environments

Results 901 - 925 of 1236Sort Results By: Published Date | Title | Company Name
Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn how IT pros should be able to leverage essential cloud services while meeting enterprise security requirements by taking into consideration a number of fundamental security principles and best practices, by understanding the specific security needs of an enterprise and evaluating different cloud environments and models, and by asking vendors the right questions
Tags : 
enterprise it, cloud deployments, cloud platorms, public cloud, private cloud, hybrid cloud, saas, iaas
    
AT&T
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.
Tags : 
    
Cisco Umbrella EMEA
Published By: Faronics     Published Date: Sep 10, 2008
IT Managers are tasked with making the desktop environment more secure and locked down to a uniform corporate standard, yet flexible enough to handle the myriad of exceptions that arise across the enterprise. Centralized Configuration Management (CCM) tools are great, especially in environments with branch offices. But CCM tools can’t do the big job of making your environment inherently more secure or more flexible.
Tags : 
security, configuration management, faronics, cmdb, desktop security, it management, ccm
    
Faronics
Published By: IBM     Published Date: Feb 11, 2015
Securely connect people, applications and devices to cloud environments. While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is different. Read this whitepaper to learn more about how: · Threat-aware identity and access management can strengthen security in each of the cloud delivery models · Self-service IAM solution can provide higher level of Security in Cloud as compared to on-premise
Tags : 
cloud environment, iaas, paas, saas, access management
    
IBM
Published By: Endace     Published Date: Apr 12, 2012
In this whitepaper find out what you need to know about network visibility, network security and network forensics in 1, 10, 40 and 100Gbps network environments.
Tags : 
endace, pack capture
    
Endace
Published By: Polycom     Published Date: Nov 09, 2015
Voice conferencing is as ubiquitous as the traditional two-way telephone conversation—maybe even more so for many of today’s businesses.
Tags : 
polycom, voice conferencing, room environments, soundstation, call experience, e-commerce, sales
    
Polycom
Published By: SWsoft     Published Date: Aug 21, 2009
This joint Intel white paper explores how to address virtualization in an environment with high I/O. The paper includes a technology overview, network concerns and explains how Virtuozzo and Intel are well suited for the high I/O environment.
Tags : 
virtualization, network management, i/o, input/output, high i/o, intel, servers, server virtualization
    
SWsoft
Published By: IBM     Published Date: Oct 10, 2014
This book gives you insight into what it means to leverage service virtualization in your testing environments.
Tags : 
ibm, virtualization, service virtualization, service components, deploying service, team productivity, software quality, dependent services
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business. To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize
Tags : 
scalability, data warehousing, resource planning
    
IBM
Published By: IBM     Published Date: Oct 03, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business.
Tags : 
data, enterprise resource planning, customer relationship management, business intelligence, data management systems
    
IBM
Published By: IBM     Published Date: Oct 17, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business. To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize
Tags : 
    
IBM
Published By: NetApp     Published Date: Jun 16, 2014
Learn the benefits of converged infrastructure solution for virtualized environments and the key considerations for choosing the best platform for your midsize enterprise.
Tags : 
netapp, midsize it infrastructure, converged infrastructure, flexpod express, it responsiveness
    
NetApp
Published By: NetApp     Published Date: Jun 18, 2014
Learn the benefits of converged infrastructure solution for virtualized environments and the key considerations for choosing the best platform for your midsize enterprise.
Tags : 
netapp, midsize it infrastructure, converged infrastructure, flexpod express, it responsiveness
    
NetApp
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: Mocana     Published Date: Jun 18, 2010
Learn how Mocana's NanoSec can speed your product development cycle while providing best-in-class device security for resource-constrained environments. Download the product whitepaper and receive a free trial.
Tags : 
mocana, nanosec, ipsec, embedded devices, product development cycle, device security
    
Mocana
Published By: Dell EMC     Published Date: Nov 02, 2015
For remote offices and branch offices (ROBOs), effective server performance is critical. This white paper introduces a server solution featuring Intel® Xeon® processors that provides simplicity, efficiency, and versatility for these office environments.
Tags : 
    
Dell EMC
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Processeur Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: Cisco     Published Date: Dec 23, 2014
Learn challenges and benefits in this white paper from Enterprise Strategy Group (ESG).
Tags : 
the cloud, cloud computing, transitioning
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
Learn how to simplify and accelerate your journey to hybrid cloud deployment.
Tags : 
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Read this whitepaper to learn why enterprises are rapidly adopting cloud computing solutions in order to meet dynamically changing business requirements.
Tags : 
cloud computing, erp, productivity, applications, efficiency, hybrid, cisco
    
Cisco
Published By: Dell Storage     Published Date: Oct 17, 2011
The VMware® vCenter Plug-In for Dell PowerVault MD Series storage arrays enables VMware administrators to perform a wide range of storage provisioning and management tasks themselves - without having to rely on external IT resources.
Tags : 
vnware, dell, technology, powervault, storage management, storage, virtual
    
Dell Storage
Published By: Dell Storage     Published Date: Nov 08, 2011
The VMware® vCenter Plug-In for Dell PowerVault MD Series storage arrays enables VMware administrators to perform a wide range of storage provisioning and management tasks themselves - without having to rely on external IT resources.
Tags : 
vnware, dell, technology, powervault, storage management, storage, virtual
    
Dell Storage
Published By: Cisco     Published Date: Dec 28, 2015
Cloud adoption is an expanding part of IT organizations’ strategies, and IT architects are growing more sophisticated in how they think about cloud; however, as of early 2015, relatively few organizations have truly advanced levels of cloud maturity. In IDC’s recent worldwide CloudView Survey, we discovered that nearly 60% of organizations are currently using or planning to implement some form of cloud — whether for a single project or their portfolio, for test/development environments, or to run mission-critical applications 24 x 7 — but only 25% have reached the level that IDC would call “mature”— that is, building repeatable, managed, or optimized cloud strategies. There is significant room for improvement.
Tags : 
cisco, cloud adoption, public cloud, private cloud, productivity, idc, cloudview survey
    
Cisco
Start   Previous    30 31 32 33 34 35 36 37 38 39 40 41 42 43 44    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.