RSS feed Get our RSS feed

News by Topic

rad hat

Results 201 - 225 of 929Sort Results By: Published Date | Title | Company Name
By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
     MobileIron
By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
     MobileIron
By: Aternity     Published Date: May 18, 2015
This whitepaper provides an overview of Aternity Virtual Desktop Monitoring and how it monitors end user experience in a VDI environment. Aternity goes well beyond traditional Virtual Desktop Infrastructure assessment tools that are primarily focused on planning and testing virtual deployments. Aternity provides in-depth monitoring of end user experience in a production environment spanning tens of thousands of business users.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
     Aternity
By: Aternity     Published Date: May 19, 2015
Read this whitepaper to navigate through the End User Experience Monitoring (EUEM) landscape. Learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their workforce users are actually experiencing.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
     Aternity
By: Aternity     Published Date: May 22, 2015
“ This 30-minute webinar that will help you navigate the EUEM landscape and learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their users are actually experiencing.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
     Aternity
By: Aternity     Published Date: Oct 20, 2015
This exclusive guide (a $1295 value), featuring Gartner Research, provides an overview of the five key capabilities for improving enterprise mobile workforce productivity beyond traditional monitoring. It also give you access to Gartner’s Market Guide for Mobile Application Performance Monitoring and Industry use case examples on how Aternity Mobile APM has improved both customer and workforce end user experience. The guide also explains how, when it comes to actually measuring and improving the end user experience, Aternity Mobile APM uniquely addresses what counts most to the mobile workforce – the performance of the app as it renders on any device.
Tags : mobile workforce, end user experience, aternity, mobile apm, application performance
     Aternity
By: Palo Alto Networks     Published Date: Feb 24, 2016
The threat landscape has evolved and the traditional approach to endpoint security cannot keep up. Detection/response is not an acceptable approach. There are a number of approaches to prevent threats on the endpoint and their ability to prevent unknown and zero-day threats varies widely. Join this webinar featuring a guest speaker from Forrester where we will discuss the findings from a recent commissioned survey they conducted that evaluates these approaches and illustrates that exploit prevention and integration with a network security platform are must-have capabilities. Forrester will also summarize their recommendations for prevention of advanced threats on the endpoint.
Tags : security, endpoint, zero day exploit, forrester, phishing, ddos
     Palo Alto Networks
By: Oracle ODA     Published Date: Aug 15, 2016
DBAs need help with tackling significant issues, including doing more with fewer resources, quickly responding to upgrade and patch needs, while reducing the time spent on cloning databases. Finally, they need help eliminating the time they spend integrating, testing, and deploying full-stack cloud solutions. How can DBAs reconcile these competing demands? Learn more about expanded offerings in a database appliance that are delivering numerous advantages. These new configurations have the potential to help IT derive new benefits in its efforts to serve the business.
Tags : 
     Oracle ODA
By: Lucidworks     Published Date: Dec 14, 2016
Download this whitepaper to learn about the benefits and trade-offs of contextual and data-based analysis. Recommendations and answers are provided by the next generation of enterprise applications that use search-based features and capabilities to improve performance and add value.
Tags : 
     Lucidworks
By: Veritas     Published Date: Jan 04, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
     Veritas
By: VMware     Published Date: Aug 02, 2017
When evaluating and migrating to Windows 10, it is critical to understand the use cases and benefits of various deployment choices. Should you: • Refresh or upgrade your existing deployments? • Migrate your physical endpoints to VDI? • Extend published remote apps to your Windows endpoints? We look at these use cases and introduce SysTrack - a tool that provides recommendations on an optimal Windows 10 deployment approach your organizations should take.
Tags : 
     VMware
By: Progress     Published Date: Oct 09, 2017
"The old rules no longer apply. Digital technologies have radically transformed the business landscape, yet many organizations have completely ignored this reality. A new survey of IT decision makers found 96% see digital transformation as important or critical, yet 55% say they have one year or less to respond before they financially suffer. By failing to prepare for new technologies, devices and systems, organizations have threatened their own survival. The Digital Ultimatum, is your first step towards building a future-proof organization that optimizes the customer experience and routinely achieves organizational excellence."
Tags : 
     Progress
By: CrowdStrike     Published Date: Mar 15, 2017
It’s time to upgrade your organization’s legacy Antivirus (AV). Here is what you need to know before replacing your AV solution. The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements.
Tags : 
     CrowdStrike
By: Pure Storage     Published Date: Nov 02, 2017
Health systems moving to integrated care business models are crying out for more active repositories to replace image archives as they move toward collaborative models of care. Yet traditional storage vendors continue to rely on three-year buying models and costly forklift migrations – and performance still does not meet clinician’s requirements. Pure Storage offers an alternative: a renewable, upgradable, scale-out, highperformance storage environment for images at a low TCO that ensures the latest technology and marketleading support and maintenance for 10+ years.
Tags : health systems, pure storage, enterprise, performance, marketleading, vendors
     Pure Storage
By: FinancialForce     Published Date: Dec 01, 2017
Traditional business models are getting shattered by subscriptions. No one can doubt the new services economy is flourishing. The cloud, mobile, digital, connected devices, globalization - all these things have had a hand in reshaping business and powering new business models. Companies today are wrapping service-based business models and while this shift adds new complexities for finance and has major revenue recognition implications, it also gives finance leaders huge opportunities to become bigger value creators for their business and make a stronger impact on enterprise-wide strategies - not financials.
Tags : 
     FinancialForce
By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success. If handled correctly, your supply chain should improve customer service—along with the reputation of your brand—and boost your bottom line. But, as with many areas of business, the rules of the game are changing. What’s changing? Well, everything. New regulations, increased buyer expectations, shorter product lifecycles, fluctuations in demand, new market entrants, more ethical supplier management, poor visibility of globalized supply chains—all these things, and more, are testing the limits of the traditional supply chain model. The simple truth is that the way things used to be done, and the solutions that enabled it, are no longer up to the job.
Tags : cloud, supply chain management, scm, cloud computing
     Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
By: Workday     Published Date: Jul 19, 2017
Today’s business climate demands that corporations have a flexible computing infrastructure. Because of the agility it provides, cloud computing is garnering interest in many organisations. As they look at such possible deployments, however, some CIOs become hamstrung by security concerns. They feel that the traditional method of securing information in premises-based systems is the best way. While that option worked for many years, the threat landscape today is more diverse and more potentially damaging than ever before.
Tags : security, it department, system set-up, cloud suppliers, frameworks, human resources, enterprise financial, planning data
     Workday
By: Lenovo - APAC     Published Date: Feb 01, 2019
Hyperconverged Infrastructure eBook Guide for the Enterprise Abstract. Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Feb 01, 2019
Hyperconverged Infrastructure eBook Guide for the Enterprise Abstract. Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand
Tags : 
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Feb 01, 2019
Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand how HCI can • Provide the resilience, scalability and performance to
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Trifacta     Published Date: Feb 12, 2019
Over the past few years, the evolution of technology for storing, processing and analyzing data has been absolutely staggering. Businesses now have the ability to work with data at a scale and speed that many of us would have never thought was possible. Yet, why are so many organizations still struggling to drive meaningful ROI from their data investments? The answer starts with people. In this latest Data Science Central webinar, guest speakers Forrester Principal Analyst Michele Goetz and Trifacta Director of Product Marketing Will Davis focus on the roles and responsibilities required for today’s modern dataops teams to be successful. They touch on how new data platforms and applications have fundamentally changed the traditional makeup of data/analytics organizations and how companies need to update the structure of their teams to keep up with the accelerate pace of modern business. Watch this recorded webcast to learn: What are the foundational roles within a modern dataops team a
Tags : 
     Trifacta
By: Trifacta     Published Date: Feb 12, 2019
Over the past few years, the evolution of technology for storing, processing and analyzing data has been absolutely staggering. Businesses now have the ability to work with data at a scale and speed that many of us would have never thought was possible. Yet, why are so many organizations still struggling to drive meaningful ROI from their data investments? The answer starts with people. In this webinar, guest speakers Forrester Principal Analyst Michele Goetz and Trifacta Director of Product Marketing Will Davis focus on the roles and responsibilities required for today’s modern dataops teams to be successful. They touch on how new data platforms and applications have fundamentally changed the traditional makeup of data/analytics organizations and how companies need to update the structure of their teams to keep up with the accelerate pace of modern business. Watch this recorded webcast to learn: What are the foundational roles within a modern dataops team and how to align skill set
Tags : 
     Trifacta
By: Attunity     Published Date: Feb 12, 2019
How can enterprises overcome the issues that come with traditional data warehousing? Despite the business value that data warehouses can deliver, too often they fall short of expectations. They take too long to deliver, cost too much to build and maintain, and cannot keep pace with changing business requirements. If this all rings a bell, check out Attunity’s knowledge brief on data warehouse automation with Attunity Compose. The solution automates the design, build, and deployment of data warehouses, data marts and data hubs, enabling more agile and responsive operation. The automation reduces time-consuming manual coding, and error-prone repetitive tasks. Read the knowledge brief to learn more about your options.
Tags : dwa, data warehouse automation, etl development, extract transform load tools, etl tools, data warehouse, data marts, data hubs data warehouse lifecycle
     Attunity
By: Fortinet EMEA     Published Date: Dec 11, 2018
If you’re dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you’re probably considering some form of software-defined wide area networking (SD-WAN). With the variety of constraints that you face, selecting the right SD-WAN solution for your enterprise may require a few compromises. Security, however, should not be one of them. There are various models for combining SD-WAN and network security, but only one that can truly be called “secure SD-WAN.” Fortinet, the most trusted name in network security, has leveraged its industry-leading FortiGate Next Generation Firewall (NGFW) to deliver integrated best-of-breed SD-WAN capabilities. Powered by the new FortiOS 6.0 operating system, SD-WANenabled FortiGate solutions provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.
Tags : 
     Fortinet EMEA
By: Gigamon     Published Date: Mar 26, 2019
Read “What Do You Mean TLS 1.3 Might Degrade My Security?” to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. We’ll show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
     Gigamon
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics