environments

Results 1026 - 1050 of 1181Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 10, 2014
Download this short paper for an overview of the benchmark, the result and understand the importance to businesses deploying Hadoop into their data warehouse environments.
Tags : 
ibm, big sql, hadoop, sql
    
IBM
Published By: VMware     Published Date: Feb 24, 2017
With Windows 10, Microsoft introduces a consolidated operating system (OS) platform that changes how organizations treat the management of End-User Computing (EUC) environments. This new way of managing Windows is more closely aligned to the enterprise mobile management (EMM) based approaches found in mobile management tools today. This whitepaper provides an overview of how Windows management evolved from a rigid and disruptive PC-centric approach to one offering a flexible and light-touch model. It will also delve into the specific management technologies that Windows 10 introduces, as well as leveraging conventional Windows management tools that are in use today.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 20, 2018
Download the new white paper from VMWare that explores the possibilities of virtualizing HPC throughput in computing environments.
Tags : 
vmware, hpc, high powered computing, virtual hpc
    
VMware
Published By: IBM Smarter Analytics     Published Date: Sep 04, 2013
Organizations that have virtualized their environments are discovering that the journey's not over. In many ways, it's just beginning. The full benefits of virtualization -- from cost savings and increased speed to resource transparency and control -- can only be fully realized by optimizing all of the interdependent components. In this webcast, IBM leaders discuss how organizations can get more from their virtualization investments with best practices gleaned from years of transforming traditional data centers and building world-class clouds.
Tags : 
virtualization, best practices, optimizing, ibm webinar, traditional data, data management
    
IBM Smarter Analytics
Published By: IBM     Published Date: Oct 22, 2013
Read the paper from Winter Research, Inc sharing details on the dramatic savings brought by IBM Rational automated test solutions. Learn about the positive ROI from an increased ability minimizing the cost and time to identify errors. 
Tags : 
ibm, wintergreen research, software testing, service virtualization, research approach, driving forces, application testing, leveraging service virtualization
    
IBM
Published By: Unitrends     Published Date: Jan 05, 2017
Compliments of Unitrends. This Buyer’s Guide highlights the most robust and feature rich integrated backup appliances available on the market today. These backup appliances have many if not all of the features needed to protect both physical and virtual environments and will give you visibility into the new set of features that will define the next generation of integrated backup appliances.
Tags : 
unitrends, integrated backup appliance, backup, recovery
    
Unitrends
Published By: Oracle Corp - Storage     Published Date: Mar 07, 2013
A Comparison of Oracle’s Sun ZFS Storage 7420 With the NetApp FAS3250
Tags : 
oracle, oracle database, software environments, network attached storage
    
Oracle Corp - Storage
Published By: Symantec     Published Date: Jun 18, 2015
Learn about the growing complexities of the cloud and see why there is a growing complexity within IT security and what your organization must do to adapt.
Tags : 
enterprise it architecture, service-oriented architecture, hybrid environments, private and public clouds, user identity
    
Symantec
Published By: Progress Software     Published Date: Mar 12, 2014
This paper explores some of the practices most relevant to achieving success with PaaS, focusing on ways to identify how PaaS can be best utilized within the specifics of a given organization’s overall IT needs. Practices include understanding scalability and infrastructure aspects of PaaS deployment, the need for coding wisdom in otherwise “codeless” environments, integration with on-premise systems and other cloud-based IT assets, security and more.
Tags : 
progress software, paas, platform as a service, cloud, isv, platform infrastructure, development platform, enterprise adoption
    
Progress Software
Published By: Eaton     Published Date: Feb 08, 2017
Server virtualization empowers businesses with significant advantages that include reduced hardware expenses, simplified administration and heightened availability. As a result, nearly 80 percent of server workloads supported by x86 hardware are now running on virtual machines, according to Gartner estimates. However, despite its widespread adoption and benefits, the technology is not without its challenges.
Tags : 
    
Eaton
Published By: Eaton     Published Date: Feb 08, 2017
Power distribution is facilitated through different pieces of equipment that take the power conditioned by your uninterruptible power supply (UPS) and send it to your IT equipment . Power distribution solutions can manage and even control energy consumption in smaller environments as well as large data center applications . Distributing power efficiently results in reduced operating costs and increased reliability.
Tags : 
    
Eaton
Published By: Eaton     Published Date: Feb 09, 2017
While network closets take on all shapes and sizes, they are essentially an arm of the data center and as an important component of all mission-critical environments, must be organized, protected, and managed efficiently and effectively. IT professionals are charged with keeping the technology infrastructure functioning, even in the face of constrained resources and increasing complexity.
Tags : 
    
Eaton
Published By: Symantec     Published Date: Apr 02, 2015
The online world can be a scary place as the integration of the Internet into everyone’s lives has also brought with it an ever-increasing trend towards malicious activity. Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers’ sensitive information. It is critical to choose e-commerce security solutions that continually evolve and extend to address a range of ever-changing needs. SSL-based security platforms with solid track records of meeting new challenges are the best way to defend, and future proof, e-commerce environments against a growing and dynamic Internet threat environment.
Tags : 
security solution, ssl, e-commerce environments, malicious activity, safeguard information, ssl-based security
    
Symantec
Published By: Dell EMC     Published Date: May 13, 2016
This report documents hands-on testing and validation of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system, with a focus on the ease of integration, efficiency, scalability, and backup/restore performance.
Tags : 
emc, vmware, data protection, data domain, backup
    
Dell EMC
Published By: Bronto     Published Date: Sep 09, 2013
Deliverability is a primary concern for email marketers. There are many nuances that can impact how your messages are delivered. This white paper explains the most common sending environments and answers the frequently asked questions around why and when to make the transition to a dedicated IP (Internet Protocol) address.
Tags : 
email deliverability, email marketing, dedicated ip, dedicated internet protocol
    
Bronto
Published By: GeoTrust     Published Date: Aug 09, 2013
Learn more about typical situations where multiple domain certificates are the ideal solution. After this whitepaper, you'll know how to select the right multi-domain certificate for your needs.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution
    
GeoTrust
Published By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks, point-of-sale
    
Symantec Corporation
Published By: IBM     Published Date: Oct 10, 2014
This book gives you insight into what it means to leverage service virtualization in your testing environments.
Tags : 
ibm, virtualization, service virtualization, service components, deploying service, team productivity, software quality, dependent services
    
IBM
Published By: IBM     Published Date: Oct 10, 2014
Delivering applications that meet the needs of the business can be a challenge in a complex business climate that is constantly changing. Diverse, multiple heterogeneous environments are the norm, all of which must be maintained and deployed. Multiple tools and technologies connect, support and create work.
Tags : 
ibm, software delivery, collaborative platform, investments, application delivery, customer feedback, standardized process, deployed
    
IBM
Published By: AlienVault     Published Date: Jul 22, 2016
In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
In this report, you'll read 451 Research's review of AlienVault USM Anywhere. USM Anywhere is AlienVault's offering of centralized security information and event management for resource-constrained organizations embracing Amazon and Microsoft cloud architectures. The report covers the following areas: • 451's overview of AlienVault USM Anywhere • A brief look at the history of AlienVault • How USM Anywhere compares to competitors • A SWOT analysis of USM Anywhere Download the report now to learn more about AlienVault's unique approach to threat detection in cloud and hybrid cloud environments
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Start   Previous    34 35 36 37 38 39 40 41 42 43 44 45 46 47 48    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.