cloud computing

Results 351 - 375 of 1498Sort Results By: Published Date | Title | Company Name

Identity-Centric Security: Enabling and Protecting the Business

Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies

The adoption of cloud-based services: Increasing confidence through effective security

Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies

The adoption of cloud-based services: Increasing confidence through effective security

Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies

Automating the Top 20 CIS Critical Security Controls

Published By: Qualys     Published Date: Feb 17, 2016
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find. Thankfully, the CIS Top 20 Critical Controls provides a pragmatic approach, offering prioritized guidance on the important steps for implementing basic cyber hygiene practices. With the CIS Top 20 Critical Security Controls, CISOs now have a blueprint for reducing risk and managing compliance. By automating each of these controls, CISOs enable their information security teams to do much more with less, essentially operationalizing good cyber hygiene.
Tags : 
qualys, cis, critical security, cloud computing, cyber security, networking, security, it management, enterprise applications
    
Qualys

Automating NetOps: Closing the IT Skills Gap

Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Enterprises understand that greater efficiency, improved time-to value, and new opportunities can be gained by using cloud platforms; automating and accelerating their IT delivery; and putting technology to work in new ways to digitally transform their business. The difficult question is how to create an organization that is able to deliver these innovations. Skilled resources do exist, but they command high salaries and are in short supply. In fact, 70% of respondents to a recent Computing survey stated that their companies face a shortage of cloud skills. While bringing in experienced staff who can guide and lead new initiatives is often a necessity, it’s vital to concurrently train your existing staff and adopt solutions that narrow the gap between the realities of the present and the hopes for the future.
Tags : 
netops, skills, automation, enterprises, cloud, delivery, resources
    
F5 Networks Inc

Zero Trust Security: A New Paradigm For a Changing World

Published By: Centrify Corporation     Published Date: May 22, 2018
A significant paradigm shift occurred in the last few years. Much like other technological shifts of the last decade — when cloud computing changed the way we do business, agile changed the way we develop software and Amazon changed the way we shop — Zero Trust presents us with a new paradigm in how we secure our organizations, our data and our employees. While difficult to identify the precise tipping point, one thing is certain: what were once extraordinarily high-profile, damaging breaches are no longer extraordinary. In just the last 18 months, Yahoo, Accenture, HBO, Verizon, Uber, Equifax, Deloitte, the U.S. SEC, the RNC, the DNC, the OPM, HP, Oracle and a profusion of attacks aimed at the SMB market have all proven that every organization — public or private — is susceptible. The epiphany behind the paradigm shift is clear: Widely-accepted security approaches based on bolstering a trusted network do not work. And they never will. Especially when businesses are dealing with skill
Tags : 
    
Centrify Corporation

Analyst White Paper: EMC IT – Leading the Transformation

Published By: EMC Corporation     Published Date: May 27, 2014
ESG Whitepaper: Find out how EMC’s own IT organization is reaping the benefits of Cloud computing and IT-as-a-Service (ITaaS), including new levels of efficiency, agility, and productivity
Tags : 
emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services, cloud architecture, it management, data center
    
EMC Corporation

FAQ: Building your own private cloud

Published By: EMC Corporation     Published Date: May 27, 2014
If your organization is considering building a private cloud, you should read this extensive set of FAQs from EMC. Get answers to critical questions before you make your move.
Tags : 
emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services, cloud architecture, it management, data center
    
EMC Corporation

A blended future: The changing mix of IT service delivery and consumption

Published By: EMC Corporation     Published Date: May 27, 2014
Get in-depth insights from a new global survey of executives by The Economist Intelligence Unit, which confirms significant change in how organizations like yours deliver and use IT services, and advocates a blended model of internal and third-party services.
Tags : 
emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services, cloud architecture, it management, data center
    
EMC Corporation

IDC Whitepaper: Selecting the Optimal Path to Private Cloud

Published By: EMC Corporation     Published Date: May 27, 2014
Explore three key Cloud computing models—integrated infrastructure systems, reference architectures, and “build your own” solutions. See how EMC gives you the freedom to chose the optimal path to your private Cloud—and the solutions to support your deployment.
Tags : 
emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services, cloud architecture, it management, data center
    
EMC Corporation

SDN 102: Software Defined Networks and the Role of Application Delivery Network Services

Published By: Citrix Systems     Published Date: Jul 28, 2015
Organizations are looking to SDN to improve network agility by incorporating network automation in cloud computing platforms. So far the focus of SDN has been on L2-L3 switching and routing services. However applications don’t just need network connections. They also need L4-L7 network services.
Tags : 
    
Citrix Systems

Virtualizing disaster recovery using cloud computing

Published By: IBM     Published Date: Jul 13, 2012
Read through this essential resource to uncover the benefits of a cloud-based approach to disaster recovery. Don't put your enterprise at risk by practicing DR methods that require you to compromise.
Tags : 
ibm, technology, cloud computing, organizations, virtualizing, recovery, cloud, storage virtualization, web service management, business technology, virtualization
    
IBM

Developing Effective Resiliency Capability within a Cloud Design

Published By: IBM     Published Date: Jul 13, 2012
As you move forward with your cloud initiative, it's critical to develop an effective resiliency management program so that your business remains protected in your new environment. This white paper discusses the key elements that make up a successful cloud-based strategy and examines the critical business areas and functions you'll need to assess.
Tags : 
ibm, technology, cloud, cloud computing, resiliency, business, white paper, web service security, data protection, database security, project management, business technology
    
IBM

9 Reasons Why Citrix NetScaler Beats The Competition

Published By: Citrix     Published Date: Nov 09, 2012
Cloud is a rapidly emerging necessity in IT. Relied upon the world's largest enterprise data centers and cloud networks, NetScaler is universally recognized as an outstanding application delivery controller. Learn how NetScaler beats the competition.
Tags : 
citrix, adc, application delivery controllers, citrix netscaler, cloud, cloud computing, business technology, infrastructure, infrastructure management
    
Citrix

Maximize the Advantages of Desktop Virtualization to Drive Business Growth

Published By: Citrix     Published Date: Nov 09, 2012
Desktop virtualization helps organizations support business priorities that are crucial for growth. By freeing people to work in more places, this increases productivity and efficiency for workers. Learn how to maximize virtualization to drive growth
Tags : 
citrix, desktop virtualization, business growth, xendesktop, it infrastructure, cloud computing, business technology, virtualization, infrastructure
    
Citrix

Protecting the Cloud

Published By: Fortinet     Published Date: Nov 14, 2012
Fortinet Technologies and Services that Address Your Cloud Security Challenges
Tags : 
fortinet, cloud, cloud computing, cloud security, total cost of ownership, tco, scalability, security management, business technology
    
Fortinet

Empower your people with a modern cloud

Published By: Oracle     Published Date: Sep 21, 2015
Consumer applications are changing the way we work and propelling today’s workforce to advanced levels. Arm your people with a modern ERP and empower them toward higher levels of productivity.
Tags : 
cloud computing, erp, productivity, applications, efficiency, application integration, best practices, business intelligence, enterprise resource planning, enterprise software
    
Oracle

Realizing More Savings with Oracle Procurement Cloud

Published By: Oracle     Published Date: Apr 27, 2015
In This Paper • Smarter spend management is lacking in most organizations, largely due to the tools being used to manage their procurement processes • Oracle Procurement Cloud combines cloud, best-of-breed functionality, and native connectivity • Deploying Oracle Procurement Cloud can resolve pain points with transactional and strategic procurement
Tags : 
cloud computing, procurement, connectivity, spend management, best practices, business activity monitoring, business analytics, business intelligence, business management, productivity, business technology
    
Oracle

Powering Project-Driven Businesses with Oracle Project Portfolio Management Cloud

Published By: Oracle     Published Date: Apr 27, 2015
In This Paper • Many enterprises lack a holistic view of their project management processes • Oracle Project Portfolio Management (PPM) Cloud uses open standards to create a best-in-class solution • Oracle PPM Cloud makes it easier for users to collaborate on projects internally or externally
Tags : 
ppm, oracle, transformative projects, project portfolio management, analytics, optimization, erp, cloud computing, best practices, business analytics, business integration, enterprise software, eprocurement, workforce management, productivity, project management
    
Oracle

Five Tenets of Modern Procurement: Move Source-to-Pay to the Cloud

Published By: Oracle     Published Date: Apr 27, 2015
In order to ensure that your modern procurement solution supports a modern approach, we've outline 5 primary tenets of a modern procurement solution through the cloud.
Tags : 
ppm, oracle, transformative projects, project portfolio management, analytics, optimization, erp, cloud computing, best practices, business activity monitoring, business intelligence, enterprise resource planning, enterprise software, eprocurement
    
Oracle

Five Tenets of Modern Project Portfolio Management: Powering Project-Driven Business

Published By: Oracle     Published Date: Apr 27, 2015
Learn how Oracle technology solves PPM pain points through role-based analytics, social collaboration, optimization, costing, control, and mobile solutions for today’s project team.
Tags : 
ppm, oracle, transformative projects, project portfolio management, analytics, optimization, erp, cloud computing, best practices, business analytics, business integration, business intelligence, business management, project management, productivity
    
Oracle

Modernizing Finance with Oracle Financials Cloud

Published By: Oracle     Published Date: Apr 27, 2015
In This Paper • Finance is often first to adopt software solutions to automate business transactions and processes • Oracle Financials Cloud is a complete and integrated financial management solution • Businesses deploy Oracle Financials Cloud to help resolve pain points around control, compliance, and more
Tags : 
cloud computing, erp, productivity, applications, efficiency, finance, software solutions, management, compliance, best practices, business activity monitoring, business management, ebusiness, enterprise resource planning, enterprise software, eprocurement, project management
    
Oracle

Connect, Control, Innovate with Oracle ERP Cloud

Published By: Oracle     Published Date: Apr 27, 2015
Read on to explore how Oracle ERP Cloud can support your organization and help you overcome key financial challenges, today and into your future.
Tags : 
erp, cloud computing, finance, enterprise, financial software, best practices, business activity monitoring, business analytics, business intelligence, ebusiness, enterprise resource planning, enterprise software, eprocurement
    
Oracle
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.