RSS feed Get our RSS feed

News by Topic

rad hat

Results 76 - 100 of 931Sort Results By: Published Date | Title | Company Name
By: Dell EMC & Intel     Published Date: Mar 16, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
     Dell EMC & Intel
By: IBM APAC     Published Date: Apr 27, 2018
While relying on x86 servers and Oracle databases to support their stock trading systems, processing rapidly increasing number of transactions fast became a huge challenge for Wanlian Securities. They shifted to IBM FlashSystem that helped them cut average response time for their Oracle Databases from 10 to less than 0.4 milliseconds and improved CPU usage by 15%. Download this case study now.
Tags : 
     IBM APAC
By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
     Dome9
By: KPMG     Published Date: Dec 05, 2018
As extraordinary advances in technology start to transform the traditional workforce, business leaders must get ready for a future where skilled employees and smart machines will work together. Read this report to find out: what the emergence of AI means for leadership and workforce management how to define a strategic roadmap to understand how AI will impact your organisation how a new concept – ‘workforce shaping’ – is being used by leading organisations preparing for the future.
Tags : 
     KPMG
By: Oracle     Published Date: Aug 02, 2018
T raditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance. This book explains modern database protection and recovery challenges (Chapter 1), the important aspects of a database protection and recovery solution (Chapter 2), Oracle’s database protection and recovery solutions (Chapter 3), and key reasons to choose Oracle for your database protection and recovery needs (Chapter 4).
Tags : 
     Oracle
By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
     Oracle
By: Preempt     Published Date: Nov 02, 2018
Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover: - An analysis of recent malware and attacks and the tools they used to spread through the network. - A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them. - Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network. - How to gain visibility into PsExec, WMI, and RPC in general and how to create controls t
Tags : 
     Preempt
By: Dell EMC Storage     Published Date: Aug 15, 2019
Businesses of all sizes struggle with aging gear and lack of storage. In fact, in a 2018 Enterprise Storage Forum survey, IT and business leaders cited these concerns as their two biggest storage infrastructure challenges. But in mid- to enterprise-sized businesses, where every dollar counts, fixing these problems can feel like a tall order. If you’re going to upgrade your storage, you need to make sure you’re getting an efficient array that will help you maximize the value of your storage and your data. We tested two storage arrays to see which could best help organizations meet these goals: the Dell EMC™ Unity™ XT 880F, and an all-flash offering in the entry-level market from a competitor (“Vendor A”). In our hands-on testing, the Dell EMC Unity XT array processed up to 93 percent more input/output operations per second (IOPS) in an 8KB 100% random read test and reduced 129 percent more data. It also carried out common management tasks faster, cutting the number of deployment steps i
Tags : 
     Dell EMC Storage
By: Dell EMC Storage     Published Date: Aug 22, 2019
Heutzutage benötigen Unternehmen eine hochgradig skalierbare, sichere und Multi-Cloud-integrierte Dateispeicher-Infrastruktur. Dell EMC, ein führendes Unternehmen in diesem Bereich, hat soeben dasBetriebssystem Dell EMC Isilon OneFS 8.2 vorgestellt, zusammen mit demIsilon H5600, einem neuen hybriden Scale-out-fähigen NAS-Speicher-Node, der dichter und schneller ist. Mit diesen neuen Innovationen ermöglicht Isilon es Unternehmen,neue Workloads zu beschleunigen und neue Chancen und Effizienzen zu schaffen. Dadurch schreiten sie bei Ihrer IT-Modernisierung deutlich voran.
Tags : 
     Dell EMC Storage
By: Dell EMC EMEA     Published Date: Nov 22, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell EMC EMEA
By: Dell EMC EMEA     Published Date: Nov 22, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell EMC EMEA
By: Dell EMC EMEA     Published Date: Nov 22, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell EMC EMEA
By: Dell EMC EMEA     Published Date: Nov 22, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell EMC EMEA
By: Dell EMC EMEA     Published Date: Nov 22, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell EMC EMEA
By: Dell EMC EMEA     Published Date: Nov 22, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell EMC EMEA
By: Dell EMC EMEA     Published Date: Nov 22, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell EMC EMEA
By: Dell EMC EMEA     Published Date: Nov 23, 2018
Enterprise PC Buying Patterns Are Changing As Buyers Look To Improve Both Security And The Employee Experience At Once As employee mobility increases globally and enterprise investments shift to tablets and laptops, organizations are assessing their ongoing investment in traditional PCs. One thing that remains clear is that enterprise PC buyers still value the security and performance offered by fixed computing solutions. They also say that new form factors like the micro PC help them deliver a better experience to employees, which they value at least as much as security. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell EMC EMEA
By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
     Fortinet EMEA
By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
     Fortinet EMEA
By: Unit4     Published Date: Feb 18, 2019
Are you looking to rise above the growing climate of unrest and change, and choose the right tools to help you operate efficiently and consistently in a VUCA environment? Find out what are the unique realities of non-profits, why traditional Enterprise Resource Planning solution (ERP) fail non-profits and what to look for when choosing your ERP solution.
Tags : nonprofit, ngo, erp, business planning, social impact, grant management
     Unit4
By: Unit4     Published Date: Feb 18, 2019
Are you looking to rise above the growing climate of unrest and change, and choose the right tools to help you operate efficiently and consistently in a VUCA environment? Find out what are the unique realities of non-profits, why traditional Enterprise Resource Planning solution (ERP) fail non-profits and what to look for when choosing your ERP solution.
Tags : 
     Unit4
By: Digital Realty     Published Date: Feb 25, 2015
When measuring competitive differentiation in milliseconds, connectivity is a key component for any financial services company’s data center strategy. In planning the move of its primary data center, a large international futures and commodities trading company needed to find a provider that could deliver the high capacity connectivity it required.
Tags : financial services, trade processing, data center, connectivity, data center
     Digital Realty
By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : cloud, mobileiron, mobile, security
     MobileIron
By: Akamai Technologies     Published Date: Dec 11, 2018
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
     Akamai Technologies
By: Dell EMC     Published Date: May 12, 2016
A remote or branch office is very different from a traditional data center. It needs converged appliances that offer manageability, performance, flexibility, and a unique form factor.
Tags : 
     Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics