environments

Results 151 - 175 of 1169Sort Results By: Published Date | Title | Company Name
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, pci, pci dss, payment card industry, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective
    
Centrify Corporation
Published By: Cenzic     Published Date: Nov 11, 2008
This white paper highlights Cenzic’s recommendation of a process of continuous assessment for applications in development and production environments -- a process that can equally apply to Intranet and public facing applications alike. Continuous testing can now be easily and safely done in a virtualized environment; no longer putting production web applications at risk. Companies can now easily and quickly, add vulnerability testing to their list of activities for all of their Web applications including production applications. Using a testing methodology across a company’s Web application portfolio will significantly enhance the security of all Web applications.
Tags : 
web application security, testing web applications, cenzic, assessments for web applications
    
Cenzic
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: Cisco     Published Date: Dec 15, 2010
This document discusses the requirements for job scheduling software in complex IT environments with multiple interconnected enterprise-class applications that touch every aspect of the organization.
Tags : 
cisco, enterprise-class job scheduling, delivery, business processes, automation software, data center, systems management, backup and recovery, network management, systems security, custom scripting
    
Cisco
Published By: Cisco     Published Date: Jul 01, 2011
Read this white paper to learn how IT organizations can implement an effective Service Catalog that will enable them to reap the full benefits of self-service in virtualized and cloud computing environments.
Tags : 
cisco, automization, service catalog, self-service, datacenter, virtualization, private cloud, infrastructure, newscale
    
Cisco
Published By: Cisco     Published Date: Jul 27, 2011
Read this white paper to learn how IT organizations can implement an effective Service Catalog that will enable them to reap the full benefits of self-service in virtualized and cloud computing environments.
Tags : 
cisco, automization, service catalog, self-service, datacenter, virtualization, private cloud, infrastructure, newscale
    
Cisco
Published By: Cisco     Published Date: Dec 23, 2014
Learn challenges and benefits in this white paper from Enterprise Strategy Group (ESG).
Tags : 
the cloud, cloud computing, transitioning
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Virtualization has transformed the data center over the past decade. IT departments use virtualization to consolidate multiple server workloads onto a smaller number of more powerful servers. They use virtualization to scale existing applications by adding more virtual machines to support them, and they deploy new applications without having to purchase additional servers to do so. They achieve greater resource utilization by balancing workloads across a large pool of servers in real time—and they respond more quickly to changes in workload or server availability by moving virtual machines between physical servers. Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Cisco Unified Data Center unifies compute, storage, netw orking, virtualization, and management into a single platform. The result is operational simplicity and business agility -- essential for cloud computing and deploying IT as a Service.
Tags : 
solution guide, integrate, infrastructure, solutions, applications
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
Learn how to simplify and accelerate your journey to hybrid cloud deployment.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
security, data center, performance, virtualization, application, internet, functionality
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
The evolution from business connectivity to business mobility is unlike previous compute transitions because it redefines how people work. Historically, companies provided access to the necessary applications and data from corporate-issued devices such as laptops and desktops in controlled operating environments. This tightly integrated environment tethered workers to a specific device and operating system, and even sometimes to a location. Mobility breaks these shackles and enables workers to change the way they work.
Tags : 
cisco, zk research, mobile workplace, mobile deployment, mobile computing, it management
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Read this whitepaper to learn why enterprises are rapidly adopting cloud computing solutions in order to meet dynamically changing business requirements.
Tags : 
cloud computing, erp, productivity, applications, efficiency, hybrid, cisco
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
cloud computing, erp, productivity, applications, efficiency, unified computing, cisco
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
Cisco Unified Data Center unifies compute, storage, networking, virtualization, and management into a single platform. The result is operational simplicity and business agility -- essential for cloud computing and deploying IT as a Service.
Tags : 
data center, software, networking, infrastructure, applications, cisco
    
Cisco
Published By: Cisco     Published Date: May 21, 2015
CIOs and IT professionals know that as their businesses grow, the need for computing also grows, making it necessary to add servers to existing environments. While this process can be time consuming and potentially complicated, it doesn't have to be.
Tags : 
blades, servers, comparison, cisco
    
Cisco
Published By: Cisco     Published Date: May 21, 2015
Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
virtualization, cisco, data center, applications, private cloud
    
Cisco
Published By: Cisco     Published Date: Jun 02, 2015
Today, many businesses fall short in realizing the full potential of their virtualization and private cloud strategies. Rigid infrastructure and architectural complexity are key blockers that must be overcome.
Tags : 
management, network, cloud, server, data center, infrastructure
    
Cisco
Published By: Cisco     Published Date: Jul 10, 2015
Today’s multivector and persistent threats, fluid IT environments, and increasing user mobility are prompting more organizations to seek NGFW capability that provides affordable and effective layered threat protection.
Tags : 
security, ngfw, firewall, threat detection, technology, smd, midisized
    
Cisco
Published By: Cisco     Published Date: Aug 28, 2015
IDC research shows that an increasing number of organizations are looking to deploy OpenStack as the foundation for their cloud environments to provide a more agile but secure IT backbone to enable, and in some cases transform key business processes.
Tags : 
openstack, enterprise, cloud computing, agile
    
Cisco
Published By: Cisco     Published Date: Sep 16, 2015
. This Technology Spotlight examines the critical role unified infrastructure and cloud management will play in the transformation of today's datacenter operations environments.
Tags : 
ucs, unified computing system, infrastructure, enterprise, it barriers
    
Cisco
Published By: Cisco     Published Date: Oct 14, 2015
Malware knows no boundaries. Neither should your advanced malware protection solution. Cisco offers the industry’s broadest portfolio of Advanced Malware Protection (AMP) products available for all enforcement points in the extended network wherever threats can manifest: endpoints, network appliances, secure content gateways, mobile devices, and virtual environments.
Tags : 
cisco, malware protection, security, nss, malware protection solution, advanced malware protection, amp, endpoints, mobile devices, virtual environments
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2015
Technological integration doesn’t happen overnight, of course. It takes years of behind-the-scenes teamwork and engineering—backed by decades of expertise, research, and development—to have a broad and lasting impact. This special edition of Unleashing IT highlights the fruits of those labors, showcasing the unparalleled alignment of Microsoft, Cisco, and Intel technologies. In the following pages, you’ll read about the advancement and unique value of integrated solutions, spanning cloud environments, data centers, and management tools. You’ll also hear from organizations that are taking advantage of these converged technologies, including King County, Provincia Net, and Swinburne University. With Microsoft, Cisco, and Intel, you have a triad of innovators and leaders that recognize the value of integration, virtualization, and unified management. A triad that continues to work behind-the-scenes to reduce the complexity and increase the capability of enterprise solutions.
Tags : 
cisco, technological integration, unleashing it, integrated solutions, cloud environments, data centers, management tools
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.