it architecture

Results 1 - 25 of 1101Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Nov 15, 2018
This Hyper Converged Infrastructure solution brief describes the key benefits of NetApp's next generation HCI solution including enterprise scale, efficient storage architecture, trustworthy data services, and IT operations transformation.
Tags : 
    
NetApp
Published By: Hewlett Packard Enterprise     Published Date: May 01, 2020
This blueprint, based on HPE Pointnext Services experts’ real-world experience, is a “How To” guide that captures the business and technology challenges driving software defined infrastructure (SDI) and provides actionable steps for overcoming them. Gain tips to transition to hybrid cloud and take advantage of software-defined architectures for agile development and self-serve IT.
Tags : 
    
Hewlett Packard Enterprise
Published By: DELL IS Cloud     Published Date: May 27, 2020
Public cloud adoption is a reality for most enterprises: 65% of North American enterprises have adopted the use of public cloud and it is the preferred deployment for many applications.1 Today, organizations leverage more than one cloud provider — e.g., multicloud — with 75% of decision makers describing their approach as hybrid, and 66% defining hybrid as a form of multicloud.2 Recent research revealed almost all organizations with a multicloud strategy now use multiple clouds for mission-critical applications too — including those that store customer and financial data, drive sales and eCommerce, and deliver customer experience.3For many organizations, the power to leverage different clouds for different applications allows them to optimize capabilities, sourcing, and deployment models according to their business requirements. The tradeoff, however, can be an overwhelmingly complex multicloud architecture, with many moving parts that slow decisions and progress.4Organizations with mu
Tags : 
    
DELL IS Cloud
Published By: Dell EMC     Published Date: Jun 08, 2020
65% of European CEOs are under significant pressure to deliver on their digital transformation (DX) strategies. Creating a digital platform with an intelligent core is key to success. The digital platform is defined as an integrated, enterprisewide technology architecture that enables the seamless flow of data across every single business application, system and application. It is intelligent, agile, trusted and orchestrated, and enables great customer and employee experience.
Tags : 
    
Dell EMC
Published By: Fortinet EMEA     Published Date: May 14, 2020
Corporate DevOps teams are leading the way to the cloud, but many are overlooking the full security implications of the move. If they simply accept the security offerings of their cloud platform, they are likely to leave gaps that attackers can exploit to steal data or infiltrate other areas of the corporate network. There are at least five security areas that security architects need to ensure they have covered when building and managing security in the cloud. Fortinet offers a critical layer of security that integrates with the broader security architecture. It includes solutions for cloud platform security management, native integration of purpose-built security into the cloud platform, as well as web application and application programming interface (API) protection. It also provides integrations that help DevOps teams to automate security tasks in their cloud environments. All these help organizations achieve a consistent security posture and an effective security life-cycle manag
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: May 15, 2020
IT infrastructure modernization is well underway as healthcare organizations need to be more agile in their response to digital transformation initiatives. Legacy architectures simply cannot keep up with the pace of change associated with value-based health and rapidly evolving technical requirements. Constrained IT resources require solutions that improve operational efficiencies and optimize resources. This IDC InfoBrief presents a case study that describes how a customer deployed Fortinet Secure SD-WAN to improve network and application performance while reducing total cost of ownership (TCO).
Tags : 
    
Fortinet EMEA
Published By: Menlo Security     Published Date: Apr 30, 2020
Cloud applications, such as Office 365 and G Suite, offer improved productivity but leave users susceptible to new forms of attacks. Network architectures not configured for direct-to-Internet connectivity cannot adapt to meet these security concerns that arise from greater SaaS adoption. Cloud-delivered security offers many advantages to meet the demands of SaaS and move beyond accepting network security as “almost safe.” A critical component of this modern security architecture is web isolation—the practice of moving the threat of attack away from the endpoint and into the cloud.
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Apr 30, 2020
Zero Trust Internet is the solution for 100% email and web security because it considers all traffic to be potentially dangerous and isolates it, instead of trying to classify email and websites as either "safe" or "dangerous." Menlo Security’s Isolation Core™ embodies the principles of Zero Trust Internet to create a technical milestone in cybersecurity. The Isolation Core™ rewrites incoming web code, removes active content, and safely projects inactive content to end-user devices without lag. All content goes through the same process to ensure full, proactive protection. Download this whitepaper to understand: • How the Zero Trust Internet paradigm creates a safe browsing and email experience • The weakness of traditional network architectures to safeguard the end-user experience • How Menlo Security helped a Fortune 100 company achieve zero malware attacks in six months while adhering to Zero Trust Internet practices with our Isolation Core™
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Apr 30, 2020
In-office employees have always experienced direct connections to a highly secure, highly controlled data center architecture, while a small subset of employees—on average around 10 percent of the workforce—worked remotely through secure virtual private network (VPN) connections. As we transform digitally, remote working becomes a ubiquitous reality, but how does this new way of working alter security and the current IT landscape? Delivering security through the cloud allows organizations to offload Internet traffic from legacy network security architectures such as VPNs and firewalls, while ensuring that security policies are applied consistently to all traffic originating from any user. The Menlo Security Global Cloud Proxy platform with an Isolation Core™ provides this new approach—enabling more robust security for the direct-to-cloud connectivity needed by your new remote workforce. Read this whitepaper to learn: • The inadequacies of traditional VPN architectures • The promise of
Tags : 
    
Menlo Security
Published By: BlackBerry     Published Date: Jun 01, 2020
According to the COVID-19 Employer Flash Survey, 36% of respondents reported that cyber threats has increased since employees started working from home. Some providers of cybersecurity are treating the current crisis as a gold rush, releasing so-called specially packaged versions of endpoint protection products that were never designed to secure a mobile workforce. BlackBerry® products and services, in contrast, are designed to offer customers a granular level of control regarding data collection for forensic examination. We go to great lengths to ensure privacy-by-design in the architecture of our endpoint agent, and we never treat our customers’ data as something to be profited from. Download this whitepaper to find out how BlackBerry can support you to mitigate cyber threats.
Tags : 
    
BlackBerry
Published By: Intel     Published Date: Mar 12, 2020
As organizations adopt analytics platforms and AI technologies as distinct entities, there is a need to create dedicated clusters to deploy these capabilities. The existence of multiple clusters leads to under-utilized infrastructure. Intel works across the ecosystem to make converged HPC clusters function optimally. Clusters built on Intel® architecture like the 2nd Generation Intel® Xeon® Scalable processors deliver flexible, reliable and cost-effective performances across workloads. Explore the challenges and opportunities around running AI and analytics workloads on existing high-performance computing (HPC) clusters by downloading this detailed guide.
Tags : 
    
Intel
Published By: Intel     Published Date: Mar 12, 2020
Today, enterprises are looking to expand their definitions of high-performance computing (HPC) beyond simulation and modeling workloads to include artificial intelligence (AI) and analytics. Intel is working on all fronts to ensure enterprises have a seamless transition by contributing optimizations for Intel® architecture to open source projects. Innovations like the 2nd Generation Intel® Xeon® Scalable processors have been designed to enable more robust computing clusters that drive results across an array of workloads. Discover how you can improve workload performance with the latest Intel technologies by downloading this comprehensive guide.
Tags : 
    
Intel
Published By: Workday APAC     Published Date: Jun 03, 2020
How does Workday continue to create enterprise applications that are intuitive, secure, and constantly improving? In this eBook, learn how we offer simple solutions based on a continuously evolving architecture.
Tags : 
    
Workday APAC
Published By: Workday APAC     Published Date: Jun 03, 2020
"An inside look at the history and evolution of our technology. In this eBook, learn how Workday offers simple solutions based on a continuously evolving architecture—and how the Power of One matters when it comes to newly acquired technology. The eBook includes: An introduction to the Workday technology strategy A deep-dive into the Workday architecture An understanding of how machine learning enhances Workday "
Tags : 
    
Workday APAC
Published By: Trend Micro     Published Date: May 15, 2020
The common security challenges faced in the cloud stem from misconfiguration, compliance, and an exploding set of cloud infrastructure services. Hear how to combat these challenges and gain visibility into security, compliance, and governance vulnerabilities on your public cloud infrastructure. Join us to learn skills that will help you gain more free time and resources, while providing peace of mind that your infrastructure is secure: - Automatically evaluate how well your architecture is aligned to AWS best practices and industry compliance standards - Embrace a culture of security and DevOps in your organization - Implement necessary guardrails to grow and scale your business safely and securely
Tags : 
    
Trend Micro
Published By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : 
bell micro, hardware, storage management, vmware, ibm xiv
    
Bell Micro
Published By: Workday     Published Date: Apr 24, 2020
"Today’s CIOs must apply new ways of thinking to the changing world of finance. We believe this Gartner report explores why ERP applications are evolving to become more open and flexible, and how companies can benefit from a new generation of applications, architectures, and technologies. Gartner, ERP’s Emerging Fourth Era — Moving Beyond Postmodern ERP; Denise Ganly, Mike Guay, Paul Saunders, Tim Faith GARTNER is a registered trademark and service mark of Gartner, Inc. and/or"
Tags : 
    
Workday
Published By: Amazon Web Services APAC     Published Date: Jun 19, 2020
"Organizations are moving their workloads to the cloud, as quickly as they can. And, while most applications can be easily migrated to the cloud, some applications need to be re-architected or “modernized” before they can be moved to the cloud. And, some applications need to remain on-premises due to low-latency or data sovereignty requirements. Regardless of where workloads may reside, organizations want to be able to develop once and be able to deploy workloads to the cloud or on-premises in an agile and consistent fashion. Furthermore, enterprises need to be able to leverage investments in skills, technology, and processes across their environments. This leads many organizations to seek hybrid cloud architectures to integrate their on-premises and cloud operations to support a broad spectrum of use cases, from data center extension to VMware cloud migration to building and managing applications using a common set of cloud services and APIs across their on-premises and cloud enviro
Tags : 
    
Amazon Web Services APAC
Published By: TIBCO Software     Published Date: Jun 30, 2020
The evolution to 5G architecture, Cloud, and an agile platform to support new digital business-to-business services and customer revenue streams will require telcos transitioning into digital service providers (DSPs) to either build a completely new network or evolve their existing one. In either case, a very flexible and agile infrastructure combining core network functions (4G, 5G, fiber) and IT systems is needed. This paper provides the background, challenges, and one clear solution leading to a service-based network architecture.
Tags : 
    
TIBCO Software
Published By: NEC     Published Date: Aug 26, 2009
This is a case study which shows how Leicester Theatre Trust (LTT) implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC.
Tags : 
curve, nec, ltt, unified communications, architecture, service oriented architecture, soa, soc
    
NEC
Published By: NEC     Published Date: Sep 14, 2009
This white paper is a business briefing for C-Level Executives on how integrating a range of technologies - including unified communications, service oriented architecture, virtualization and cloud computing - can transform the productivity and profitability of large enterprises.
Tags : 
nec, virtualization, soa, service oriented architecture, cloud computing, unified communications, sla, slas
    
NEC
Published By: NEC     Published Date: Sep 29, 2009
Written by: IDC Abner Germanow, Jonathan Edwards, Lee Doyle IDC believes the convergence of communications and mainstream IT architectures will drive significant innovation in business processes over the next decade.
Tags : 
it architecture, idc, automation, automated order processing, soa, service oriented architecture, soap, http
    
NEC
Published By: ASG Software Solutions     Published Date: Feb 23, 2010
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.
Tags : 
asg, cmdb, virtualization, bsm, itil, bsm, metacmdb, configuration management
    
ASG Software Solutions
Published By: BitGravity     Published Date: Dec 17, 2009
This paper outlines the seven essential buying criteria that every decision-maker needs to consider when making a decision on a video delivery provider. These buying criteria are shared across the gamut of small, video-centric startups and established, familiar media giants.
Tags : 
bitgravity, video delivery, legacy cdns, network architecture, internet video, file management, total cost ownership, proxy cache
    
BitGravity
Published By: Comcast Business     Published Date: Feb 07, 2020
The message is clear: now is the time to take a close look at your company strategy, the IT strategies meant to help drive the company forward, and at budgets and the WAN architecture. Does your organization need more reliable WAN services? More agile ones? Does it need higher bandwidth, lower rates, increased visibility, greater control, more reliability, reduced operating costs? SD-WAN may be the best way to power the changes needed.
Tags : 
    
Comcast Business
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.