RSS feed Get our RSS feed

News by Topic

datacenter security

Results 1 - 25 of 32Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Dec 20, 2018
Edison has followed the development and use of Cisco’s Application Centric Infrastructure (ACI) over the past five years. Cisco ACI delivers an intent-based networking framework to enable agility in the datacenter. It captures higher-level business and user intent in the form of a policy and translates this intent into the network constructs necessary to dynamically provision the network, security, and infrastructure services.
Tags : 
     Cisco
By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
     Dome9
By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : red hat, datacenters, enterprise, linux, security mechanisms, network firewalls
     Red Hat
By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters
     Red Hat
By: Juniper Networks     Published Date: Oct 19, 2015
Datacenters are the factories of the Internet age, just like warehouses, assembly lines, and machine shops were for the industrial age. Over the course of the past several years, riding the wave of modernization, datacenters have become the heart and soul of the financial industry, which each year invests over $480 billion in datacenter infrastructure of hardware, software, networks, and security and services.
Tags : juniper, datacenter, threat, ciso, enterprise, data, customer
     Juniper Networks
By: Citrix Systems     Published Date: Jul 28, 2015
Read this paper to learn how NetScaler is meeting modern demands for more robust datacenter security.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
     Citrix Systems
By: Red Hat     Published Date: Sep 26, 2014
What if you could simplify and standardize all your systems? What if you could make the most of what you have, while moving to a trusted and secure platform that gives you the ability to innovate like never before? With Red Hat you can… IT must keep up with the demands of business, but still lead the way to innovation that fuels growth. Eliminate excessive complexity and inefficiency in your datacenter—without leaving behind existing investment. Standardizing on Red Hat doesn't mean ripping and replacing. It means having a well-managed platform AND freeing up resources to innovate with greater efficiency, security, stability, and minimal overhead.
Tags : it efficiency, standardized operating environment, it solutions, integration
     Red Hat
By: VMware AirWatch     Published Date: Nov 12, 2015
IT requires a solution that solves the challenge of securing proprietary applications and data in the cloud datacenter and is available only to users and devices that are delegated safe for access. VMware NSX solves this challenge through user-level micro-segmentation. The VMware NSX approach offers several differentiated advantages over traditional security approaches.
Tags : vmware, cloud datacenter security, mobility, smart networking, vmware nsx, micro segmentation, security
     VMware AirWatch
By: Riverbed Technology, Inc.     Published Date: May 27, 2014
Data in branch and remote offices is subject to a variety of threats. Data centers are built to secure data, but remote offices lack the same level defenses. It’s now possible to eliminate the risks of branch office IT, consolidating servers and storage into the datacenter without sacrificing the benefits of having servers at the edge close to users.
Tags : datacenter, data security, consolidating servers, consolidating storage, data defense, enterprise expansion, edge close to users, riverbed
     Riverbed Technology, Inc.
By: HP     Published Date: Jul 29, 2008
Connect to this special web event to hear from Forrester Research and HP on how to address key vulnerabilities in the storage network, receive tips and recommendations on selecting and implementing data storage encryption solutions and details on how to achieve centralized key management and data encryption where it matters most.
Tags : mission critical, security, datacenter, data center, storage security, storage
     HP
By: PC Mall     Published Date: Jun 22, 2011
This white paper from Microsoft discusses the underlying economics driving the transition from mainframe to client/servers. The economics of the cloud, by using in-depth modeling, is also reviewed to better understand the long-term IT landscape.
Tags : cloud computing, virtualized datacenter, network security, private cloud, public cloud
     PC Mall
By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions
     Citrix Systems
By: Citrix Systems     Published Date: Feb 10, 2016
Learn why Citrix was named a leader in the 2015 Gartner Magic Quadrant for Application Delivery Controllers, for the ninth consecutive year. With more than 25 years experience providing secure access to enterprise applications, it’s clear you can rely on Citrix to drive new levels of security and productivity in your organization. Register to download the 2015 Gartner Magic Quadrant for Application Delivery Controllers, plus receive a bonus white paper, Citrix NetScaler - A Foundation for Next-Generation Datacenter and Cloud-Based Security.
Tags : 
     Citrix Systems
By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper reviews the challenges with endpoint security in virtualized environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virus-scanners in multiple guest virtual machines, on a single physical host.
Tags : trend micro, antivirus, virtual datacenter, enterprise security, virtual machines, virtualization, internet content security, smart protection network
     Trend Micro Inc.
By: VMware, Inc     Published Date: Dec 05, 2013
Organizations worldwide are using virtual desktop infrastructure (VDI) to run virtual desktops in the datacenter and deliver these to employees as a managed service. End users gain a familiar, personalized environment they can access anywhere from any device, while administrators gain control and security. With VMware® Horizon View™ (formerly VMware View), IT professionals can implement a VDI infrastructure to help drive down operational costs, enhance security, and support a mobile workforce.
Tags : vmware, vmware horizon view, virtual desktop infrastructure, virtual desktops, vdi, datacenter, storage
     VMware, Inc
By: Red Hat     Published Date: May 05, 2015
IT organizations are under intense pressure to improve service levels and contain expenses in today’s challenging economic climate. Forward-looking organizations are upgrading IT infrastructure and implementing virtualization and cloud computing solutions to improve business agility and drive down costs. Many enterprises are adopting a dual platform approach, retaining Microsoft Windows for office productivity and collaboration applications, and deploying Red Hat® Enterprise Linux® for infrastructure and datacenter modernization initiatives. By adopting standards-based Red Hat Enterprise Linux, businesses can enjoy high performance, reliability, and security, with a lower overall TCO.
Tags : red hat, platform strategies, modern datacenter, virtualization, cloud computing solutions
     Red Hat
By: F5 Networks Inc     Published Date: Feb 02, 2016
Let’s face it, your apps are everywhere. You have more to worry about than ever before: diverse services, cloud and datacenter locations, mission critical SaaS applications and new security threats.  In this report you’ll learn which app delivery services your peers have most broadly deployed, how they are approaching the cloud, and how they are addressing the growing sophistication of security attacks.
Tags : application delivery, datacenter locations, saas applications, security threats, app delivery service
     F5 Networks Inc
By: VMware     Published Date: Sep 13, 2011
Federal datacenters, which house an enormous wealth of legacy assets, are the primary targets for agencies evaluating different cloud computing approaches. When agencies begin their journey to the cloud with virtualization-an IT transformation starting point that preserves existing investments-they realize significant agility, cost and security benefits. Federal IT leaders are deploying VMware cloud infrastructure solutions to meet these new directives.
Tags : vsphere, vmware, storage, vsa, cluster service, technology, storage
     VMware
By: Microsoft Azure     Published Date: Apr 11, 2018
Make sure you’re getting the most out of your data and the artificial intelligence (AI) technologies available. Read the e-book, Six cloud data challenges solved for app developers and get actionable answers. Learn the best approach when faced with six familiar data scenarios: Keeping track of essentials such as scalability and availability. Making sure your app delivers consistent service to multiple customers. Delivering data in real time, across the globe, without the complexities of multiple datacenters. Creating actionable insights from big data. Incorporating artificial intelligence into your apps. Locking down security while building in the cloud.
Tags : 
     Microsoft Azure
By: VMware AirWatch     Published Date: May 18, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak.
Tags : data management, business practices, data center. data application, enterprise applications, security
     VMware AirWatch
By: Citrix     Published Date: May 08, 2014
A report into the need for datacenter security and how Citrix NetScaler is the solution.
Tags : datacenter security, netscaler, citrix, defense
     Citrix
By: Cisco     Published Date: Dec 21, 2016
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
Tags : 
     Cisco
By: VMware     Published Date: Dec 15, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak. By combining VMware NSX with the AirWatch Tunnel and/or VMware Horizon View, organizations are able to bridge the device to datacenter security gap in a way that both increases the overall security of the cloud datacenter and makes it far simpler to manage security through defining and delegating application and services to specific users. Thi
Tags : 
     VMware
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics