cloud users

Results 201 - 225 of 239Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
Group M_IBM Q418
Published By: Qualys     Published Date: Jan 08, 2015
Drivers for cloud solutions include the need to innovate, simplify and cut costs. Users say a key benefit cloud-based security is no need to deploy equipment or software. The cloud provider furnishes and hosts everything in secure data centers. This arrangement lets your business avoid capital expenses and to control ongoing costs. This paper describes how your small or medium-sized company can manage IT risks and maintain regulatory compliance with minimal staff and budget.
Tags : 
cloud solutions, security, secure data centers, it risks, compliance
    
Qualys
Published By: K2     Published Date: Jan 07, 2016
The cloud is here to stay, and Microsoft SharePoint users are finally making the move. Since 2013, the number of SharePoint users with intentions of moving their SharePoint sites to the cloud has doubled, according to a 2015 AIIM survey.1 Many users are making the change to reduce IT costs, improve access for external partners and increase mobility. Casey, IT manager at a mid-size healthcare organization, is one of those users planning to move his organization to a cloud-based SharePoint infrastructure. But because Casey works in healthcare, he’s especially concerned about the security of the cloud. And he’s not alone with that concern — AIIM reports that 62 percent of SharePoint users cite security as their biggest concern when considering a cloud or hybrid solution for SharePoint. More specifically, many SharePoint users are concerned about the following three areas of security in the cloud: • Identity and access • Data protection and privacy • Compliance and governance
Tags : 
security confidence, cloud, microsoft sharepoint, cloud solution, hybrid solution
    
K2
Published By: Symantec     Published Date: Jul 11, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud application, cloud security, enterprise cloud
    
Symantec
Published By: IBM     Published Date: Feb 24, 2015
Read this report from AIIM to discover what issues on-premise ECM users are facing, how external collaboration support is managed, what cloud and mobile functionalities users are requesting, and what alternative scenarios are being considered.
Tags : 
ibm, ecm, ecm users, mobile funtionalities, cloud functionalities
    
IBM
Published By: IBM     Published Date: Sep 10, 2018
IBM Cloud Identity is a new Identity-as-a-Service (IDaaS) offering which provides your users with rapid and secure access to thousands of popular cloud applications, while enabling single sign-on (SSO) to all their applications, whether from the cloud or on-premise.
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 21, 2017
This report is designed to help you make an informed decision about IBM Cloudant. It is based on 22 ratings and 21 in-depth user reviews of Cloudant on TrustRadius, the trusted user review site for business software. By crowd-sourcing user perspectives, we help you to get a true sense of the product. This report includes analysis of the types of customers (company sizes, industries etc.) that use Cloudant, what companies and users like most about the product, as well as areas for improvement
Tags : 
ibm, ibm cloudant, demographic, cloud computing, decision making
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Mar 26, 2018
IBM Cloud Identity is a new Identity-as-a-Service (IDaaS) offering which provides your users with rapid and secure access to thousands of popular cloud applications, while enabling single sign-on (SSO) to all their applications, whether from the cloud or on-premise.
Tags : 
identity management, idaas, cloud applications, ibm cloud identity
    
Group M_IBM Q1'18
Published By: Akamai     Published Date: Apr 10, 2015
Enterprise network architectures are evolving as a result of the growth of public cloud, proliferation of mobile devices, and organizational requirement to collaborate with global users. In this on-demand webinar, Gartner Research VP and Distinguished Analyst Mark Fabbi and Akamai Technologies' Enterprise Web Experience Product Manager, Greg Lord, will provide insight into this new trend.
Tags : 
akamai, web performance, cloud services, network management, cloud networking, digital enterprise
    
Akamai
Published By: SAS     Published Date: Nov 16, 2018
Instances of fraud have become commonplace in many industries, and it’s costing organizations millions of dollars annually and placing corporate brands at risk. But despite significant investments in staff and anti-fraud software, new and emerging fraud threats keep slipping through undetected. Why? Because it’s too costly to keep anti-fraud software current. Paying a vendor to make software changes dramatically increases total cost of ownership. This paper discusses how SAS addresses this challenge with next-generation fraud solutions like SAS Visual Investigator, a cloud-ready investigation and incident management platform that end users can easily configure and adapt to detect new and evolving types of fraud.
Tags : 
    
SAS
Published By: IBM     Published Date: Oct 10, 2013
With CIOs and IT managers increasingly challenged to do more with less, they really need to be selective about their investments. Many are turning to private clouds.
Tags : 
cio, it manager, increased challenges, selective investments, private clouds, cloud users, investments, businesses, cloud market, selective and specific, specific investments, cloud computing
    
IBM
Published By: Polycom     Published Date: Aug 16, 2017
"Download this guide to learn how other SMBs are leveraging Office 365 with Polycom to bring together Office tools and communications to enable employees to connect with colleagues, customers, suppliers and business partners through every form of communication. With 3 new Skype for Business features, Microsoft and Polycom helping businesses improve productivity, efficiency, and collaboration. New features include: • Modern Voice with Cloud PBX, which will enable users to make and receive enterprise-grade calls from within Skype for Business Online. • PSTN conferencing which supports dial-in or dial-out to any device • Skype Meeting Broadcast for presentations to audiences of up to 10,000 "
Tags : 
polycom, office 365, skype for business, microsoft
    
Polycom
Published By: Appcito     Published Date: Apr 09, 2015
Appcito CAFE (Cloud Application Front End) is an easy-to-deploy, uni?ed and cloud-native service enabling cloud application teams to select and deploy enterprise-grade L4 to L7 application network services. The multi-cloud CAFE service is available for the OpenStack open-source cloud computing software platform. OpenStack is a multivendor ecosystem used to deploy Infrastructure-as-a-Service (IaaS) solutions. It allows users to bring compute, storage, and networking resources into private and public clouds through a set of open APIs.
Tags : 
openstack, cloud applications, load balancing, application security, cloud application delivery
    
Appcito
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: IBM     Published Date: Apr 06, 2015
Read this report from AIIM to discover what issues on-premise ECM users are facing, how external collaboration support is managed, what cloud and mobile functionalities users are requesting, and what alternative scenarios are being considered.
Tags : 
ecm, ibm, external collaboration support, cloud, mobile
    
IBM
Published By: Comcast Business     Published Date: Feb 10, 2015
By managing latency well, your network can support cloud services, off-site backup and mirroring, and e-commerce – adding to your company’s bottom line and making your operations more efficient with happier users.
Tags : 
latency, latency management, networks, data center, data management, ecommerce, data communications, interactive environment, business integration, business intelligence, productivity
    
Comcast Business
Published By: VMware     Published Date: Dec 15, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak. By combining VMware NSX with the AirWatch Tunnel and/or VMware Horizon View, organizations are able to bridge the device to datacenter security gap in a way that both increases the overall security of the cloud datacenter and makes it far simpler to manage security through defining and delegating application and services to specific users. Thi
Tags : 
    
VMware
Published By: VMware     Published Date: Dec 27, 2016
With Windows 10, Microsoft brings to market a mobile and cloud-ready OS that is poised to have a significant impact on organizations’ end user computing (EUC) strategy. The modern OS offers a unified platform for building apps and extending the organization’s core processes to end users anywhere and using any Windows 10-powered device. However, enterprise wide execution of this business mobility vision comes with its own set of challenges. A 2015 VMware study involving 1,000+ IT decision makers identified the following top concerns for adoption of mobility initiatives: Reduce the overall cost and complexity of management Ensure security and control of devices at all times Minimize the risk of corporate data loss With a unified endpoint management vision, VMware AirWatch® is strategically positioned to address these challenges. AirWatch's EUC solution enables organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enab
Tags : 
    
VMware
Published By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014
Cisco and Polycom are expensive, on-premises solutions that take weeks to deploy. They require large, ongoing investments to manage them and do not offer a cloud service. How much time and how many resources do you have to spend training and supporting users to work with your Cisco or Polycom solution? Don’t be fooled by packaging. Their solutions are still complex, on-premises hardware that require a team of IT specialists to support and lack the flexibility for you to grow at your own pace. For a price similar to that of your infrastructure software maintenance, you can use Lifesize Cloud and skip the high cost and complexity of Cisco’s or Polycom’s on-premises infrastructure.
Tags : 
lifesize, on-premise solutions, cloud service, software, infrastructure, maintenance
    
LifeSize, a division of Logitech
Published By: Viavi Solutions     Published Date: Mar 21, 2016
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users—from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
viavi solutions, hybrid clouds
    
Viavi Solutions
Published By: Nativeflow     Published Date: Feb 25, 2014
Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.
Tags : 
enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing, standard market app, datasheet, file leakage, data protection, edit shared files
    
Nativeflow
Published By: Fireblade     Published Date: Aug 21, 2014
Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.
Tags : 
fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack, central security cloud
    
Fireblade
Published By: VMware     Published Date: Feb 24, 2017
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this whitepaper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this whitepaper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
    
VMware
Published By: Splunk     Published Date: Oct 15, 2012
Learn how CloudShare allows users to efficiently create multi-VM environments, collaborate with others and deploy projects into production, with no background in IT-infrastructure required.
Tags : 
splunk, vmware, cloud computing, virtualization, it infrastructure, collaboration, it efficiency
    
Splunk
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.