RSS feed Get our RSS feed

News by Topic

data requirements

Results 51 - 75 of 334Sort Results By: Published Date | Title | Company Name
By: CDW     Published Date: Sep 17, 2014
We now live in a flash centric world where all active data must be on flash. This doesn’t mean, however, that all data must be on flash. The best approach is to understand your application mix and workload requirements. Some key apps, like databases, are latency intolerant and should be pinned to flash. Others apps can benefit from fully-automated storage tiering. EMC’s market leading VMAX and VNX systems are flexible choices that can deliver all-flash and hybrid services. CDW and EMC has you covered!
Tags : data, market, flash, systems, key apps, centric, application, tiering
     CDW
By: CDW     Published Date: Apr 04, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
     CDW
By: CDW - NetApp     Published Date: Apr 07, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
     CDW - NetApp
By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : security solutions, protecting data, secure management, cost-effective, security
     Centrify Corporation
By: Cherwell Software     Published Date: Apr 07, 2016
Cherwell Service Management™ software empowers IT organizations to easily manage their infrastructure at a fraction of the cost and complexity associated with traditional, legacy IT service management software. Designed with a metadata-driven approach, the Cherwell Service Management platform can easily be configured to meet process and integration requirements without writing or touching a single line of code. Furthermore, configurations will never break during version upgrades.
Tags : best practices, customer support, business intelligence, business optimization
     Cherwell Software
By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : endpoint proliferation, ids, ips, externalization, cisco, security
     Cisco
By: Cisco     Published Date: Apr 10, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : security, data center, performance, virtualization, application, internet, functionality
     Cisco
By: Cisco     Published Date: May 14, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
     Cisco
By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : cisco, financial services, perception gaps, small business
     Cisco
By: Cisco     Published Date: Jul 11, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
     Cisco
By: Cisco     Published Date: Dec 21, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
     Cisco
By: Cisco EMEA     Published Date: Jun 19, 2019
The EU’s General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand. Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally.
Tags : 
     Cisco EMEA
By: Citrix     Published Date: Jun 15, 2018
The world of IT is undergoing a digital transformation. Applications are growing fast, and so are the users consuming them. These applications are everywhere—in the datacenter, on virtual and/or microservices platforms, in the cloud, and as SaaS. More and more apps are now being moved out of datacenters to a cloud-based infrastructure. In order for an optimized and secure delivery of these applications, IT needs specific network appliances called Application Delivery Controllers (ADCs). These ADCs come in hardware, virtual, and containerized form factors, and are sized by Network Administrators based on the current and future usage of applications. The challenge with this is that it’s hard to foresee sizing or scalability requirements for these ADCs since users are constantly increasing, and applications are consistently evolving, as well as moving out of datacenters. Complicating matters, most ADCs are fixed-capacity network appliances that provide zero or minimum expansion capability
Tags : 
     Citrix
By: Citrix Systems     Published Date: Sep 17, 2015
Desktop virtualization is a powerful driver of business transformation, making it possible to deliver the apps and data people depend on to get work done. Learn how Citrix XenDesktop with FlexCast allows you to use a variety of methods to balance user requirements and costs for each use case in your organization.
Tags : desktop virtualization, citrix xendesktop, flexcast, business transformation
     Citrix Systems
By: Citrix Systems     Published Date: Apr 15, 2016
Desktop virtualization is a powerful driver of business transformation, making it possible to deliver the apps and data people depend on to get work done. Learn how Citrix XenDesktop allows you to balance user requirements and costs for each use case.
Tags : vdi, it challenges, desktop virtualization, xendesktop
     Citrix Systems
By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
     Citrix Systems
By: Code42     Published Date: Jan 13, 2016
Read this white paper to learn how the common approaches to e-Discovery miss the mark and how endpoint backup can streamline the collection and preservation of electronically stored information.
Tags : code42, e-discovery, endpoint backup, e-discovery methods, data collection, compliance requirements, security
     Code42
By: Cohesity     Published Date: May 09, 2018
The growing importance—and complexity—of data protection means old approaches no longer will get the job done in an era of exploding data volumes and ever-changing business requirements. It’s time to reimagine and reengineer your IT infrastructure for a more efficient, affordable and manageable data protection framework.
Tags : 
     Cohesity
By: Cohesity     Published Date: Aug 09, 2019
As organizations continue to look for ways to increase business agility, a need for a modern database architecture that can rapidly respond to the needs of business is more apparent than ever. While an RDBMS still serves as a lifeline for many organizations, the adoption of technologies such as NoSQL and Hadoop are enabling organizations to best address database performance and scalability requirements while also satisfying the goals of embracing hybrid cloud and becoming more data-driven. And with organizations relying so heavily on these new technologies to yield rapid insights that positively impact the business, the need to evaluate how those new technologies are managed and protected is essential. Hadoop and NoSQL workloads are now pervasive in production environments and require “production-class” data protection, yet few data protection solutions offer such capabilities today.
Tags : 
     Cohesity
By: Cohesity     Published Date: Aug 09, 2019
The growing importance—and complexity—of data protection means old approaches no longer will get the job done in an era of exploding data volumes and ever-changing business requirements. It’s time to reimagine and reengineer your IT infrastructure for a more efficient, affordable and manageable data protection framework.
Tags : 
     Cohesity
By: Collaborative Consulting     Published Date: Dec 23, 2013
There are some surprisingly straightforward reasons behind the glitches, delays, and cost-overruns that can bedevil data warehouse initiatives. ...The first is simply confusing expectations with requirements. But four other troublemakers can also lead to big problems for developers, IT departments, and organizations seeking to maximize the business value of information.
Tags : collaborative consulting, data warehouse, failed projects, business intelligence, business solution, meet expectations, big data, profile importance
     Collaborative Consulting
By: Commvault     Published Date: Jul 06, 2016
Enterprises today increasingly turn to array-based snapshots and replication to augment or replace legacy data protection solutions that have been overwhelmed by data growth. The challenge is that native array snapshot tools – and alternative 3rd party solutions – have varying degrees of functionality, automation, scripting requirements, hardware support and application awareness. These approaches can add risk as well as administrative complexity and make it more difficult to realize the full potential of snapshots – whether in single disk vendor estates or in heterogeneous storage environments. This checklist will enable you to build a shortlist of the 'must have' features needed for snapshots to deliver exactly what you require in your application environment or Private Cloud.
Tags : commvault, snapshot management, replication, array based snapshots, data protection solutions, gui driven, intellisnap, no scripting
     Commvault
By: Compass Datacenters     Published Date: Jul 07, 2015
Read this white paper to learn why ensuring that your data center is in compliance with the appropriate requirements is extremely important.
Tags : data center compliance, data center requirements, data center regulations
     Compass Datacenters
By: Data Stax     Published Date: Oct 14, 2016
Financial services companies engage with customers across multiple channels and across a range of financial products. This wealth of customer information is often stored in isolated data silos. Building a 360° view of the customer can directly impact customer experience and help banks grow customer retention, upsell products and provide compelling interactions. This paper examines the challenges these institutions face when creating a 360° view of every customer interaction, what database requirements the lines of business should look into, and use cases to benefit from by leveraging DataStax Enterprise, the database platform purpose built to power cloud applications.
Tags : datastax, netflix, mint bills, digital, personalization
     Data Stax
By: Datastax     Published Date: Apr 04, 2017
As the big data ecosystem continues to expand, new technologies are addressing the requirements for managing, processing, analyzing, and storing data to help companies benefit from the rich sources of information flowing into their organizations. From NoSQL databases to open source projects to commercial products offered on-premises and in the cloud, the future of big data is being driven by innovative new approaches across the data management lifecycle. The most pressing areas include real-time data processing, interactive analysis, data integration, data governance, and security. Download this report for a better understanding of the current landscape, emerging best practices and real-world successes.
Tags : evolution, big data, technology, datastax, nosql
     Datastax
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics