with practical considerations, which can prevent them from achieving some of the most important and valuable benefits of hybrid cloud deployments. This report details a number of steps that organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud.
Tags : 
security, compliance, hybrid cloud, best practices, cloud security
    
Hewlett Packard Enterprise
Published By: HPE_OMG_7.16     Published Date: Jul 22, 2016
The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and by financial pressures. A study by 451 Research reveals that the greatest barrier to cloud migrations is the twin challenges of security and compliance in the hybrid cloud space. Organizations are struggling with practical considerations, which can prevent them from achieving some of the most important and valuable benefits of hybrid cloud deployments. This report details a number of steps that organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud.
Tags : 
security, compliance, hybrid cloud, best practices, cloud security, business intelligence, business management, cloud computing
    
HPE_OMG_7.16
Published By: IBM     Published Date: Oct 06, 2014
Financial organizations are under intense pressure to grow their business while keeping costs in check and meeting regulatory requirements. This can be a huge challenge for banking leadership and especially those managing payments infrastructures. How can banks improve business agility and ensure faster compliance? Integrated transaction management hubs deliver differentiated products to customers now, provide a platform for future and enable ongoing market share growth.
Tags : 
payments infrastructures, transaction management, payment transformation, single payments platform
    
IBM
Published By: IBM     Published Date: Nov 22, 2014
Financial organizations are under intense pressure to grow their business while keeping costs in check and meeting regulatory requirements. This can be a huge challenge for banking leadership and especially those managing payments infrastructures. How can banks improve business agility and ensure faster compliance? Integrated transaction management hubs deliver differentiated products to customers now, provide a platform for future and enable ongoing market share growth.
Tags : 
commercial payment center, payments infrastructures, business agility, integrated transaction management, software development, enterprise applications
    
IBM
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security, networking, it management
    
Entrust Datacard
Published By: OneLogin     Published Date: Oct 24, 2017
In this ebook, we dive into how identity management streamlines access to the cloud while protecting corporate data. The location of many resources is changing to the cloud, yet companies still need central management of those resources. Trying to maintain security and order in a chaotic free-for-all use of cloud apps and bring-your-own-device culture is like a black hole sucking in IT’s time—time they could be dedicating to other projects. OneLogin’s cloud identity management platform spans the entire application portfolio with secure single sign-on (SSO), multi-factor authentication (MFA), user provisioning, integration with common directory infrastructures such as Active Directory (AD), Lightweight Directory Access Protocol (LDAP), and various cloud directories, and more. We recommend the following: • IT departments leverage OneLogin for all their identity management needs • IT departments educate users about security and safe sharing • App owners enable Security Assertion M
Tags : 
    
OneLogin
Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property
Tags : 
    
Cisco
Published By: Cisco     Published Date: Oct 14, 2015
Read more to learn how to seize new business opportunities by embedding security into the intelligent network infrastructure and across the extended network.
Tags : 
cisco, cisco security, digital economy, network infrastructures, network security, internet of everything, ioe, networking, security, it management
    
Cisco
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The cloud — at one point it was a revolution in the workplace. But the cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply another part of the business. The availability of mobile devices and cloud services has redefined not only the way we work, but where we work. Critical infrastructures, applications, and massive amounts of sensitive data are now stored in the cloud, leaving companies at risk of damage if cloud accounts are compromised. With the cloud fast becoming the new normal, network security solutions need to adapt. Download this ebook to learn how Cisco Cloud Security helps you securely adopt and use the cloud, and better manage security for the way the world works today.
Tags : 
    
Cisco Umbrella EMEA
Published By: CA Technologies     Published Date: Nov 07, 2014
Guide pratique à l’attention des responsables métier et IT sur les actions à entreprendre dès MAINTENANT pour gérer la mobilité future de l’entreprise.
Tags : 
enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies, cloud computing
    
CA Technologies
Published By: Quest Software     Published Date: Feb 06, 2013
This document will highlight how these individual components are impacting service organizations and track the progress of convergence of these three components on the IT infrastructures of service organizations.
Tags : 
service, organizations, it infrastructure, service, mobility, field service, communication, collaboration, investments, progress
    
Quest Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.