RSS feed Get our RSS feed

News by Topic

it infrastructure

Results 201 - 225 of 3118Sort Results By: Published Date | Title | Company Name
By: Rubrik EMEA     Published Date: Apr 15, 2019
Ransomware is not going away. This makes it imperative for businesses across all industries to adopt a data management strategy of multi-layered security, easy automation, and quick recovery. To learn more about Rubrik and how it can ?t into your ransomware protection strategy while simplifying data protection across your entire datacenter, visit www.rubrik.com. As the leading next-generation data protection solution, Rubrik deploys as a plug-and-play appliance in less than an hour and has been adopted across all verticals and organization sizes including Fortune 50 companies.
Tags : data, backup, recovery, backups, solution, security, encryption, cyber
     Rubrik EMEA
By: Rubrik EMEA     Published Date: Apr 15, 2019
Backup and recovery needs a radical rethink. When today’s incumbent solutions were designed over a decade ago, IT environments were exploding, heterogeneity was increasing, and backup was the protection of last resort. The goal was to provide a low cost insurance policy for data, and to support this increasingly complex multi-tier, heterogeneous environment. The answer was to patch together backup and recovery solutions under a common vendor management framework and to minimize costs by moving data across the infrastructure or media.
Tags : data, backup, recovery, virtualization, solutions, cloud, architectures
     Rubrik EMEA
By: Oracle EMEA     Published Date: Apr 15, 2019
Oracle Autonomous Data Warehouse Cloud is more than just a new way to store and analyze data; it’s a whole new approach to getting more value from your data. Market leaders in every industry depend on analytics to reach new customers, streamline business processes, and gain a competitive edge. Data warehouses remain at the heart of these business intelligence (BI) initiatives, but traditional data-warehouse projects are complex undertakings that take months or even years to deliver results. Relying on a cloud provider accelerates the process of provisioning data-warehouse infrastructure, but in most cases database administrators (DBAs) still have to install and manage the database platform, then work with the line-of-business leaders to build the data model and analytics. Once the warehouse is deployed—either on premises or in the cloud—they face an endless cycle of tuning, securing, scaling, and maintaining these analytic assets. Oracle has a better way. Download this whitepaper to f
Tags : 
     Oracle EMEA
By: Cisco EMEA     Published Date: Apr 12, 2019
Hyperkonvergenz ist derzeit ein heiß diskutiertes Thema. Dafür gibt es gute Gründe. Seit Langem sucht man in Unternehmen nach Möglichkeiten, die Bereitstellung neuer geschäftsorientierter ITServices zu beschleunigen und zu vereinfachen. Eine hyperkonvergente Infrastruktur (Hyper-Converged Infrastructure, HCI) liefert die in der heutigen Digital Economy erforderliche Geschwindigkeit, Einfachheit und Flexibilität. Nicht alle HCILösungen werden jedoch auf die gleiche Weise erstellt. Auch ist HCI nicht für jede Anwendung oder jeden Workload eine geeignete Lösung. Je mehr Technologie aber in aktuelle Server implementiert wird, desto mehr Workloads können effizient auf einer HCI-Plattform ausgeführt werden.
Tags : 
     Cisco EMEA
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
     Group M_IBM Q2'19
By: Gigamon     Published Date: Apr 11, 2019
Download ESG’s Economic Validation Report, “Analyzing the Economic Benefits of Gigamon,” to see how Gigamon increases NetFlow performance by 100%, reduces hardware and tooling costs by 50%, decreases network downtime by 30% and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can help business and enable new ideas and growth. See why ESG believes the Gigamon Visibility Platform is a critical tool for network success in today’s digital age.
Tags : 
     Gigamon
By: Pure Storage     Published Date: Apr 10, 2019
Deep learning opens up new worlds of possibility in artificial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-flash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
     Pure Storage
By: Pure Storage     Published Date: Apr 10, 2019
Deep learning opens up new worlds of possibility in artificial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly, and legacy storage systems are not keeping up. Advanced AI applications require a modern all-flash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
     Pure Storage
By: Pure Storage     Published Date: Apr 10, 2019
Splunk® has become a mission critical application. Thousands of organizations are gaining insight from their machine data and transaction logs using Splunk, and many more are planning to deploy Splunk. No matter what stage you’re in, having guidelines to follow can help improve the Splunk experience. Since a mission critical data application deserves a mission critical data platform, Pure Storage® built the solution on the Pure FlashStack™ converged infrastructure solution. FlashStack is a joint offering from Cisco® and Pure Storage. This paper is intended to provide a framework for designing and sizing a high-performance, scalable, and resilient Splunk platform. Pure Storage is a leading all-flash array provider focused on reducing storage complexity while improving Splunk performance, resiliency, and efficiency.
Tags : 
     Pure Storage
By: Gigamon     Published Date: Apr 10, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
     Gigamon
By: Gigamon     Published Date: Apr 10, 2019
Need powerful visibility and insights into network traffic while reducing risk, complexity and costs? Download the new Definitive Guide™ to Next-Generation Network Packet Brokers to learn why you should shift your infrastructure strategy to include NGNPBs, which offer new, expanded feature sets that simplify your architecture, realize the true ROI of your security tools and give you visibility into critical security threats. Learn how to see, control and secure what matters -- download now!
Tags : 
     Gigamon
By: Gigamon     Published Date: Apr 10, 2019
Download ESG’s Economic Validation Report, “Analyzing the Economic Benefits of Gigamon,” to see how Gigamon reduces false positives by 70%, decreases the cost of security personnel by 50%, eliminates redundant systems and tools and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can secure business, enable new ideas and facilitate growth. And, see why ESG believes the Gigamon Visibility Platform is a critical tool for success in today’s digital age.
Tags : 
     Gigamon
By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security
     Illusive Networks
By: VMware     Published Date: Apr 09, 2019
In the modern digital age, traditional barriers to entry and time to market have fallen. Agile businesses can turn an idea into an app, host it in the cloud, and quickly deliver it to millions of customers on their chosen devices and platforms. In comparison, many larger enterprises miss new business opportunities because they’re mired in managing complex, legacy infrastructure, inefficient cross-functional workflow and approval processes, and lengthy audit and compliance requirements.
Tags : 
     VMware
By: VMware     Published Date: Apr 09, 2019
To help their business clients unleash innovation and support growth, IT teams need to evolve to a modern data center that is virtualized, software defined and automated, with a consistent operational model for infrastructure and application delivery. In this collection of case studies, we reveal how companies are building more agile, innovative businesses based on VMware solutions.
Tags : 
     VMware
By: VMware     Published Date: Apr 09, 2019
More than 10,000 customers are using VMware vSAN to quickly adopt hyper-converged infrastructure to accelerate their IT modernization initiatives, reduce their total cost of ownership, and increase their businesses agility in preparation of future needs. Read some of their stories and see how hyper-converged infrastructure powered by vSAN can ease the burden of infrastructure management and create new possibilities for your business.
Tags : 
     VMware
By: CloudHealth by VMware     Published Date: Apr 08, 2019
Organizations moving to AWS seek improved performance, increased innovation, and a faster time to market—but the road to cloud maturity, and ultimately cloud success, proves both challenging and expensive. Learn to accelerate your AWS cloud journey with: A checklist for determining if you have clear visibility into your AWS environment Expert tips for developing proper cloud security best practices Real examples of financial, performance, and security management policies for automating your cloud ecosystem Looking to optimize your AWS cloud infrastructure? Use this eBook to regain control over your visibility and cost management, security and compliance, and governance and automation.
Tags : 
     CloudHealth by VMware
By: Datastax     Published Date: Apr 08, 2019
It is all about clouds: private, public, or a combination. 85% of enterprises have a multi-cloud strategy, as per the RightScale 2017 State of the Cloud Report. Most enterprises today have one or more application projects utilizing public cloud infrastructure providers. Having a data management strategy for hybrid cloud is a critical business need today.
Tags : 
     Datastax
By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
As the foundation for most critical business decisions, today's data environments are not just a vital piece of IT infrastructure, but key component of corporate strategy.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
In this report, we''ll analyze the many challenges that organizations face when it comes to building and managing modern IT infrastructure. We'll also look at how many businesses are taking advantage of a hybrid cloud and on-premise approach, which comes with some significant benefits.
Tags : 
     Group M_IBM Q2'19
By: Rackspace     Published Date: Apr 02, 2019
Traditional retailers seeking to digitalize their brand connections to customers, do so with Eagle Eye AIR, a SaaS platform for creating intelligent, real-time digital and mobile solutions for promotions, loyalty programs, rewards and more. With rapid business growth, the volumes of transactions processed per second are constantly being rewritten – yet, its customers’ transactional throughput keeps running smoothly – which is all thanks to the successful migration of its dedicated infrastructure to Google Cloud Platform (GCP). Being a longstanding customer of Rackspace, Eagle Eye trusted the Rackspace Managed Services team in providing expert guidance for every stage of its migration project – which is part of a bigger exercise to transform its technical capabilities.
Tags : 
     Rackspace
By: Darktrace     Published Date: Apr 02, 2019
The current era in cyber security is characterized by three fundamental challenges: the complexity of the enterprise network and connected infrastructure, the speed of newage attacks, and the strain of overwhelmed incident responders. In many ways, the expansion of networks and continual adoption of new technologies - from cloud services to the Internet of Things - has expanded the attack surface and introduced new entry-points through which attackers can gain a foothold. This, combined with the ready availability of exploit kits on the Dark Web, has led to the ‘vicious circle of the SOC’, where incident responders are so busy fire-fighting that they rarely have time to implement the critical patches that would prevent the problem at source. As security teams struggle to keep up with the rising volume of routine attacks, a new generation of cyberthreat has also emerged, characterized in large part by fast-moving threats that make an impact well before humans have time to respond. Thes
Tags : 
     Darktrace
By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
IDC strongly believes that the days of homogenous compute, in which a single architecture dominates all compute in the datacenter, are over. This truth has become increasingly evident as more and more businesses have started to launch artificial intelligence (AI) initiatives. Many of them are in an experimental stage with AI and a few have reached production readiness, but all of them are cycling unusually fast through infrastructure options to run their newly developed AI applications and services on.
Tags : 
     Group M_IBM Q2'19
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics