RSS feed Get our RSS feed

News by Topic

data requirements

Results 151 - 175 of 322Sort Results By: Published Date | Title | Company Name
By: IBM Corporation     Published Date: Oct 20, 2011
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk.
Tags : ibm, guardium, technology, data, security, privacy, risk reduction
     IBM Corporation
By: NetApp     Published Date: Apr 02, 2014
According to this global survey, in three years more than half of all IT services will be delivered via private, public and hybrid clouds. This study highlights the challenges faced by IT organizations as they move into a new role as “cloud brokers” and how a common data platform can help enable seamless data management across multiple clouds.
Tags : netapp, software storage, sds, forrester, software defined storage, data center, performace, capacity requirements
     NetApp
By: CA Technologies     Published Date: Jun 03, 2015
The complexity and high level of integration inherent in SAP environments can make development especially challenging and increase the time required to bring solutions to market. Persistent development and test challenges include unavailable systems, inability to accurately model performance and complex test data requirements. By employing service virtualization to model the core business logic in SAP systems and integrations, teams can free themselves of these constraints, leading to faster build and test cycles, better quality and lower cost.
Tags : 
     CA Technologies
By: AWS     Published Date: Nov 15, 2018
"Riteway Sales and Marketing, who helps many Southeastern supermarkets execute marketing strategies, needed an intuitive solution to visualize data in multiple ways, including geographic coding that could map gathered data to store locations. TIBCO® Spotfire® for Amazon Web Services cloud met their requirements and exceeded them. After deploying this solution, Riteway’s Director of Insights and Marketing, Elisa Westlund, claimed that their time-to-insight rose to 93% faster than it was before using it. When analyzing a product category, they found that what used to take a week for their team to accomplish could now be completed in only hours. Download this case study to learn more about TIBCO Spotfire’s benefits, including: • Riteway’s claim of time-to-insight that rose 93% faster than before using TIBCO Spotfire • A complete return on investment in just one year • 100% adoption among their business users, due to TIBCO Spotfire’s ease of use"
Tags : 
     AWS
By: Forcepoint     Published Date: May 14, 2019
The EU General Data Protection Regulation (GDPR) is not in effect, requiring global organizations to significantly address how they process and protect the personal data of EU citizens. Yet, Gartner predicted, “Less than 50% of all organizations impacted will fully comply with GDPR.”* Confused about the requirements and what next steps to take? Read our GDPR eBook to learn about the regulation and its key requirements. *Gartner, GDPR Clarity: 19 Frequently Asked Questions Answered, by Bart Wilemsen, 29 August 2017
Tags : 
     Forcepoint
By: Veeam '18     Published Date: May 01, 2019
The digital revolution is transforming every industry. Yet it also brings new challenges: threats to the security and Availability of mission-critical data and services. Approximately 80% of IT decision-makers say their organization has an Availability gap, that is, a failure to meet recovery requirements—a common issue across all industries. 75% say they also have a data protection gap, meaning they are unable to protect their data frequently enough to ensure that business units’ expectations against data loss are being met.
Tags : 
     Veeam '18
By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Organizations are increasingly moving their mission-critical applications and data to Amazon Web Services (AWS) and taking advantage of the massive compute power of Amazon Elastic Compute Cloud (Amazon EC2). The CrowdStrike Falcon® platform for AWS provides extensive and detailed visibility over Amazon EC2 instances, helping to improve an organization’s overall security posture. Learn how CrowdStrike® Falcon Discover™ enables IT security professionals to quickly identify and stop threats. Download this solution brief to learn how you can help satisfy your security requirements by: • Monitoring and searching metadata to improve security posture • Reviewing the rate of the Amazon EC2 instances launched over time • Gaining additional context surrounding alerts"
Tags : 
     AWS - ROI DNA
By: Riverbed     Published Date: Nov 30, 2016
Digital transformation on the 3rd Platform continues to present unprecedented opportunities and challenges for enterprise networks and the IT professionals who operate them. Indeed, the requirements associated with cloud computing have already reverberated through data center networking, with software-defined networking (SDN) arising as an architectural approach that provided the network with the agility and responsiveness that it lacked previously but has come to require. Now, the focus is turning to how the WAN must change to accommodate the requirements of cloud applications and services. Fortunately, technologies such as hybrid WAN and software-defined WAN (SD-WAN) are coming to the rescue, giving enterprise IT the means to allow the WAN to meet these challenges directly.
Tags : 
     Riverbed
By: ALE     Published Date: Jan 10, 2019
Departments of roads and highways around the world have begun to implement technology solutions to improve the safety of their highways, lessen congestion and manage traffic more efficiently. Intelligent Transport Systems (ITS), as these systems are known, require reliable, secure and scalable networks to link cameras, sensors, signage, signaling and vehicles to remote data centers and operation centers. These networks will be deployed in harsh environments and will pose their own unique challenges to operate, maintain and manage. In this application note, we will present the unique requirements of ITS networks and discuss how AlcatelLucent Enterprise products and technologies not only meet today’s ITS requirements, but are designed to grow and scale to meet tomorrow’s as well.
Tags : 
     ALE
By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : trigeo network security, payment card industry (pci), data security standard (dss), security
     TriGeo Network Security
By: HP Data Center     Published Date: Feb 18, 2009
Today's data centers are embarking down a path in which "old world" business, technology, and facility metrics are being pushed aside in order to provide unparalleled service delivery capabilities, processes, and methodologies. The expectations derived from today’s high-density technology deployments are driving service delivery models to extremes with very high service delivery capabilities adopted as baseline requirements within today’s stringent business models. Part of the "revolution" that is driving today's data center modeling to unprecedented high performance and efficiency levels is the fact that computer processing advances with regard to high-performance and smaller footprints have truly countered each other.
Tags : hp data center, data center enfironment, high density computing, rack-mount servers, mep mechanical, electrical, and plumbing, virtualization
     HP Data Center
By: HP Data Center     Published Date: Mar 25, 2009
When considering server virtualization, planning and design are critical.  How do you optimize your environment through virtualization?  How do you keep your server sprawl from becoming virtual server sprawl?  How will a virtualized environment help your business?  Will your existing data center meet current, and future, business requirements? Answer your Questions today!
Tags : hp data center, virtualization, server planning, server design, server sprawl, tco, roi, server consolidation
     HP Data Center
By: Layered Tech, Inc.     Published Date: Dec 16, 2010
Layered Tech's engineers created a customized package of virtual private data centers (VPDCs), managed services and disaster recovery solutions that support KANA's clients, large and small. Layered Tech tailored the architecture to meet the highest enterprise security requirements, as well as ensuring that each KANA client can deploy applications that scale to ongoing volume fluctuations.
Tags : layered tech, kana, virtual private data center, enterprise security, vpdc, disaster recovery, customer interaction
     Layered Tech, Inc.
By: Citrix Systems     Published Date: Apr 15, 2016
Desktop virtualization is a powerful driver of business transformation, making it possible to deliver the apps and data people depend on to get work done. Learn how Citrix XenDesktop allows you to balance user requirements and costs for each use case.
Tags : vdi, it challenges, desktop virtualization, xendesktop
     Citrix Systems
By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data
     ForeScout
By: McAfee     Published Date: Jan 28, 2013
Re-think your DLP — This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.
Tags : dlp, business-centric dlp, dlp business rules, discovery, classification, policy management, security controls
     McAfee
By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases
     McAfee
By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance
     McAfee
By: McAfee     Published Date: Mar 08, 2013
McAfee® Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization
     McAfee
By: Viavi Solutions     Published Date: Apr 14, 2017
NPMD solutions are typically not directly involved in the actual card cardholder transaction. However, given that many can potentially capture and transmit cardholder data they must be viewed as an integral part of a business’ PCI DSS compliance strategy, especially when investigating data breaches for the purposes of reporting or remediation. Therefore, beyond satisfying your service delivery monitoring and troubleshooting requirements, be sure to verify your NPMD solution protects cardholder data and aids your efforts in PCI DSS compliance.
Tags : network security, account security, data management, network protection, secure systems, application security, network performance, network diagnostics
     Viavi Solutions
By: Compass Datacenters     Published Date: Jul 07, 2015
Read this white paper to learn why ensuring that your data center is in compliance with the appropriate requirements is extremely important.
Tags : data center compliance, data center requirements, data center regulations
     Compass Datacenters
By: Cisco     Published Date: May 14, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
     Cisco
By: Datastax     Published Date: Apr 04, 2017
As the big data ecosystem continues to expand, new technologies are addressing the requirements for managing, processing, analyzing, and storing data to help companies benefit from the rich sources of information flowing into their organizations. From NoSQL databases to open source projects to commercial products offered on-premises and in the cloud, the future of big data is being driven by innovative new approaches across the data management lifecycle. The most pressing areas include real-time data processing, interactive analysis, data integration, data governance, and security. Download this report for a better understanding of the current landscape, emerging best practices and real-world successes.
Tags : evolution, big data, technology, datastax, nosql
     Datastax
By: Datastax     Published Date: Apr 04, 2017
For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution.
Tags : database, cloud, applications, endpoint, datastax
     Datastax
By: Datastax     Published Date: Aug 03, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
     Datastax
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics