enterprise it

Results 1 - 25 of 4866Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Nov 15, 2018
This Hyper Converged Infrastructure solution brief describes the key benefits of NetApp's next generation HCI solution including enterprise scale, efficient storage architecture, trustworthy data services, and IT operations transformation.
Tags : 
    
NetApp
Published By: Veeam APAC     Published Date: Apr 26, 2020
"Most organizations today rely on virtualized IT infrastructures. Veeam® helps them to provide and increase Availability of critical workloads running on their systems. Due to various factors, some physical servers cannot be virtualized, along with endpoints that might not be protectable in their entirety by leveraging back up solutions built for virtualized systems. Thus, everyday occurrences such as lapses in connectivity, hardware failures, file corruption, ransomware or even theft can leave an organization’s data at risk. Veeam Agent for Microsoft Windows solves these issues by closing the gap that some enterprises face with large, heterogeneous environments and further enabling workload mobility by delivering Availability for cloud-based workloads. This paper describes: - the main concepts behind Veeam Agent for Microsoft Windows - how agents can be managed centrally by integration into Veeam Backup & Replication™ - and more!"
Tags : 
    
Veeam APAC
Published By: Veeam APAC     Published Date: Apr 26, 2020
Enterprise-grade companies used SAP HANA worldwide, SAP HANA is the application directly related to customers core business functionality.It’s mission critical for the companies to have proper disaster recovery strategy for the SAP HANA, in case of any disaster they can restore SAP HANA services and application with less efforts.Veeam well known as Hyper-Availability Platform to simplify the backup and recovery of virtual, physical and cloud workload and provides availability to all mission critical applications.To know more about SAP HANA backup & recovery please read the blog.
Tags : 
    
Veeam APAC
Published By: City Pantry     Published Date: Feb 14, 2020
"Rachael, Office Manager at Zoom, shares her experience with City Pantry. Zoom, an enterprise video communications company based in Holborn, joined City Pantry back in October 2017. Download the Case Study to learn more about how to make your office a friendlier place, and make your people happier."
Tags : 
    
City Pantry
Published By: Dell EMC Storage     Published Date: May 13, 2020
Digital transformation (DX) is a hot topic in most enterprises today. DX drives a host of new business requirements that challenge legacy infrastructure, and information technology (IT) organizations are upgrading to new server and storage platforms at a rapid rate to meet them. Although the enterprise storage market overall continues to grow, revenue for storage systems at midrange price points ($25,000 to $249,999) is growing at the fastest rate – in 2019 this market grew 10.6% to comprise 60.3% of all enterprise storage revenues. Part of the reason this segment leads the entry and high-end enterprise storage segments is that systems whose starting prices are in the $25,000 to $249,999 range are increasingly incorporating the performance, availability, scalability and functionality of higher end systems. For IT organizations looking to streamline costs as well as storage infrastructure, systems at midrange price points meet a broader set of requirements than either of the other t
Tags : 
    
Dell EMC Storage
Published By: Dell EMC EMEA     Published Date: May 26, 2020
The end user computing industry has reached an important time in its history. For the first time, modern PC management, mobility, Zero Trust security, and virtualization are coalescing to deliver the world’s first digital workspace solutions. The world of any app, any device, and any location is finally here. Enterprises understand that this new digital capability will bring enormous benefits, including enhanced productivity, simplified management, reduced costs, and enhanced security. Today, most IT decision makers are now planning to radically transform their end user computing environments with digital workspaces in the upcoming years. Despite the enthusiasm, however, the question remains: how should companies go about adopting a modern, secure digital workspace to maximize the value from their investments?
Tags : 
    
Dell EMC EMEA
Published By: Rackspace     Published Date: May 11, 2020
Most IT organisations have adopted a ‘Cloud First’ policy to exploit recent changes in the IT service sector and align more effectively with the needs of their business customers. However, the journey to Cloud is not simple. It requires a fundamental change in enterprise architecture, service contracts, internal processes and most of all culture and skills. Adopting an effective ‘Cloud First’ regime requires changes in governance that will help the IT organisation and its business partners to better achieve their mutual goals. These cover core elements such as cost and performance management; compliance and security; standards and frameworks; integration of applications and data; training and reskilling; and minimising business risk. This report sets out the range of exciting new goals that cloud enables – both within the IT organisation and those of its business partners, the principles of effective cloud governance, and the best ways to contract for cloud services.
Tags : 
    
Rackspace
Published By: Oracle     Published Date: May 12, 2020
27 May 2020 2 p.m. - 3 p.m. SGT Just when you thought you were getting ready for digital banking revolution in Southeast Asia, more upheavals are re-writing the landscape. Join Michael Araneta, Associate Vice President, IDC Financial Insights, Steve Shipley, Adjunct CIO, IDC Financial Insights and Michael Connell, Head of Cloud Enterprise Architects, ASEAN at Oracle as they discuss the new market dynamics in banking: upheavals in the industry, the different approaches, mindsets and value propositions of challenger banks versus traditional banks in their strategies for success.
Tags : 
    
Oracle
Published By: FICO - APAC     Published Date: Apr 22, 2020
The fight against the financing of terrorism is no longer the sole task of authorities, the police or the military, since it increasingly affects the processes of banks, insurance companies, and enterprises from the industrial, trade, and services sector. Business with sanctioned persons or organizations is a criminal offence that may result in monetary fines or criminal prosecution and in a massive damage of the reputation of the company involved. The fight against terrorism requires solutions that not only integrate simply and safely with the payment process and automatically effect payments but also check the complete customer and business partner base. Find out how Siron®Embargo can help you.
Tags : 
    
FICO - APAC
Published By: ServiceNow     Published Date: May 27, 2020
More and more enterprises are turning to containers to increase efficiency and help enable multi?cloud IT operations. Read our white paper to see how you can get visibility to cloud native applications through container orchestration products, such as Kubernetes, and drive efficiency in the DevOps CI/CD process.
Tags : 
    
ServiceNow
Published By: McAfee APAC     Published Date: Apr 19, 2020
The cloud has caused data to explode out of the enterprise to a new cloud edge with fragmented visibility and control for enterprise security. In this paper, McAfee provides a holistic view of modern data dispersion and its impact on existing security practices, using survey results from 1,000 enterprises in 11 countries and an investigation into anonymized events from 30 million enterprise cloud users.
Tags : 
    
McAfee APAC
Published By: Hitachi EMEA     Published Date: Apr 24, 2020
Organizations of all sizes are contending with rapid data growth, and this compounds a host of other storagerelated challenges. For many companies, this includes meeting disaster recovery and regulatory requirements, high capex costs and the ability to deliver adequate performance to match the needs of demanding applications and business stakeholders. Midsized organizations and enterprises not only have to address these prominent storage challenges, but they must do so while keeping a careful eye on spending since storage budgets are increasing at less than half the pace of data growth. It will be important to have storage systems with rich feature sets that can allow businesses to adapt to match data growth while providing accessibility, consistency and resiliency
Tags : 
    
Hitachi EMEA
Published By: DeepInstinct     Published Date: May 15, 2020
Have you heard of Gandcrab ransomware? The creators of this nasty string of code earned $2.5 million per week as they successfully encrypted the data of both small and large enterprises alike, forcing them to pay out their atrocious ransom demands. Then there was Nanocore, a remote access trojan, that successfully spread its tentacles into governments and banks in order to prey on highly sensitive information. The only rational conclusion that you can make from these attacks is that no industry is immune, no location beyond reach, and no enterprise safe from attack.
Tags : 
    
DeepInstinct
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: SAS     Published Date: May 11, 2020
Welcome to the results of our study about analytics and analytics platforms. Our latest research indicates that the use of analytics continues to evolve in most organizations, and that many organizations are on the path to using analytics strategically. The data and insights in this report are the result of a two-part research process. More than 80 percent of interview subjects say analytics has reached the boardroom in their organizations, while just 35 percent say analytics are deployed at an enterprise scale. These two results indicate that even though most executives have bought into the use of analytics at a strategic level, the deployment of a full analytics strategy is still not underway at most organizations. Implementing an analytics platform has shown great promise in growing the strategic value of analytics and in fostering innovation. Respondents also indicate that an analytics platform can help with ongoing issues of integrating data and data sources throughout the orga
Tags : 
    
SAS
Published By: Sangoma     Published Date: Jan 30, 2013
Sangoma has introduced the most cost-effective, easiest to provision and easiest to manage line of enterprise SBCs on the market. The four available options deliver maximum flexibility when selecting a solution -- Learn how they can help you.
Tags : 
sangoma session border controllers, sbc series, carriers, enterprise, cost effective, easy to manage, sbc, networking, knowledge management, enterprise applications, business technology
    
Sangoma
Published By: Hitachi Vantara     Published Date: Apr 21, 2020
" The challenge of meeting the ever-increasing data storage and access requirements of critical applications must be balanced against the cost of the storage solution. The Enterprise Strategy Group has validated and documented the savings and benefits that the VSP 5000 series can provide organizations. Consolidation – VSP 5000 series provides the capabilities to effectively consolidate multiple current workloads as well as the headroom to support next-generation workloads. Efficiency – VSP 5000 series provides the most capacity and performance for all workloads using storage technologies such as improved storage density, active data reduction, intelligent tiering and dynamic provisioning. Virtualization – SVOS RF virtualization of external storage arrays provides modern data services and extends the life of existing storage arrays by increasing their available capacity, boosting performance, and knocking down storage silos. Download “Analyzing the Economic Benefits of the Hitachi VSP 5
Tags : 
    
Hitachi Vantara
Published By: Hitachi Vantara     Published Date: May 01, 2020
Organizations of all sizes are contending with rapid data growth, and this compounds a host of other storagerelated challenges. For many companies, this includes meeting disaster recovery and regulatory requirements, high capex costs and the ability to deliver adequate performance to match the needs of demanding applications and business stakeholders. Midsized organizations and enterprises not only have to address these prominent storage challenges, but they must do so while keeping a careful eye on spending since storage budgets are increasing at less than half the pace of data growth. It will be important to have storage systems with rich feature sets that can allow businesses to adapt to match data growth while providing accessibility, consistency and resiliency.
Tags : 
    
Hitachi Vantara
Published By: CloudPassage     Published Date: May 19, 2020
As enterprises increase their use of the cloud to host business applications as part of their digital transformation, security and development teams must transform how they work together. Cloud development moves development from a centralized department developing applications for a private data center managed by a centralized operations team, to distributed teams responsible for both the development and operations of their applications known as DevOps. This can create a gap between security and DevOps. In this on-demand webinar, cybersecurity experts Carson Sweet, CloudPassage CEO and co-founder, and Holger Schulze, Cybersecurity Insiders CEO and co-founder, explore this transition and how both security and DevOps teams can best work together in this new world. Topics include: • The new organization structure security must work in • The new rapid development, continuous integration and continuous delivery model for DevOps • The diverse set of technologies DevOps are deploying in the
Tags : 
    
CloudPassage
Published By: CloudPassage     Published Date: May 19, 2020
Enterprises large and small are migrating existing applications to the cloud and developing new applications on cloud-native infrastructure. Datacenter security practices don’t translate to cloud environments due to technical and operational changes that disrupt existing security and compliance approaches. As organizations transition to distributed DevOps models, application development velocity increases dramatically. Continuous delivery and software-defined infrastructure result in additions and changes to critical assets on-demand at any time. This webinar is for security engineers, DevOps engineers, cloud architects, and security executives. Your take-aways from this webinar will be the six “must-haves” for achieving real-world, practical cloud security. You will leave the webinar with a working understanding of: • How moving to the cloud changes development and security practices • How the concept of “practical cloud security” cuts through the noise and hype • What to expect an
Tags : 
    
CloudPassage
Published By: Informatica     Published Date: Apr 30, 2020
To get the greatest value from your Amazon Web Services (AWS) data lake, you need an intelligent data management strategy that replaces slow, tedious legacy manual processes with fast, simple automation powered by machine learning. Download the white paper Power Your AWS Data Lake with AI-Driven Data Management to learn best practices for a successful data lake project—and how businesses are applying them for real-world insight. Written for enterprise data architects, the white paper explains how to create a systematic, intelligent approach to data management that includes: • Better understanding of business goals and objectives • Agile development methodologies • A metadata approach to data management Learn how to manage your AWS data lake in a way that delivers radically new business insights faster and more efficiently than ever. Download the white paper today.
Tags : 
    
Informatica
Published By: McAfee EMEA     Published Date: May 12, 2020
Efficient and effective threat detection requires rapidly obtaining insights from collected data. Today, many EDR solutions are focused on providing investigation capabilities to the most sophisticated SOC analysts, a focus that hasn’t proven effective or scalable. EDR products that enable triage by junior analysts through guided investigation open this superior level of detection to many markets that were previously unable to benefit from this technology. In April 2019, McAfee commissioned Forrester Consulting to explore opportunities for guided investigation capabilities in enterprise endpoint detection and response (EDR) products. We found that security decision makers believe guided investigation will improve alert quality, drive efficiency in the security operations center (SOC), and ultimately help enterprises secure their endpoints at scale.
Tags : 
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: May 12, 2020
Organizations are increasingly challenged by a lack of visibility into disparate resources and insufficient knowledge about the effectiveness of their existing security controls when managing data governance across hybrid cloud architectures. Enterprise security teams are also increasingly citing the growing complexity of their security solutions and the difficulty of integrating cloud components with existing security infrastructure. For example, nearly a quarter of the respondents to an IDC cloud security survey said they had changed their data loss prevention solution once or multiple times since first adopting a cloud architecture.
Tags : 
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: May 12, 2020
As a senior consultant on the Foundstone Services incident response and forensic team, I regularly respond to a wide range of security incidents at client sites. I have assisted clients with the containment and eradication of malicious code (for example: ransomware and malware infections) and responding to unauthorized access/network breaches impacting their enterprise environment. During all of the responses, there was the need to identify the nature of the incident, assess the client’s security infrastructure, and work towards the identification of the threat or attack vector(s). The information gathered from the initial assessment and related analysis was then used to isolate and contain the malicious activity impacting devices within the environment. Connect
Tags : 
    
McAfee EMEA
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.