cisco

Results 1101 - 1125 of 1549Sort Results By: Published Date | Title | Company Name

Recruiting & HR Conferences Part 2

Published By: Entelo     Published Date: Sep 06, 2017
We searched high and low to find every top recruiting and HR conference happening around the world between July and December of 2017. From London and Omaha, to Amsterdam and San Francisco, you'll find nearly 100 events to choose from. Inside you’ll find actionable intel to help you make informed, decisions about which conferences and events best fit your professional goals and organizational imperatives, including: The full rundown on conferences and meetups happening through the end of 2017, focused on recruiting, human resources, talent management, diversity and inclusion, and more Dates, locations, and cost breakdowns to make planning a cinch Keynote speakers and interesting sessions that we’ve got our eyes on Recommendations on who should attend each conference Which events Entelo will be attending, sponsoring or presenting Download your copy of the Ultimate Guide to start planning where you're headed this Summer and Fall!
Tags : 
    
Entelo

Redefining the Economics of Data Center IT Productivity

Published By: Cisco     Published Date: Jan 16, 2014
The purpose of this document is to help IT departments envision the cost savings, productivity improvements, and economic agility benefits they can attain by focusing on these three goals.
Tags : 
cisco, data center, it productivity, roi, return on investment, it management
    
Cisco

Reduce Phishing Risk in Minutes with Umbrella and Duo

Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA

Reduce TCO by Automating SAP System Copy/System Refresh Procedures with Cisco-Tidal

Published By: Cisco     Published Date: Jun 04, 2010
Please join us for an informative session as we demonstrate how organizations are increasing efficiencies, and improving performance using SAP Solution Manager and Tidal Intelligent Automation for SAP.
Tags : 
cisco webinar, tco, automating sap, tidal intelligent automation, copy and refresh
    
Cisco

Reduce the number of ransomware infections across your organization

Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
What is ransomware? Ransomware is a malicious software designed to hold a user’s files (such as healthcare records, financial contracts, manufacturing blueprints, software code, and other documents) for ransom by encrypting them and demanding the user pay a fee (often in Bitcoin) to decrypt them. How ransomware works Attackers initiate attacks using an array of tactics. Ransomware infections often first begin with an exploit kit — which are software kits designed to identify software vulnerabilities on endpoints and then upload and execute malicious code on the endpoint. Although variants of ransomware behave differently — there are many ways that Cisco can help. Download this whitepaper today to find out more.
Tags : 
    
Cisco Umbrella EMEA

Rendete moderna la rete con Citrix Networking e Google Cloud

Published By: Cisco and NVIDIA Corporation     Published Date: Oct 28, 2019
Citrix Networking e Google Cloud sono la combinazione perfetta per aiutare il reparto IT a superare le varie sfide legate alla distribuzione e alla gestione delle applicazioni.
Tags : 
    
Cisco and NVIDIA Corporation

Report annuale sulla cybersecurity

Published By: Cisco EMEA     Published Date: May 15, 2018
E se i responsabili della sicurezza potessero prevedere il futuro? Se sapessero che un attacco è imminente, potrebbero bloccarlo o almeno mitigarne l’impatto e si adopererebbero per mettere in sicurezza le risorse che più necessitano protezione. In effetti gli addetti alla sicurezza sono in grado di vedere cosa si profila all’orizzonte: gli indizi sono molti (ed evidenti).
Tags : 
    
Cisco EMEA

Report annuale sulla cybersecurity

Published By: Cisco EMEA     Published Date: Jun 05, 2018
E se i responsabili della sicurezza potessero prevedere il futuro? Se sapessero che un attacco è imminente, potrebbero bloccarlo o almeno mitigarne l’impatto e si adopererebbero per mettere in sicurezza le risorse che più necessitano protezione. In effetti gli addetti alla sicurezza sono in grado di vedere cosa si profila all’orizzonte: gli indizi sono molti (ed evidenti).
Tags : 
    
Cisco EMEA

Report: Forrester TEI Study of FlexPod

Published By: Cisco     Published Date: Jan 05, 2015
This study highlights the benefits and costs of deploying the FlexPod platform across the enterprise of a composite Organization. The findings in this study are in large part based on in-depth interviews conducted bu Forrester with four organizations that have invested in and deployed NetApp's and Cisco's FlexPod platform.
Tags : 
solution guide, integrate, infrastructure, solutions, applications, it management, data management
    
Cisco

Report: Forrester TEI Study of FlexPod

Published By: Cisco     Published Date: Jun 02, 2015
This study highlights the costs and benefits of deploying the flexpod platform across the enterprise of a composite organization.
Tags : 
cisco, data center, effectiveness, applications, resource efficiency, strategy, it infrastructure, tei
    
Cisco

Request For Proposal (RFP)

Published By: Cisco Systems     Published Date: Jun 27, 2013
If you’re looking to the cloud to flexibly deploy collaboration applications and experience predictable costs and services, it is important to take several things into consideration. Cisco can help you choose the best cloud solution for your business needs. This practical guide can help you create the ideal RFP for your company.
Tags : 
cloud flexibility, technology, collaboration, application, cloud solution, rfp, request for proposal, storage
    
Cisco Systems

Requirements for SMD and Midsized Next-Generation Firewall Purchases

Published By: Cisco     Published Date: Jul 10, 2015
Today’s multivector and persistent threats, fluid IT environments, and increasing user mobility are prompting more organizations to seek NGFW capability that provides affordable and effective layered threat protection.
Tags : 
security, ngfw, firewall, threat detection, technology, smd, midisized, anti spam
    
Cisco

Requirements When Considering a Next- Generation Firewall

Published By: Cisco     Published Date: Oct 14, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a next-generation firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise.
Tags : 
cisco, nfgw, next generation firewall, enterprise management, network visibility, malware activity, malware protection, security solutions
    
Cisco

Requirements When Considering a Next-Generation Firewall

Published By: Cisco     Published Date: Jan 15, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter
    
Cisco

Requirements When Considering a Next-Generation Firewall (WP)

Published By: Cisco     Published Date: Apr 08, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise. An NGFW must be able to: • Integrate security functions tightly to provide highly effective threat and advanced malware protection • Provide actionable indications of compromise to identify malware activity • Offer comprehensive network visibility • Help reduce complexity and costs • Integrate and interface smoothly and transparently with third-party security solutions • Provide investment protection
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection
    
Cisco

Rethinking the Network as a Security Sensor and Enforcer

Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
    
Cisco

Rethinking the Network as a Security Sensor and Enforcer

Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco

Réussir la virtualisation : Cisco Unified Computing System

Published By: Cisco     Published Date: May 14, 2015
Au cours de la dernière décennie, la virtualisation a transformé le data center. Les services IT ont recours à la virtualisation afin de consolider de nombreuses charges de travail de serveur sur un nombre restreint de serveurs plus puissants.
Tags : 
cloud computing, erp, productivity, applications, efficiency, cisco, network management, network performance
    
Cisco

Right sized for Midsize: Leverage the Network Infrastructure for Competitive Succe

Published By: Cisco     Published Date: Jun 02, 2015
This white paper examines the opportunity midmarket firms have in leveraging network infrastructure for competitive success in the new cloud and mobility era.
Tags : 
network infrastructure, management resources, leveraging networks, competitive success, networking, wireless, infrastructure
    
Cisco

Right sized for Midsize: Leverage the Network Infrastructure for Competitive Success

Published By: Cisco     Published Date: Dec 23, 2014
Read this IDC white paper to learn how other organizations are prioritizing infrastructure investments to improve their competitive differentiation and performance.
Tags : 
network infrastructure, competitive success, competitive performance, midsized company
    
Cisco

Rightsize for the Midsize: Leverage the Network Infrastructure for Competitive Success

Published By: Cisco     Published Date: May 14, 2015
This white paper examines the opportunity midmarket firms have in leveraging network infrastructure for competitive success in the new cloud and mobility era.
Tags : 
networking, api, applications, management, visualizing, best practices, cisco, infrastructure
    
Cisco

RISE OF THE HUDDLE SPACE An International Survey of Users, IT Professionals, and Facilities Managers

Published By: Cisco     Published Date: Dec 20, 2018
This research finds that huddle spaces deliver tremendous value to businesses, with 9 out of 10 participants stating the adoption of open space environments is increasing the need for these huddle spaces. Huddle spaces require a wide variety of technologies to enable users and the business, such as audio and video conferencing abilities, digital whiteboards and scheduling solutions. Users stated that ease of use, solution reliability, and similar technology in each huddle space is key to their productivity. But nearly 8 out 10 users shared they were frustrated with meeting room technology recently. These problems generate support calls to IT on a weekly, if not daily, basis
Tags : 
    
Cisco

Run Book Automation for the Cisco Unified Computing System: Integrate IT Operations Management

Published By: Cisco     Published Date: Mar 15, 2011
This whitepaper discusses how the Cisco Unified Computing System and Cisco Tidal Enterprise Orchestrator can help IT departments to control costs, improve efficiency, and speed service delivery to the business.
Tags : 
cisco, run book automation, unified computing system, operations management, automated infrastructure platform, tidal enterprise orchestrator, infrastructure, interoperability
    
Cisco

Running Microsoft Applications on VMware vSphere, NetApp Unified Storage, and Cisco Unified Fabric

Published By: Netapp     Published Date: Apr 02, 2013
This report applies to Microsoft® Exchange Server, SQL Server®, and SharePoint® Server mixed workload on VMware®vSphere™ 4, NetApp®unified storage (FC, iSCSI, and NFS), and Cisco Nexus®unified fabric.
Tags : 
microsoft, exchange server, server, sql, sharepoint, vmware, unified storage, storage
    
Netapp

Running Microsoft Enterprise Apps on VMware vSphere, NetApp Unified Storage and Cisco Unified Fabric

Published By: NetApp and VMware     Published Date: Jan 09, 2012
This document provides guidance on how to design and architect a scalable Microsoft applications mixed workload solution.
Tags : 
unified storage, virtual, infrastructure, leverage, protocol, application, solution, backup
    
NetApp and VMware
Start   Previous    38 39 40 41 42 43 44 45 46 47 48 49 50 51 52    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.