app cloud

Results 126 - 150 of 1851Sort Results By: Published Date | Title | Company Name

Accelerate Business Agility with Faster Server Refresh Cycles

Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. The more up to date the infrastructure, the more capable it is of supporting the scale and complexity of a changing application landscape. Current-generation applications must be supplemented and eventually supplanted with next-generation (also known as cloud-native) applications — each with very different infrastructure requirements. Keeping infrastructure up
Tags : 
    
Dell EMC & Intel

4 Ways Hyper-Converged Lowers TCO for Core Applications VS. Cloud

Published By: Dell EMC & Intel     Published Date: Aug 03, 2018
When running core workloads, consider hyper-converged infrastructure. Solutions like Dell EMC VxRail simplify operations and significantly reduce TCO. Recent research from Evaluator Group shows how VxRail compares to AWS On-Demand: Learn how to lower TCO with Evaluator Group’s full analysis
Tags : 
    
Dell EMC & Intel

Transformez l’IT et Dopez Votre Chiffre D’Affaires

Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
Transformez l’IT et métamorphosez votre datacenter en un générateur de chiffre d’affaires. L’environnement actuel des entreprises, toujours actif, compte sur l’IT pour apporter un avantage concurrentiel. La solution passe par la transformation de l’IT. Transformez votre IT avec les technologies Dell EMC et Intel® de Cloud, hyperconvergence, stockage de données, serveurs, réseaux ouverts et protection de données.
Tags : 
    
Dell EMC & Intel

The Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9

Preempt launches access control platform that bridges identity, behavior and risk

Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt

Realize Modern Data Protection

Published By: Dell EMC Storage     Published Date: Nov 28, 2018
Powerful data protection in a converged appliance that is easy to deploy and manage — at the lowest cost-to-protect. The integrated appliance brings together protection storage and software, search, and analytics — plus simplified system management and cloud readiness. And, the IDPA System Manager, with its clean, intuitive interface, provides a comprehensive view of data protection infrastructure from a single dashboard.
Tags : 
    
Dell EMC Storage

Why Legacy Security Architectures Are Inadequate in a Multi-cloud World

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA

How the Rapid Adoption of Public Clouds Is Affecting Cybersecurity

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Companies are increasingly moving data and applications to public cloud platforms. Sometimes these transitions happen with IT’s approval and guidance; sometimes they don’t. Regardless, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. It’s difficult to gain visibility and control of the security posture when the organization relies on an assortment of disparate cloud platforms that all take different approaches to security and offer different tools. And it’s hard for a small security staff to stay on top of disparate solutions that fail to integrate.
Tags : 
    
Fortinet EMEA

A Ciso Guide to Multi-cloud Security

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
    
Fortinet EMEA

Digital Presses Built To Transform Your Business

Published By: HP Inc.     Published Date: May 21, 2019
Experience unmatched versatility for every single job. HP Indigo’s portfolio of sheet-fed digital presses offer the widest range of compatible substrates, specialty inks, and effects so you can make each application as unique as it can be. All powered by HP PrintOS, a unique cloud-based operating system. To find out more watch this video today!
Tags : 
    
HP Inc.

Take your SAP HANA migration to a higher level

Published By: Dell EMEA     Published Date: Oct 10, 2019
Over time SAP environments can become large, fragmented and costly to maintain. Unless of course you have a dynamic, optimised and intelligent infrastructure to run your applications on. Faced with the need to migrate to SAP HANA, organisations are having to modernise their infrastructure and workout which deployment model, on premise, private cloud, public cloud or hybrid cloud is best suited to their applications.
Tags : 
    
Dell EMEA

The Future of HR is Being Reinvented

Published By: Oracle     Published Date: Oct 28, 2019
Organisations should reimagine their workforces with a human focus, and HR leaders have a key role in this transformation. Our webinar discusses the recent trends highlighted in a Deloitte report, including why human capital can no longer be seen as an expense; it has to be viewed as investment. The rise of the individual, self fulfilment and how it should be a prime consideration, and how HR leaders can use cloud as a launch pad to new approaches of finding, rewarding and retaining talent. Discover how future success lies in social enterprises and the role HR and cloud will play.
Tags : 
    
Oracle

MobileIron Content Security Service Datasheet

Published By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron

8 Steps to Zero Trust

Published By: Akamai Technologies     Published Date: Dec 11, 2018
Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile.
Tags : 
    
Akamai Technologies

The 4 Benefits of VPN Elimination

Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies

Zero Trust Delivers 6 Security and Business Benefits

Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies

Bloor: Data Masking Market Update

Published By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
    
Delphix

The PowerEdge R630 Configuration for Microsoft Private Cloud Fast Track

Published By: Dell     Published Date: Sep 04, 2015
Download this white paper to learn how to build a private cloud that seamlessly integrates with external clouds without compromising systems and applications, performance insight and cross-cloud interoperability.
Tags : 
    
Dell

8 Steps to Zero Trust

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile."
Tags : 
zero trust, security, cyber security, cloud
    
Akamai Technologies

Building the Business Case for Cloud: Real Ways Private Cloud can Benefit Your Organization

Published By: Dell     Published Date: May 04, 2015
Read this paper to further learn how: - Leveraging cloud technology can help drive costs while enabling service-oriented IT. - Private and hybrid cloud approached improve application delivery. - Cloud implementations increase agility and help organizations adjust to meet customer and worker expectations. - Dell Cloud features Intel® technology.
Tags : 
    
Dell

What Makes a Private Cloud a Cloud?

Published By: Dell     Published Date: May 04, 2015
To run a truly efficient private cloud, the enterprise must have clear visibility into operations, applications, and costs, no matter how heterogeneous the underlying virtualized environment. Read on to learn how to build the ties that bind the private cloud infrastructure to what the business needs.
Tags : 
    
Dell

Cloud Comparison: Microsoft Private Cloud Powered by Dell vs. a Leading Public Cloud Provider

Published By: Dell     Published Date: May 04, 2015
This resource examines the performance and TCO for a leading public cloud service provider against the Intel Processor-powered Dell approach with Microsoft private cloud. Read on to learn which one provides better value and performance.
Tags : 
    
Dell

Hyper Converged Infrastructure Appliances for Private Cloud

Published By: Dell     Published Date: May 04, 2015
short report discussing the growth and use of news converged infrastructure solutions for private cloud.
Tags : 
    
Dell

DOES MY ENTERPRISE NEED WEB APPLICATION SECURITY?

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Why Cloud-Based Security is Crucial for Enterprise Web Applications
Tags : 
web application, security, cloud-based security
    
Akamai Technologies

Forecasting the Impact of Microsoft Windows Server 2012 R2

Published By: Dell     Published Date: Feb 04, 2015
More than 23 million servers in the world are still running on the Microsoft Windows Server 2003 operating system, making it the most popular engine for serving information and applications globally for over a decade. But, starting in July 2015, Microsoft will no longer provide basic support for it.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003
    
Dell
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.