RSS feed Get our RSS feed

News by Topic

deployment

Results 1 - 25 of 1124Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Apr 26, 2017
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
     Entrust Datacard
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: Intel     Published Date: May 19, 2017
Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) deployments are challenged by a lack of broadly accepted industry benchmarks to drive conformance to carrier-grade requirements.
Tags : network services, sdn, nfv, network
     Intel
By: Intel     Published Date: May 19, 2017
Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) deployments are challenged by a lack of broadly accepted industry benchmarks to drive conformance to carrier-grade requirements.
Tags : nfv, network services, virtualization, sdn
     Intel
By: Intel     Published Date: May 19, 2017
For today’s service providers and enterprises, bandwidth demands continue to increase and evolve. The introduction of Internet of Things (IoT) solutions, such as smart homes, smart cities, connected cars, and connected medical devices, is forcing organizations to change existing business models and to build more cost-effective networks.
Tags : nfv, enterprises, service providers, internet of things
     Intel
By: NetApp     Published Date: Jun 01, 2017
This report from 451 Research examines the data management challenges faced by companies in a hybrid cloud environment and provides recommendations for IT professionals responsible for cloud deployments.
Tags : netapp, database performance, flash storage, data management, cost challenges, 451 research
     NetApp
By: Lookout     Published Date: Mar 29, 2017
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : practitioners, enterprise, mobile security, productivity, lookout
     Lookout
By: Infor     Published Date: Jun 13, 2017
Thinking about taking a bold step to improve your IT infrastructure?
Tags : 
     Infor
By: Fugue     Published Date: Mar 27, 2017
Directed at cloud architecting concerns, this paper covers streamlining complexity at scale, knowing infrastructure state, and using easily repeatable patterns that bolster security, compliance, and disaster recovery. Get this white paper now.
Tags : cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration
     Fugue
By: Fugue     Published Date: Mar 27, 2017
This paper details that approach to cloud's complex challenges and how an extensible, infrastructure-level cloud operating system like Fugue fits the bill to realize success.
Tags : cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration
     Fugue
By: Fugue     Published Date: Mar 27, 2017
Check out this report to see why Ovum recommends Fugue’s solution to help developers generate applications that can exploit cloud capabilities and deliver on the promise of the cloud.
Tags : cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration
     Fugue
By: IBM     Published Date: Jan 18, 2017
You’ve taken the first step and already know that a document- oriented database is the right database for your application. From here, you still have to decide where and how you’ll deploy the software and its associated infrastructure. These decisions lead to additional considerations around administrative overhead, technical support, open-source options, data sovereignty and security, and more. This paper aims to outline the deployment options available when you select IBM® Cloudant® as your JSON store.
Tags : ibm, cloud, analytics, cloudant managed service, cloudant local, apache couchdb, databases
     IBM
By: IBM     Published Date: Mar 30, 2017
To learn more about how SaaS is helping companies gain competitive advantage as opposed to simply reducing costs, we segmented survey respondents into three groups: • Pacesetters, who have the highest level of SaaS adoption and are gaining competitive advantage through their broad efforts • Challengers, who have adopted SaaS more narrowly but are gaining competitive advantage through the SaaS deployments they do have • Chasers, who have been slower to adopt SaaS and gain competitive advantage through its use Download now to learn more!
Tags : ibm, software, competitive advantage, cloud, saas, pacesetters, chasers
     IBM
By: IBM     Published Date: May 23, 2017
Flexible deployment options, licensing models help take the challenges out of change. As you move toward the cloud, you're likely planning or managing a mixed environment of on- premises and on- cloud applications. To help you succeed in this transition, you need a trans-formative, mixed-workload database that can handle a massive volume of data while delivering high performance, data availability and the flexibility to adapt respond to business changes.
Tags : cloud applications, mobile optimization, web-based applications, data availability, ibm, db2
     IBM
By: IBM     Published Date: Jun 08, 2017
This paper presents a cost/benefit case for two leading enterprise database contenders -- IBM DB2 11.1 for Linux, UNIX, and Windows (DB2 11.1 LUW) and Oracle Database 12c -- with regard to delivering effective security capabilities, high-performance OLTP capacity and throughput, and efficient systems configuration and management automation. Comparisons are of database installations in the telecommunications, healthcare, and consumer banking industries. For OLTP workloads in these environments, three-year costs average 32 percent less for use of DB2 11.1 compared to Oracle 12c.
Tags : ibm, linux, windows, telecommunications, healthcare, oracle database
     IBM
By: Genesys     Published Date: Jun 07, 2017
A Look at the Five-Year Cost Comparisons for Technology Infrastructure Deployment
Tags : genesys, ovum report, technology infrastructure, technology infrastructure deployment, contact centers, contact center platforms, cloud
     Genesys
By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
     Coyote Point Systems
By: Viavi Solutions     Published Date: Apr 14, 2017
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
     Viavi Solutions
By: Code42     Published Date: Apr 04, 2017
Based on an extensive survey of IT security decision makers across North America, Europe, Asia Pacific, Latin America, the Middle East, and Africa, the fourth annual Cyberthreat Defense Report examines current and planned deployment of countermeasures against the backdrop of numerous cybersecurity issues and concerns.
Tags : ransomware, cyber attack, recovery, cyber security, cyber criminals, ransomware as a service, cyberthreat, data breach
     Code42
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
     Ounce Labs, an IBM Company
By: ASG Software Solutions     Published Date: Feb 23, 2010
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.
Tags : asg, cmdb, virtualization, bsm, itil, bsm, metacmdb, configuration management
     ASG Software Solutions
By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : cloud security, cloud, private cloud, security technology
     McAfee
By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, itdiscusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : cloud security, cloud, private cloud, security technology
     McAfee
By: Big Bang LLC     Published Date: May 31, 2012
Cost-effective and fully automated device driver management for Microsoft SCCM with the Universal Imaging Utility System Deploy Plug-in. The UIUSD completely eliminates the need for SCCM admins to manage and package drivers.
Tags : 
     Big Bang LLC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics