environments

Results 1126 - 1150 of 1225Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Inc     Published Date: Jul 22, 2016
Traditional datacenter perimeters are dissolving as users access applications from a multitude of environments on a variety of devices. Secure, centralized application management throughout the hybrid cloud network will give an enterprise greater agility to succeed in today’s digital world. Read the whitepaper to learn how.
Tags : 
f5 big-ip platform, performance, applications, application delivery, integrated systems
    
F5 Networks Inc
Published By: Jive Software     Published Date: Mar 03, 2010
This white paper will provide a framework for creating these types of environments to help facilitate the conversations, as well as guidance around how to apply that content to transform your organization.
Tags : 
jive, build online community, social web, brand affinity, conversation, community planning, loyalty, collaboration software
    
Jive Software
Published By: ScriptLogic     Published Date: Nov 14, 2011
The aim of this document is to highlight ways in which ScriptLogic solutions can be used to bring Microsoft Windows-based IT systems into line with the requirements of the Payment Card Industry (PCI) Data Security Standard.
Tags : 
pci compliance, compliance, scriptlogic, pci, security standard, data security, lifecycle, virtual
    
ScriptLogic
Published By: EMC Corporation     Published Date: Apr 03, 2013
Instead of just thinking about backup in terms of familiar IT “speeds and feeds,” organizations are looking at it from a broader business perspective.
Tags : 
emc, ebook, backup environments, backup transformation, speeds and feeds
    
EMC Corporation
Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
Read this report to better understand the unique file-based storage challenges these organizations face and possible solutions for overcoming them to achieve maximum ROI.
Tags : 
hp + intel, information assets, content driven enterprise, archiving, storage solutions, large content environments
    
HP and Intel® Xeon® processors
Published By: HP and Intel® Xeon® processors     Published Date: Nov 21, 2011
This solution brief will help you understand the benefits of the HP CloudSystem Matrix which provides a unified solution for physical and virtual environments that's perfectly suited as an IT consolidation platform.
Tags : 
cloud, cloud computing, private, public, hybrid, risks, benefits, infrastructure
    
HP and Intel® Xeon® processors
Published By: HP and Intel® Xeon® processors     Published Date: Nov 19, 2012
In this white paper, HP and Veeam Software outline an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft(r) Hyper-V environments. Read on to learn more.
Tags : 
data protection, vmware, vsphere, hyperv
    
HP and Intel® Xeon® processors
Published By: Delphix     Published Date: Apr 05, 2011
Database virtualization is the next logical step in the evolution of the datacenter. In many environments, it may be the single largest opportunity for operational and capital cost savings available.
Tags : 
virtualization, database, datacenter, cloud
    
Delphix
Published By: nick.morgan     Published Date: Apr 13, 2011
Reducing the security risks organisations are facing by shifting IT operation to the cloud.
Tags : 
cloud environments, virtual environments, security implications, business benefits, virtual machines, organisations, information, data loss
    
nick.morgan
Published By: Dell Storage     Published Date: Apr 21, 2011
The Storage Center SAN is a smart, virtual storage platform that speeds storage provisioning for virtual machines, minimizes disk capacity, automates disaster recovery, fine-tunes data placement for virtual applications and provides a shared storage pool available to all VMs all the time. Watch this webcast to see why Dell Compellent storage is the perfect complement to VMware server environments. (39 mins)
Tags : 
dell compellent, webinar, virtual storage platform, vmware virtual servers, storage center san, disk capacity, disaster recovery
    
Dell Storage
Published By: Acronis     Published Date: Apr 28, 2011
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis® Backup & RecoveryT 10 Advanced Server is the next generation of the Acronis True Image disaster recovery family for physical and virtual environments. It simplifies and automates backup and restore processes across Windows and Linux environments, and remotely monitors and manages geographically distributed servers and workstations.
Tags : 
acronis, backup and recovery, 10 advanced server, patented disk imaging, bare metal restore, true image, disaster recovery, remote server
    
Acronis
Published By: IBM     Published Date: Jan 17, 2013
Download this white paper to learn about the architecture, deisgn and execution environments for this leading-edge technology, as well as recommendations on how to manage an implementation of this decision management solution.
Tags : 
    
IBM
Published By: Endace     Published Date: Apr 12, 2012
In this whitepaper find out what you need to know about network visibility, network security and network forensics in 1, 10, 40 and 100Gbps network environments.
Tags : 
endace, pack capture
    
Endace
Published By: Infoblox     Published Date: Jun 11, 2012
The dynamic nature of virtual and private cloud environments cannot be accommodated by an underlying infrastructure that is a static, physical assembly of routers, switches, servers, and firewalls. Find out more in this complimentary white paper
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls
    
Infoblox
Published By: Splunk     Published Date: Oct 15, 2012
Learn how CloudShare allows users to efficiently create multi-VM environments, collaborate with others and deploy projects into production, with no background in IT-infrastructure required.
Tags : 
splunk, vmware, cloud computing, virtualization, it infrastructure, collaboration, it efficiency
    
Splunk
Published By: Splunk     Published Date: Oct 15, 2012
Visibility and cross-tier correlation for the largest virtual environments
Tags : 
data management, virtualization, splunk, splunk app, vmware, performance metrics, data management
    
Splunk
Published By: BlackBerry     Published Date: Oct 03, 2012
In this Yankee Group whitepaper, find out why creating an enterprise-class tablet environment should be at the top of the list for every security-conscious organization.
Tags : 
tablet environments, security, application security, corporate tablet use
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
In this Yankee Group whitepaper, find out why creating an enterprise-class tablet environment should be at the top of the list for every security-conscious organization.
Tags : 
tablet environments, security, application security, corporate tablet use
    
Blackberry
Published By: HP - Intel® Xeon® processors     Published Date: May 06, 2013
What’s needed today is storage that’s flexible enough to be used for both legacy IT and virtual systems environments and repurposed as new needs arise. Storage must be quickly expandable and must enable data and applications to be easily and securely migrated, with workloads automatically rebalanced. Applications need to be online 24 x 7, so high availability is paramount. Management of the entire storage pool, as well as coordination with virtualized servers and networking, must be streamlined and simplified. This Tech Dossier reveals how HP Converged Storage can meet your organizations storage requirements.
Tags : 
converged storage, optimize, virtualization, cloud deployment, high availability
    
HP - Intel® Xeon® processors
Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few “must have” features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization
    
Symantec
Published By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
This white paper explains how to utilize these capabilities in order to respond to challenges quickly in complex data center environments. Find out how you can take advantage of these new designs and tools to reduce support costs.
Tags : 
hardware innovation, support automation, intel, complex data, design, support costs reduced, cost savings, it management
    
Sponsored by HP and Intel®
Published By: Seamless     Published Date: Sep 16, 2013
Learn how fostering a strong corporate culture can help build success in your business by attracting and retaining top talent
Tags : 
corporate culture, top talent, business, workplace environments, seamless, culture, common practices
    
Seamless
Published By: NETIQ     Published Date: Mar 12, 2013
NetIQ’s Identity, Access and Security Management solutions integrate seamlessly to help you control access to cloud services and data, reduce your risk of data breaches in mixed environments.
Tags : 
security and compliance in the cloud
    
NETIQ
Published By: SafeNet     Published Date: Mar 29, 2013
The move to the cloud and virtualized environments along with an increasingly mobile workforce, emerging employee BYOD trends and the adoption of cloud based applications is blurring the boundaries of the traditional network security perimeter.
Tags : 
authentication, byod, mobile workforce, it security, key management
    
SafeNet
Start   Previous    35 36 37 38 39 40 41 42 43 44 45 46 47 48 49    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.