RSS feed Get our RSS feed

News by Topic

it infrastructure

Results 226 - 250 of 3093Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager
     IBM
By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip
     Quocirca
By: Tripwire     Published Date: Mar 31, 2009
Learn the basics about security benchmarks, and specifically how the security benchmarks developed by the Center for Internet Security (CIS) can help you with your compliance initiatives.
Tags : center for internet security, cis, tripwire, compliance, internet security, cis-certified, framework, regulation
     Tripwire
By: Schneider Electric     Published Date: Oct 17, 2016
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers.
Tags : 
     Schneider Electric
By: Schneider Electric     Published Date: Feb 17, 2017
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. This knowledge of how these platforms should be developed and deployed is helpful when evaluating the merits of remote monitoring vendors and their solutions.
Tags : cyber security, energy efficiency, power and cooling systems, mean time to recovery, mttr, data privacy, cloud-based platforms, digital remote monitoring
     Schneider Electric
By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
     CA Technologies
By: TrendMicro     Published Date: May 09, 2011
Download this paper to learn how the right endpoint security for virtual desktops will help your enterprise achieve cost and efficiency advantages from virtual desktops.
Tags : trendmicro, endpoint security, virtual desktop infrastructure, vdi
     TrendMicro
By: Epson     Published Date: May 14, 2018
Consumers worldwide continue to adopt and use technology in their shopping experience. Faced with rising customer expectations and increasing competitive pressures, retailers now are prioritizing in-store innovation. Many retailers have adopted multichannel implementations, in which mobile, web, and in-store shopping are enabled but not delivered consistently to the customer. The next step in this evolution is an omnichannel strategy, now being deployed by some retailers, which presents a consistent shopping experience across mobile, web, and in-store channels. Omnichannel also enables retailers to integrate back-end infrastructure technologies (e.g., servers, databases, etc.) and cloud-based services (e.g., loyalty programs, personalized recommendations, inventory management, etc.) to improve many aspects of store and enterprise operations. An omnichannel strategy relies on several core and supporting technologies. The key factors in evaluating any omnichannel-enabling solution includ
Tags : 
     Epson
By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
     Intel Security
By: Entrust Datacard     Published Date: May 15, 2014
Complying with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection Standards
Tags : entrust, nerc, cyber attacks, non compliance, security
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
This white paper explores those guidelines and looks into which specific critical infrastructure solutions are required to avoid non-compliance.
Tags : solution, infrastructure protection, avoid non-compliance, cyberattack, security
     Entrust Datacard
By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : control, visibility, customer, financial risk, web fraud, bots, infrastructure
     Akamai Technologies Australia
By: Red Hat     Published Date: May 05, 2015
It's time to manage all your VMware machines through 1 tool. Red Hat® CloudForms gives you visibility and control throughout your whole infrastructure—from individual VMware machines to your entire cloud and virtualization infrastructure. Download the technology brief to learn more.
Tags : redhat, cloud management, vmware environments, virtualization infrastructure, visibility
     Red Hat
By: Sponsored by HP and Intel®     Published Date: Nov 02, 2012
This report covers the challenges of first generation deduplication technology and the advantages of next-gen deduplication products. Next generation Dedupe 2.0 systems use a common deduplication algorithm across all storage systems.
Tags : deduplication, dedupe 2.0, it resources, it infrastructure
     Sponsored by HP and Intel®
By: Aerohive     Published Date: Feb 06, 2008
Craig Mathias, Principal of the Farpoint Group, explores the advent of cooperative control, an innovative new class of wireless infrastructure from Aerohive Networks. Aerohive’s cooperative control architecture gives you all of the benefits of autonomous access points and controller-based infrastructures, without the high OPEX or CAPEX associated with either approach. Cooperative control architecture represents an innovative approach to wireless LAN systems, one that incorporates a number of interesting features and corresponding benefits.
Tags : wireless lan, wlan, wireless architecture, wireless infrastructure, aerohive, wifi, wi-fi
     Aerohive
By: HP and Intel ®     Published Date: May 06, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtual technologies, the expected and realized benefits, ensuing infrastructure decisions,future outlook of the data center, and best practices for deployment.
Tags : data center, virtualization, data center management, automation, agile, storage, van, virtual application network
     HP and Intel ®
By: HP and Intel ®     Published Date: May 02, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtualization technologies, the expected and realized benefits, ensuing infrastructure decisions, future outlook of the data center, and best practices for deployment.
Tags : 
     HP and Intel ®
By: IBM     Published Date: May 26, 2017
Business executives and managers at business-to-business (B2B) enterprises care about time, money, competitive advantage, customer loyalty and growth. Few pay much attention to the vital IT infrastructure that supports transactions and collaboration with trading partners—though that B2B backbone directly affects performance and profitability. In fact, just 26 percent of business managers view B2B integration as a competitive differentiator, according to a study for IBM by Vanson Bourne, a research consultancy. As a result, many enterprises continue to utilize manual and error-prone emails, faxes and file transfers for B2B transactions. Reliance on complex, brittle and antiquated systems to exchange critical data impacts time to market, cost-efficiency and satisfaction across suppliers and end-customers. Modernization of B2B integration in recent years has moved forward in fits and starts, often undermined by competing priorities and misalignment between business and IT managers.
Tags : b2b integration, customer loyalty, ibm, customer growth
     IBM
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
This Edison Group whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering.The key characteristics of the SPARC S7 to be highlighted are: Designed for scale-out and cloud infrastructures, SPARC S7 processor with greater core performance than the latest Intel Xeon E5, processor, Software in Silicon which offers hardware-based features such as data acceleration and security. The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: AWS     Published Date: May 09, 2018
More and more businesses are embracing workplace mobility and bring-your-own-device (BYOD) strategies as a method to reduce costs and stimulate productivity. These initiatives give employees, contractors, and business partners the power to remotely contribute, collaborate, and communicate with team members from familiar devices, anywhere around the world. To implement these strategies effectively however, IT teams must provide access to applications, business systems, collaboration platforms, and development environments without sacrificing end-user experiences, hindering their organization’s security posture, or inducing excessive costs. What many are finding is that traditional methods of desktop and application delivery and on-premises Virtualized Desktop Infrastructure (VDI) often cannot live up to this task, as they introduce new challenges upon implementation.
Tags : 
     AWS
By: NTT Ltd.     Published Date: Aug 15, 2019
As businesses are driven to digital transformation by changing market forces and customer expectations, many are looking to new technologies, including new infrastructure environments, as enablers. As a result, we are seeing a near-universal appetite for hybrid outcomes as business functions are executed across multiple on-premises and external infrastructure environments in pursuit of agility, cost, performance and other business benefits. Hybrid IT has become a key strategic imperative for a large portion of enterprises, impacting their IT objectives and expectations, and likely leading to new engagements with service provides for help designing, building and operating hybrid environments.
Tags : 
     NTT Ltd.
By: VMware     Published Date: Jun 04, 2019
"In an era where speed and performance are critical, moving to a software-centric approach in every area of the data center is the only way to get ahead in today's digital economy. A modern, software-defined infrastructure, enables organizations to leverage prior investments, extend existing IT knowledge and minimize disruption along the way. VMware and Intel provide IT organizations a path to digital transformation, delivering consistent infrastructure and consistent operations across data centers and public clouds to accelerate application speed and agility for business innovation and growth."
Tags : 
     VMware
By: Pluribus Networks     Published Date: Sep 25, 2014
Software Defined Networking (SDN) allows organizations to deliver networking with the same level of flexibility and agility as virtualization has allowed them to deliver other parts of their infrastructure. This free webinar will examine current networking architectures at a high level.
Tags : pluribus, pluribus networks, sdn, software defined networking, distributed networking, distributed computing, network virtualization, rack switching
     Pluribus Networks
By: Red Hat     Published Date: Jan 09, 2014
Is your private cloud truly agile and helping your users overcome their business challenges as quickly and efficiently as possible? Read this whitepaper to find out.
Tags : red hat, cloudforms, private cloud, agility, agility gap, it management, resource management, servers
     Red Hat
By: Juniper Networks     Published Date: Oct 25, 2017
The broad adoption of the next generation of cloud, mobile, M2M, and big data applications is having profound impacts on IT and network infrastructures. Compared to traditional applications, these applications have much shorter life cycles. You must be able to spin them up, spin them down, and grow and shrink them on demand. Furthermore, you must be able to move these application workloads within a data center or across geographically distributed data centers, resulting in increased management complexities.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     Juniper Networks
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics