environments

Results 951 - 975 of 1178Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Apr 10, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
security, data center, performance, virtualization, application, internet, functionality
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
The evolution from business connectivity to business mobility is unlike previous compute transitions because it redefines how people work. Historically, companies provided access to the necessary applications and data from corporate-issued devices such as laptops and desktops in controlled operating environments. This tightly integrated environment tethered workers to a specific device and operating system, and even sometimes to a location. Mobility breaks these shackles and enables workers to change the way they work.
Tags : 
cisco, zk research, mobile workplace, mobile deployment, mobile computing, it management
    
Cisco
Published By: Cisco     Published Date: May 21, 2015
CIOs and IT professionals know that as their businesses grow, the need for computing also grows, making it necessary to add servers to existing environments. While this process can be time consuming and potentially complicated, it doesn't have to be.
Tags : 
blades, servers, comparison, cisco
    
Cisco
Published By: Cisco     Published Date: May 21, 2015
Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
virtualization, cisco, data center, applications, private cloud
    
Cisco
Published By: Cisco     Published Date: Jun 02, 2015
Today, many businesses fall short in realizing the full potential of their virtualization and private cloud strategies. Rigid infrastructure and architectural complexity are key blockers that must be overcome.
Tags : 
management, network, cloud, server, data center, infrastructure
    
Cisco
Published By: Cisco     Published Date: Jul 10, 2015
Today’s multivector and persistent threats, fluid IT environments, and increasing user mobility are prompting more organizations to seek NGFW capability that provides affordable and effective layered threat protection.
Tags : 
security, ngfw, firewall, threat detection, technology, smd, midisized
    
Cisco
Published By: Cisco     Published Date: Sep 16, 2015
. This Technology Spotlight examines the critical role unified infrastructure and cloud management will play in the transformation of today's datacenter operations environments.
Tags : 
ucs, unified computing system, infrastructure, enterprise, it barriers
    
Cisco
Published By: Cisco     Published Date: Oct 14, 2015
Malware knows no boundaries. Neither should your advanced malware protection solution. Cisco offers the industry’s broadest portfolio of Advanced Malware Protection (AMP) products available for all enforcement points in the extended network wherever threats can manifest: endpoints, network appliances, secure content gateways, mobile devices, and virtual environments.
Tags : 
cisco, malware protection, security, nss, malware protection solution, advanced malware protection, amp, endpoints, mobile devices, virtual environments
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2015
Technological integration doesn’t happen overnight, of course. It takes years of behind-the-scenes teamwork and engineering—backed by decades of expertise, research, and development—to have a broad and lasting impact. This special edition of Unleashing IT highlights the fruits of those labors, showcasing the unparalleled alignment of Microsoft, Cisco, and Intel technologies. In the following pages, you’ll read about the advancement and unique value of integrated solutions, spanning cloud environments, data centers, and management tools. You’ll also hear from organizations that are taking advantage of these converged technologies, including King County, Provincia Net, and Swinburne University. With Microsoft, Cisco, and Intel, you have a triad of innovators and leaders that recognize the value of integration, virtualization, and unified management. A triad that continues to work behind-the-scenes to reduce the complexity and increase the capability of enterprise solutions.
Tags : 
cisco, technological integration, unleashing it, integrated solutions, cloud environments, data centers, management tools
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
In the last few months, WR has observed that the SX10 has found its way into offices and small meeting rooms of many of our enterprise consulting clients. In some cases, the SX10 was the first Cisco video product ever installed in those environments. This prompted us to take a closer look at this system. This document contains the results of WR’s independent, third-party testing, and our overall opinions of the Cisco TelePresence SX10 Quick Set group video conferencing system.1
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Pulsant is a United Kingdom-based IT infrastructure services provider focused on the small and medium-sized enterprise market. It offers public, private, and hybrid cloud services and a variety of managed, collocation, and professional services. Pulsant was one of the first cloud service providers to embrace software-defined networking (SDN) as a way to simplify its IT infrastructure, unify control of physical and virtual environments, and reduce capital expenses (capex) and operating expenses (opex). After evaluating a number of vendors, Pulsant chose Cisco's Application Centric Infrastructure (ACI) as the best SDN solution for delivering its hybrid cloud services.
Tags : 
    
Cisco
Published By: HP Enterprise Services     Published Date: Mar 24, 2014
Today’s complex, rapidly changing IT environments require dynamic continuity programs. Your peers are reassessing both the service provider model and the internal alternative for business continuity. It’s time to learn the ins and outs of enterprise-class cloud-based continuity. Examine how traditional IT operations can be recovered to the cloud. Explore the requirements of the disaster-recovery-as-a-service model. Understand the key issues to evaluate when considering a cloud-oriented approach to disaster recovery.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity
    
HP Enterprise Services
Published By: Polycom     Published Date: Aug 17, 2017
"Polycom offers a broad selection of easy-to-use, high-quality desk phones, conference phones, and applications. This guide describes the important collaboration features and benefits of Polycom voice solutions and explains how they can be used in different meeting environments. Want to know more? Download our guide! "
Tags : 
polycom, business phone, video conferencing
    
Polycom
Published By: Polycom     Published Date: Nov 30, 2017
With the increase in mobility and the growth of distributed teams, it’s essential that you select audio devices that offer the best flexibility, quality and reach needed to support collaboration anywhere on any device. To meet these requirements, Polycom offers a broad selection of easy-to-use, high-quality desk phones, conference phones, and applications. The phones support crystal-clear conversations and seamlessly integrate with a wide range of communication environments including open-SIP and Skype for Business and Office 365. This comprehensive guide will provide you: • Guidance on selecting devices for different workspaces • Information on the newest collaboration features and benefits • Overview and comparison of the latest Polycom desk phones and conference phones
Tags : 
voice collaboration, communication environments, polycom, microsoft office 365, skype for business
    
Polycom
Published By: NEC     Published Date: Nov 12, 2014
In this webinar an expert panel will examine the security and visibility needs of mesh SDN networks by examining the security challenges faced by businesses in distributed SDN environments. The webinar will also present real-world case studies of companies who excelling at providing a superior customer experience for their applications and their sites.
Tags : 
nec, software defined networking, sdn, lan, land area network, wifi, wireless network, network management, business network, network security
    
NEC
Published By: Symantec     Published Date: Oct 20, 2014
This paper examines the advantages that the integration of Red Hat Enterprise Virtualization and Symantec Cluster Server provides to address application high availability and disaster recovery for virtualized environments.
Tags : 
symantec, red hat, virtualization, disaster recovery, clustering, virtualized applications
    
Symantec
Published By: Emerson     Published Date: Nov 17, 2014
If the data center is the heart of the organization then the data center operators are the eyes. But today’s complex business environments also demand agility and flexibility to meet the requirements of your organization. Download this free paper to improve the data center visibility in your organization.
Tags : 
emerson, dcim, data center, data center management, servers, storage
    
Emerson
Published By: newrow_     Published Date: Mar 11, 2015
In 2013, over 7.1 million college students enrolled in an online course,contributing to the steady 260 percent increase in online enrollment over the last decade. As the current and future student populations -- made up of Millennials and Gen Zs, a generation collectively now referred to as Generation C -- become even more digitally reliant, we’ll see more students flock in record breaking numbers to more flexible learning environments.
Tags : 
newrow, student directed learning, online learning programs, online enrollment, mobile learning
    
newrow_
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis
    
Cisco
Published By: Lenovo and Intel®     Published Date: Sep 12, 2018
IT teams today are under pressure to build on-premises environments that mimic the agility and flexibility of public cloud services. It’s a challenge for IT teams to choose the right technology to invest in for servicing on-premises workloads. With high automation and minimal configuration or management, composable infrastructure fast tracks IT modernization by aligning IT delivery and operations, giving seamless access to dynamic, automated resources that can react in real-time.
Tags : 
    
Lenovo and Intel®
Published By: Lenovo and Intel®     Published Date: Jan 15, 2019
A private cloud delivers control, security and customization–which are non-negotiable criteria for many businesses. But for those undeniable benefits, private cloud environments come at a cost, requiring significant initial and ongoing investment of both capital and human resources, as well as requiring expert technical support for architecting and upkeep. In this study by Principled Technologies, read how the highly automated Lenovo ThinkAgile CP composable cloud solution, powered by the Intel® Xeon® Platinum processor, deliver key private cloud benefits while remaining cost effective, rapid to deploy, and simple to manage.
Tags : 
    
Lenovo and Intel®
Published By: Cisco     Published Date: Feb 16, 2016
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable.
Tags : 
data, business practices, data management, data security, software, applications, data management/analytics
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco
Published By: DocuSign     Published Date: Jul 12, 2019
If you’re in charge of your company’s recruiting and onboarding, you know that attracting and retaining top talent is more difficult than ever. This is no surprise: Job seekers have an abundant choice of employers. According to the U.S. Bureau of Labor Statistics, today there are fewer unemployed Americans (6.2 million)1 than there are available jobs (7.6 million).2 In order to attract top talent, companies need modern, sophisticated—and digital— recruiting and onboarding processes. Millennials, who now make up the majority of the workforce, and Gen Z are digital natives who expect their work environments to reflect a hyper-connected world.3 In a Microsoft survey, 93 percent of millennials said that the latest technology was important to them when choosing an employer.4 However, despite the increasing need for digitization in recruiting and onboarding, many companies still have highly manual processes and legacy systems of agreement. Consequently, HR staff slogs through hours using ana
Tags : 
    
DocuSign
Published By: IBM     Published Date: Dec 03, 2015
This research paper from Saugatuck Technology discusses the multi-sourced hybrid IT environment, including how to recognize the needs that can increase costs and compromise operations, and how to optimize the environments for peak effectiveness.  
Tags : 
ibm, hybrid it, saugatuck technology
    
IBM
Start   Previous    32 33 34 35 36 37 38 39 40 41 42 43 44 45 46    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.