RSS feed Get our RSS feed

News by Topic

fast

Results 301 - 325 of 2267Sort Results By: Published Date | Title | Company Name
By: CenturyLink     Published Date: Jan 02, 2015
Download “Best of All Worlds” now and fast-forward your business’ agility with a hybrid IT solution.
Tags : it agility, hybrid infrastructure solutions, hybrid it solutions, cloud solutions
     CenturyLink
By: CenturyLink     Published Date: Jan 02, 2015
Download “Best of All Worlds” now and fast-forward your business’ agility with a hybrid IT solution.
Tags : hybrid infrastructure, hybrid it solution, data centers, operations, cloud soluitions
     CenturyLink
By: CheckMarx     Published Date: Nov 02, 2018
As DevOps continues to be widely adopted by fast-moving organizations, software security needs to keep pace to help accelerate software delivery and not slow it down. Is your software security program up to the challenge? By integrating security into the entire software development lifecycle, enterprises can manage their business risk and guarantee secure software delivery at the speed of DevOps. Check out these 10 Essential Best Practices for building and maintaining your modern-day software security program -- from your tools, to your processes, to your people. This eBook will cover the top 10 steps you can take today to help your organization move faster and more securely.
Tags : 
     CheckMarx
By: CheckMarx     Published Date: Nov 02, 2018
Dinosaurs are super cool, but there are some places where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. We’re in a new world where traditional security solutions no longer make the cut. Software is increasingly complex, and when deployed at the speed of DevOps, it creates a new type of risk: Software Exposure. Legacy application security tools are too big, too slow, and too clunky to deliver the innovation needed to protect your customers in the 21st century. The Software Exposure Platform from Checkmarx is an entirely new species heralding the next generation of software security. The platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper The Demise of the AppSec Dinosaur to learn how Checkmarx provides the combination of integrations and automation required in
Tags : 
     CheckMarx
By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
     CheckMarx
By: CheckMarx     Published Date: Apr 03, 2019
Dinosaurs are super cool. That’s an indisputable fact. There are some places though, where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. Early on, in the days before DevOps and Continuous Integration, one of the original players in the AppSec space produced an early SAST tool, offering a wide variety of supported languages, and they quickly built name recognition and a large install base of customers. Yet, 15 years and two acquisitions later, that company has become a software dinosaur – a mere relic – maintaining a product that is too big, too slow, and too clunky to deliver the innovation needed to protect its customers in the 21st century.
Tags : 
     CheckMarx
By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
     CheckMarx
By: Cherwell Software     Published Date: Apr 07, 2016
B/E Aerospace is the worldwide leading manufacturer of aircraft passenger cabin interior products and the leading global distributor of aerospace fasteners for commercial, business jet, and military markets. The company has leading worldwide market shares in all major product lines and serves virtually all of the world’s airlines, aircraft manufacturers, and leasing companies through its direct global sales and customer support organizations. Headquartered in Wellington, Florida, B/E Aerospace has grown to nearly 12,000 employees and 220 sites around the world and a true follow-the-sun model for global customer support.
Tags : best practices, customer support, business intelligence, business optimization, branding
     Cherwell Software
By: Cherwell Software     Published Date: Jun 21, 2018
Digital innovation has fundamentally changed how the world operates. As modern technology permeates every area of our lives, our expectations around the availability of information and the speed with which we can obtain it are higher than ever before. This applies to how we shop, as well as how we make business and major life decisions.
Tags : service, management, technology
     Cherwell Software
By: Cherwell Software     Published Date: Jun 21, 2018
Some would have you believe that ITIL® is on its way out. That it’s no longer relevant in today’s fast-paced digital environment. But ITIL still holds many timeless truths. As a set of best practice recommendations, ITIL provides a solid foundation and a common language for IT service management (ITSM) in these rapidly changing times. The problems arise when ITIL is seen as dogma. If you apply it too literally—as rules to follow, instead of recommendations to consider—ITIL will slow you down. You’re left struggling to keep up with ever-increasing user demands, not to mention your enterprise’s need to modernize and digitally transform. If you suspect ITIL is slowing you down, read on to uncover the seven ways ITIL has commonly been misapplied—and gain guidance on how you can go faster, while still upholding ITIL principles.
Tags : itil, implementation, digital
     Cherwell Software
By: Cherwell Software     Published Date: Jan 28, 2019
Leading Cancer Center Implements Lean Service Desk to Provide Vital Support to Medical Staff Learn how the IT team at Seattle Cancer Care Alliance built a brand new service desk from scratch in just five months. Key improvements include significant time savings via quick and easy workflow automation; faster issue resolution and response times due to real-time dashboards; and a new culture of continuous improvement surrounding the implementation of lean methodologies and ITSM best practices.
Tags : 
     Cherwell Software
By: Cielo     Published Date: Mar 04, 2016
"Outsourcing" often gets a bad name. But when it comes to your recruitment function, partmering with an outside expert can successfully transform your approach to talent acquisition and deliver measurable business results faster.
Tags : cielo, talent practices, talent acquisition, recruitment, recruitment process outsourcing, rpo, outsourcing, hiring
     Cielo
By: Cisco     Published Date: Apr 19, 2011
Download this white paper to learn how IT automation helps businesses make better decisions faster in addition to raising the bar in business innovation.
Tags : cisco, it automation solutions, application optimization automation, job scheduling, workload automation, network automation, private cloud infrastructure, data center automation
     Cisco
By: Cisco     Published Date: Mar 10, 2011
Fresh Direct Produce workforce is more mobile, responsive with Cisco Unified Communications. To give its employees the immediate, direct communications that the business required, Fresh Direct replaced its phone system with the Cisco® Unified Communications System. The Cisco solution supports all of the company's voice, data, and wireless communications on one secure network.
Tags : cisco, unified communications, fresh direct produce, mobile, wireless communication, voice, data network, phone system
     Cisco
By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, security
     Cisco
By: Cisco     Published Date: Jan 14, 2014
17-page Principled Technologies Report from 7/13. Side by side test migrating blade server ID to a rack server vs HP.
Tags : cisco, ucs vs. hp, blade server id, principled technologies report
     Cisco
By: Cisco     Published Date: Apr 08, 2014
CIOs and IT professionals know that as their businesses grow, the need for computing also grows.
Tags : cisco, ucs blades, server, unified computing systems
     Cisco
By: Cisco     Published Date: Apr 08, 2014
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : cisco, cvds, vpn wan
     Cisco
By: Cisco     Published Date: Aug 18, 2014
Optimize benefits from your Cisco ASA 5500-X Series Next-Generation Firewall, and better secure your network from malicious activity, with a proven firewall and IPS design guide. Use this guide for faster, more reliable, and more predictable deployment.
Tags : security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network
     Cisco
By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : mobility, business solutions, cisco, mobile applications, secure mobile
     Cisco
By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : datacenter, data management, collaborations, business capabilities
     Cisco
By: Cisco     Published Date: Jan 05, 2015
Cisco® Validated Designs consist of systems and solutions that are designed, tested, and documented to facilitate and improve customer deployments. These designs incorporate a wide range of technologies and products into a portfolio of solutions that have been developed to address the business needs of our customers. The purpose of this document is to describe the Cisco and NetApp® FlexPod® solution, which is a validated approach for deploying Cisco and NetApp technologies as a shared cloud infrastructure.
Tags : solution guide, integrate, infrastructure, solutions, applications
     Cisco
By: Cisco     Published Date: Jan 06, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications
     Cisco
By: Cisco     Published Date: Jan 06, 2015
The CVD program consists of systems and solutions designed, tested, and documented to facilitate faster, more reliable, and more predictable customer deployments.
Tags : engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications, security
     Cisco
By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation
     Cisco
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics