RSS feed Get our RSS feed

News by Topic

data requirements

Results 226 - 250 of 325Sort Results By: Published Date | Title | Company Name
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions
     Alert Logic and Sungard Availability Services
By: Arcserve     Published Date: Jun 11, 2014
Virtualization has without doubt enabled IT organizations to obtain maximum efficiency from their physical hardware, but virtualization has also increased the complexity these organizations have to manage, and that includes data protection. This paper discusses some of the hidden complexities virtualization introduces to backup and recovery requirements, and the challenges created when backup involves a combination of physical servers and virtual machines. It also discusses ways that backup and recovery processes can be simplified by avoiding point solutions.
Tags : arcserve, next generation architecture, data protection, data protection operations, metrics, security
     Arcserve
By: HP     Published Date: Jun 05, 2014
HP commissioned Forrester Consulting in October 2013 to leverage existing Forrsights data and to survey IT hardware decision-makers in North America and Europe about their storage requirements for this Technology Adoption Profile.
Tags : hewlett packard, data, backup, . data protections, recovery, deduplication, storeonce
     HP
By: Schneider Electric     Published Date: Jun 04, 2014
When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both quantitative and qualitative differences to consider. The 10-year TCO may favor upgrading or building over outsourcing, however, this paper demonstrates that the economics may be overwhelmed by a business’ sensitivity to cash flow, cash cross-over point, deployment timeframe, data center life expectancy, regulatory requirements, and other strategic factors. This paper discusses how to assess these key factors to help make a sound decision.
Tags : schneider, electric, data, infrastructure, upgrade, retail, outsource, own
     Schneider Electric
By: IBM     Published Date: May 28, 2014
Read the whitepaper to find out how one client improved business value of their data by implementing InfoSphere Optim processes and technologies.
Tags : ibm, data lifecycle management, infosphere optim, integrating big data, governing big data, integration, best practices, big data
     IBM
By: IBM     Published Date: May 28, 2014
Different types of data have different data retention requirements. In establishing information governance and database archiving policies, take a holistic approach by understanding where the data exists, classifying the data, and archiving the data. IBM InfoSphere Optim™ Archive solution can help enterprises manage and support data retention policies by archiving historical data and storing that data in its original business context, all while controlling growing data volumes and improving application performance. This approach helps support long-term data retention by archiving data in a way that allows it to be accessed independently of the original application.
Tags : ibm, data retention, information governance, archiving, historical data, integrating big data, governing big data, integration
     IBM
By: SAP     Published Date: May 18, 2014
This TDWI Checklist Report presents requirements for analytic DBMSs with a focus on their use with big data. Along the way, the report also defines the many techniques and tool types involved. The requirements checklist and definitions can assist users who are currently evaluating analytic databases and/or developing strategies for big data analytics.
Tags : sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
     SAP
By: HP     Published Date: May 14, 2014
As a long-time leader in data protection and backup solutions, and with innovations such as HP StoreOnce deduplication, HP TapeAssure and HP StoreOpen with LTFS, HP understands your immediate requirements and strategic business direction. With an integrated approach to comprehensive business protection, we can help you safeguard the integrity of your data and rapidly restore access whenever, wherever, and however you need it.
Tags : hewlett packard, data protection, storeonce, tapeassure, ltfs
     HP
By: HP     Published Date: May 14, 2014
HP commissioned Forrester Consulting in October 2013 to leverage existing Forrsights data and to survey IT hardware decision-makers in North America and Europe about their storage requirements for this Technology Adoption Profile.
Tags : forrester, it hardware, storage requirements, it decision makers
     HP
By: IBM     Published Date: May 02, 2014
The end-to-end information integration capabilities of IBM® InfoSphere® Information Server are designed to help organizations understand, cleanse, monitor, transform and deliver data—as well as collaborate to bridge the gap between business and IT.
Tags : ibm, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility
     IBM
By: IBM     Published Date: May 02, 2014
This eBookoutlines the best practices for data lifecycle management and how InfoSphere Optimsolutions enable organizations to support and implement them.
Tags : ibm, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility
     IBM
By: Interactive Intelligence     Published Date: Apr 23, 2014
Customer Experience (CX) and Net Promoter Score (NPS) are two of the benchmark measurements companies now use to gauge customer satisfaction. And to understand how budgetary decisions impact CX and NPS outcomes, companies are turning to advanced contact center technology for strategic planning and big data. But business requirements to manage these outcomes successfully must incorporate back-office operations as well as the contact center. Read why.
Tags : contact center, contact center strategy, customer experience, optimization, strategic planning, budgeting tools, workforce management solutions, call center
     Interactive Intelligence
By: NetApp     Published Date: Apr 02, 2014
According to this global survey, in three years more than half of all IT services will be delivered via private, public and hybrid clouds. This study highlights the challenges faced by IT organizations as they move into a new role as “cloud brokers” and how a common data platform can help enable seamless data management across multiple clouds.
Tags : netapp, software storage, sds, forrester, software defined storage, data center, performace, capacity requirements
     NetApp
By: EMC Corporation     Published Date: Mar 20, 2014
Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Tags : emc, big data, incident response, malware detection, security journey, reduce risk, improve security, budget constraints
     EMC Corporation
By: MapR Technologies     Published Date: Jan 03, 2014
As the demand for Big Data analytics mushrooms, IT decision-makers must prepare for the widespread deployment of Hadoop. This Technical Insight Paper from the Evaluator Group outlines the key requirements that must be met to make Hadoop enterprise data center ready.
Tags : big data, big data analytics, hadoop, apache hadoop, structured data, unstructured data, business analytics, metadata
     MapR Technologies
By: IBM     Published Date: Jan 02, 2014
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server "footprint" size and overall electrical requirements, resulted in significant reductions in ongoing costs, or opex, per 100 end users supported.
Tags : ibm, idc, server transition, server alternatives, business value, operating costs, hardware platforms, server life cycles
     IBM
By: Collaborative Consulting     Published Date: Dec 23, 2013
There are some surprisingly straightforward reasons behind the glitches, delays, and cost-overruns that can bedevil data warehouse initiatives. ...The first is simply confusing expectations with requirements. But four other troublemakers can also lead to big problems for developers, IT departments, and organizations seeking to maximize the business value of information.
Tags : collaborative consulting, data warehouse, failed projects, business intelligence, business solution, meet expectations, big data, profile importance
     Collaborative Consulting
By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management
     Attachmate
By: Fortinet, Inc     Published Date: Nov 14, 2013
This paper discusses the capacity of Fortinet’s high performance, high capacity data center solution with the ability to eliminate bottlenecks and meet unique requirements.
Tags : data center, asic, low latency, firewall, fortinet, palo alto networks, cisco, juniper
     Fortinet, Inc
By: Silver Peak     Published Date: Oct 28, 2013
Enterprises have long been battling the inherent performance limitations of Wide Area Networks (WANs) when delivering applications to remote offices. Caching emerged in the 1990’s as a potential way of addressing this problem, accelerating the performance of specific applications, such as web services, while reducing overall WAN traffic. While caching achieved reasonable success for a few short years, the market for these point products ultimately subsided as a result of several operational and functional limitations. Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. The result is a complete solution for improved application delivery across a distributed enterprise environment.
Tags : silver peak, network memory, application caching, wan, caching
     Silver Peak
By: RSA Security     Published Date: Oct 24, 2013
Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Tags : rsa, emc, enterprise strategy, big data, security, security analytics
     RSA Security
By: IBM     Published Date: Oct 10, 2013
A though leadership white paper discusses how virtualization, cloud computing, and the proliferation of smart devices are helping companies meet their goals and be more effective with their IT investments but are placing increased demands on the datacenter network. Organizations can no longer afford to treat the datacenter network as an afterthought, and it is not sufficient to simply throw more ports or bandwidth at the problem. IBM offers a portfolio of datacenter network planning, integration, and management services designed to maximize customers' DCN success. By working with customers to plan and implement the appropriate network design at the beginning of an IT project, IBM can help customers meet their business requirements, minimize operating costs, and build in flexibility for the future.
Tags : leveraging networks, virtualization, cloud intiatives, networking, cloud computing, datacenter, it investments, minimize operating costs
     IBM
By: IBM     Published Date: Sep 27, 2013
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server "footprint" size and overall electrical requirements, resulted in significant reductions in ongoing costs, or opex, per 100 end users supported.
Tags : 
     IBM
By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing
     Rapid7
By: Blue Coat Systems     Published Date: Jul 18, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : security, data, users, infrastructure, bluecoat
     Blue Coat Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics