RSS feed Get our RSS feed

News by Topic

virtual event

Results 26 - 50 of 59Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Nov 06, 2017
Trying to manage disparate email solutions? Not just for e-discovery, archiving and recovery, but security and continuity as well? Your perfect-world archive is achievable. Reduce administrative complexity with a 100% cloud solution for not only your email archiving but continuity and security, too. Watch the virtual event on cloud archiving on-demand now, featuring: Amanda Crew, from the hit show Silicon Valley, with a brief history of cringeworthy archive failures. First-hand industry insight from Mimecast CEO Peter Bauer and CTO Neil Murray. A deep dive demonstration of the leading cloud archive solution including, data protection, recovery, e-discovery and compliance features. View on-demand now
Tags : mimecast, virtual event, email archiving, email solutions, cloud archiving
     Mimecast
By: NetApp     Published Date: Oct 12, 2010
Read about the simplicity of architecting a robust infrastructure with Microsoft® Windows® Server 2008 R2 Hyper-VT in a virtual environment with NetApp® storage, to provide the ability to maintain HA for both the computing and storage resources between the primary and secondary sites and complete disaster recovery in the event of the loss of a whole site.
Tags : netapp, hyper v, microsoft exchange server, sql server, sharepoint server mixed workload, disaster recovery, data center, virtualization
     NetApp
By: Stratus Technologies     Published Date: Mar 10, 2009
Lee Kaminski, Product Manager for Stratus Avance High Availability Solution, discusses what an effective availability solution requires and how Avance delivers.
Tags : stratus, avance, high availability, server virtualization, mission critical data, downtime, operations management, disaster prevention
     Stratus Technologies
By: Stratus Technologies     Published Date: Mar 10, 2009
Fault Tolerant is a pretty common term in the world of IT, also an often misused and misleading term.  For 3 decades, Stratus Technologies has been engineering and manufacturing purpose built Fault Tolerant solutions. Check out this short video to understand what it takes to be REAL Fault Tolerant.
Tags : stratus, virtualization, fault tolerance, real fault, it management, industry standard components, disaster prevention
     Stratus Technologies
By: Stratus Technologies     Published Date: Mar 10, 2009
Late comers to the market, talk the talk, but can’t walk the walk for critical workloads.  Stratus Director of Product Management Denny Lane resets the definitions of fault tolerance and high availability.
Tags : stratus, fault tolerance, critical workloads, mission critical business solution, server virtualization, lexicon, high availability, continuous availability
     Stratus Technologies
By: IBM     Published Date: Aug 08, 2012
With tight budgets, it isn't easy to create the operational dexterity needed to thrive in a competitive marketplace. View this demo to find out how IBM® SPSS® solutions for predictive operational analytics help manage physical and virtual assets, maintain infrastructure and capital equipment, and improve the efficiency of people and processes. By using your existing business information, IBM SPSS software can help you: predict and prevent equipment failures that can lead to disruptive, costly downtime; quickly identify and resolve product quality issues to mitigate risks and reduce warranty costs; optimize product assortment planning to increase revenue, reduce working capital requirements and improve the return on inventory investments; and act to retain your best employees by developing predictive attrition models to identify the workers at greatest risk of leaving the organization.
Tags : ibm, technology, predictive operational analytics, spss
     IBM
By: IBM     Published Date: May 07, 2013
This book brings a practitioner’s view to Big Data Analytics. Download this ebook to read a practical viewpoint into leveraging analytics for Big Data. This book also draws material from a large number of workshops and interviews with business and IT leaders. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : practical viewpoint, analytics, big data, interviews, business
     IBM
By: IBM     Published Date: May 07, 2013
Read this whitepaper to learn how businesses take advantage of the power of the cloud to build strong analytically oriented teams, adopt new ways to use information and jump ahead of their competition. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : analytics, cloud, business, innovation, computing, information, advantage, power
     IBM
By: IBM     Published Date: May 08, 2013
Read this whitepaper to learn how Big analytics can improve your business decision making and enhance business innovation. Most of all what does it provide in terms of business value for big data. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : big data, value, analytics, improve, business, innovation
     IBM
By: IBM     Published Date: May 08, 2013
Download this whitepaper to learn how organizations can extend their productivity gains provided by disclosure management solutions to their budgeting, planning and forecasting processes as well. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : management, budgeting, planning, forecasting, organizations, productivity, solutions
     IBM
By: IBM     Published Date: May 08, 2013
Read this whitepaper from FSN's Gary Simon to learn how disclosure management solutions from IBM can extend the value of your existing Business Intelligence tools. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : value, business intelligence, disclosure management, solutions
     IBM
By: IBM     Published Date: May 08, 2013
Learn what CFO Research found when they surveyed finance executives from U.S. companies about their reporting processes and the tools they use to prepare financial statements. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : cfo, finance, tools, financial statements
     IBM
By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : continuity requirements, vmturbo, virtualization, workload portability, data replication
     VMTurbo
By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : cloud, date security, cloud security, virtualization, security
     CDW-Trend Micro
By: VMware     Published Date: May 10, 2012
This online eBook provides insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the datacenter.
Tags : capital, operational costs, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine
     VMware
By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
     HP
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
     Trend Micro, Inc.
By: VMware     Published Date: Mar 08, 2012
This online eBook provides insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the datacenter.
Tags : wmware, server virtualization, workload consolidation, simplified management, disaster protection, spending, data backup, recovery
     VMware
By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor
     Mentor Graphics
By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
     Kaspersky
By: HP     Published Date: May 14, 2014
Your data is everywhere. It’s in the cloud, in virtual environments, in remote offices, and on mobile devices. Plus, there’s more of it, and much of it is business-critical, meaning you need to back up larger volumes of data than ever before without adding costs or bandwidth. Even more importantly, you need the ability to restore data quickly in the event of a disaster, failure, outage. The cost of data protection is higher now more than ever.
Tags : hewlett packard, cloud, mobile, remote, data recovery, disaster, failure
     HP
By: Online Marketing Summit     Published Date: Apr 21, 2010
Register for this free virtual event on Thursday, May 27th with the best and latest online marketing educational content including best practices, case studies, research and more. You can expect: *Seven tracks covering all major domain of online marketing, including Social Media, Search Engine Marketing and Optimization, Web Analytics, Mobile, Email and Demand Generation; * Content for all skill levels from the online novice to the eMarketing expert, there are sessions that will benefit all corporate, brand and online marketers; *Online marketing education kiosks and learning centers provide you additional access to 1-on-1 consultations, whitepapers and webcasts; *Live Q&A at the end of each session. Speakers and expert practitioners further explain the tactics learned in the session, answering questions and providing live support. Virtual Peer Networking gives you the opportunity to network, collaborate and share ideas with strategic marketers from leading companies around the world, so register now!
Tags : oms, online marketing summit, online marketing, emarketing, strategic marketing
     Online Marketing Summit
By: EMC Corporation     Published Date: Sep 09, 2014
Hear senior principal analyst at ESG, Jon Oltsik, at RSA Security Analytics 10.4 and RSA ECAT Virtual Launch Event on September 9.
Tags : esg, security, analytics, architecture
     EMC Corporation
Start   Previous    1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics