distributed

Results 176 - 200 of 505Sort Results By: Published Date | Title | Company Name

Are Your DNS Servers as Secure and Available as the Rest of Your Network?

Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox

2018 Buyers Guide: Collaborative Solutions to Create the Workplace of the Future, Today

Published By: Polycom     Published Date: Mar 12, 2018
"Traditional offices and meeting rooms are giving way to open team and mobile spaces, as well as huddle rooms, all of which present challenges for effective collaboration in geographically distributed organizations. Polycom can help you transform the way you and your teams work and compete more effectively with intuitive collaboration tools that fit with the way your teams work, not the other way around. The Polycom 2018 Buyers Guide will help you understand how to apply team collaboration technology to meeting spaces of all sizes.
Tags : 
workplace, mobile, polycom, business, optimization
    
Polycom

A Cybercriminal’s Guide to Exploiting DNS for Fun and Profit

Published By: Infoblox     Published Date: Sep 09, 2014
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do—as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox

Protecting DNS Infrastructure—Inside and Out

Published By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox

Designing a Secure DNS Architecture

Published By: Infoblox     Published Date: Sep 09, 2014
An integrated DNS architecture is needed in today’s networking landscape. Designing a secure DNS architecture requires more than increased bandwidth and QPS. Learn how to build a secure and scalable DNS solution to ensure network availability.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox

Integrate Your Business Network with the Blockchain Platform

Published By: Oracle     Published Date: Feb 21, 2018
Enable real-time transactions and securely share tamper-proof data across a trusted business network. Oracle Blockchain Cloud Service gives you a pre-assembled platform for building and running smart contracts and maintaining a tamper-proof distributed ledger.
Tags : 
    
Oracle

Integrate Your Business Network with the Blockchain Platform

Published By: Oracle     Published Date: Feb 21, 2018
Enable real-time transactions and securely share tamper-proof data across a trusted business network. Oracle Blockchain Cloud Service gives you a pre-assembled platform for building and running smart contracts and maintaining a tamper-proof distributed ledger.
Tags : 
    
Oracle

Is it Now Time for Transfer Agency to Recognize the 'Disruptor'

Published By: Oracle     Published Date: Feb 21, 2018
We have been awash in the Financial Services over the past several years of hearing of the next big technology that will change the face of the industry, and Transfer Agency has been no different. In the year 2017 it is the turn of Distributed Consensus Ledger Technology (also known as ‘Blockchain’) to set pulses racing and generate many reams of papers from various parties. Whatever happened to Big Data from 2016? Download this article to learn more!
Tags : 
    
Oracle

VMware jumps back into IDaaS Pool with VMware Identity Manager (May 2016)

Published By: VMware     Published Date: May 10, 2017
VMware Identity Manager provides single sign-on (SSO) to a broad range of SaaS applications, as well as legacy applications published via virtual desktop platforms from VMware and Citrix, and browser-based and native mobile apps. VMware Identity Manager also provides application provision¬ing and conditional (adaptive, or risk-based) access controls, and can be deployed either on-premises or in the cloud. In this report, 451 Research analyzes VMware’s strategic effort to bridge the legacy on-premises world (which still represents most of its business) with the more highly distributed and heterogeneous worlds of mobile and cloud computing. 451 also examines VMware’s re-entry into the IDaaS market is to extend their market reach beyond what VDI and EMM might accomplish individually.
Tags : 
    
VMware

Meet expectations in an always-connected high-tech market

Published By: Dassault Systèmes     Published Date: May 09, 2018
Today’s thriving High-Tech sector is driven by shrinking product lifecycles, rapid innovation, distributed engineering/manufacturing—and highly demanding customer expectations. The industry needs to deliver on multiple fronts, including: • Embed customer-centric innovation throughout the lifecycle: Only with customer experience at the core can companies stay ahead. • Tame ideas into executable products: Detecting early trends and using customer feedback is vital. • Manage complexity better: Increasing visibility of all product data helps build and manage digital models to use in every business function from R&D to field service. • Create relevant connected systems: High-Tech innovators use IoT for an ongoing dialogue of customers, devices and manufacturers. • Provide agility to compete on software, hardware and service: Customers want value from every interaction. Download your targeted industry analysis to learn more.
Tags : 
    
Dassault Systèmes

Microservices: The Evolution of Building Modern Applications

Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
As enterprises work to replicate the development agility of internet companies and innovate in highly competitive markets, application development has grown increasingly complex. The large, monolithic codebases that traditionally power enterprise applications make it difficult to quickly launch new services. Siloed and potentially distributed development and operations teams present organizational alignment problems. On top of this, users are more demanding than ever – enterprises need to scale effectively and monitor deployments to ensure customers are provided with high performance and a consistent experience. Of course, all this needs to be done while providing always-on service availability.
Tags : 
microservices, mongodb, optimization, applications, astute
    
AstuteIT_ABM_EMEA

Blockchain & Manufacturing

Published By: TIBCO Software     Published Date: Sep 03, 2019
For years, manufacturers have been trying to streamline processes and associated supply chains by building marketplaces, standardized exchanges, and monolithic systems. In many cases, these solutions missed the mark, resulting in fragmented and brittle processes without easy data sharing. Blockchain, the underlying technology behind Bitcoin and other cryptocurrencies, can potentially solve these problems. Sharing information via a trusted distributed network with embedded business logic offers many benefits for manufacturing, especially when combined with the IoT and AI communities. Watch this webinar: Blockchain & Manufacturing: A Smarter Way to Drive Efficiency in the Semiconductor and Electronics Supply Chains, with speaker Nelson Petracek, chief technology officer, TIBCO Software.
Tags : 
    
TIBCO Software

The Distributed Cloud: Infrastructure at the Edge (Japanese)

Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel

The Definitive Guide to Container Platforms

Published By: Docker     Published Date: Feb 21, 2019
Docker containers exploded onto the scene in 2013 as a better way to develop software and has quickly become part of the enterprise infrastructure. Organizations often start by containerizing applications -- either components of a monolithic application or new distributed applications. But containerization itself isn’t enough to become more innovative. It requires changing processes, culture and the overall organizational mindset. That makes a container platform essential to success. In this paper, we will discuss what a container platform is and why it’s a critical part of any effort to drive change and innovation in the digital economy.
Tags : 
migrate applications, containerization, application development, digital transformation, microservices, modernization, cloud computing, hybrid cloud, application security
    
Docker

What is Local Marketing Automation & Why is it Critical to Distributed Marketers

Published By: Gleanster Research     Published Date: Oct 22, 2013
This Deep Dive from Gleanster research will explore why some marketing technologies may not be the best solution for distributed marketers and how an merging class of technology called “local marketing automation” is enabling corporate marketing to oversee brand consistency and simultaneously give local marketers autonomy and control over communications to their local target audiences.
Tags : 
    
Gleanster Research

Campaign Management Technology for a Distributed Marketing Function

Published By: Gleanster Research     Published Date: Oct 26, 2013
This Deep Dive research study from Gleanster explores how Top Performing organizations are using a new class of multi-channel campaign management technology called "local marketing automation" to empower local / regional marketers with marketing technology while simultaneously maintaining corporate control over the brand.
Tags : 
    
Gleanster Research

5 Ways StreamSets Tames Apache Kafka

Published By: StreamSets     Published Date: Sep 24, 2018
If you’ve ever built real-time data pipelines or streaming applications, you know how useful the Apache Kafka™ distributed streaming platform can be. Then again, you’ve also probably bumped up against the challenges of working with Kafka. If you’re new to Kafka, or ready to simplify your implementation, we present common challenges you may be facing and five ways that StreamSets can make your efforts much more efficient and reliable
Tags : 
apache, kafka, steam, sets, data
    
StreamSets

SD-WAN: A Simplified Network for Distributed Enterprises

Published By: Citrix     Published Date: Apr 10, 2017
Citrix can help you with the challenge of adopting a new approach to WAN technology.
Tags : 
citrix, wan, wan technology, mobility, cloud, cloud computing, mobile computing, virtualization
    
Citrix

Eliminating the Challenge of Branch Office Recovery

Published By: Riverbed Technology, Inc.     Published Date: Apr 22, 2014
In today’s global economy, companies are increasingly distributed. That puts IT in a precarious position, especially when it comes to disaster recovery. It can take days to restore branch operations. Branch converged infrastructure delivers local performance, stores data safely in the datacenter, and enables instant recovery. Learn how to recover faster, reduce risk, and save money.
Tags : 
riverbed, branch office recovery, branch office, data loss, risk aversion, backup recovery, virtual servers, branch operations, technology challenges, it management, data management
    
Riverbed Technology, Inc.

Taneja-Converging Branch IT Infrastructure the Right Way - Riverbed SteelFusion

Published By: Riverbed Technology, Inc.     Published Date: Apr 22, 2014
In this Taneja Group Product Profile we review Riverbed’s SteelFusion (formerly Granite), and examine how it marries together multiple technical advances to deliver innovative branch converged infrastructure. SteelFusion supports distributed IT by addressing traditional branch challenges – providing simplified deployment, resiliency in the face of network issues, improved protection, fast recovery from the central datacenter, and a greatly lowered OPEX.
Tags : 
riverbed, branch office recovery, branch office, data loss, risk aversion, backup recovery, virtual servers, branch operations, technology challenges, it management, data management
    
Riverbed Technology, Inc.

Chalk Talk - Private Cloud Consolidation

Published By: Riverbed     Published Date: May 18, 2012
In this short video, Bob Gilbert, Riverbed's tech evangelist, explains why a centralized computing model is now preferred by distributed organizations, and the challenges of consolidation. Watch now to learn about the powerful technologies that can optimize your WAN so that applications can run up to 50 times or more faster, giving your users superlative performance. as they do with thick clients.
Tags : 
cloud computing, riverbed, wan, wan optimization, business technology
    
Riverbed

Frost & Sullivan: Continuous Compliance and Next Generation NAC Report

Published By: ForeScout     Published Date: Feb 18, 2014
Find out how companies with hundreds to thousands of devices and distributed networks are managing security risks, enabling BYOD adoption, and supporting IT-GRC framework specifications. Download the Frost & Sullivan: Continuous Compliance and Next Generation NAC report. Click to download the report.
Tags : 
forescout, frost & sullivan, network access control, nac, deployment, interoperability, guest management, endpoint compliance, enforcement, remediation & scalability, byod, grc, networking, it management, knowledge management, enterprise applications
    
ForeScout

PST Enterprise Data Sheet

Published By: C2C Systems     Published Date: Apr 24, 2013
Download this white paper to see how PST Enterprise enables corporate IT to regain control of distributed corporate email found in PST files to manage compliance, support discovery and minimize risk associated with this data. It enables full discovery of all PST files, regardless of their location or status, and it provides the information needed to take intelligent action on the data within. Such actions include owner determination, in-place retention, data migration, and file copy, move, disconnect and deletion.
Tags : 
pst enterprise, files, emails, data migration, file copy, distribution
    
C2C Systems

Good Migrations: Five Steps to Successful Public Cloud Migration

Published By: AppDynamics     Published Date: Nov 02, 2017
Cloud computing has been gaining momentum for years. As the technology leaves the early adopter phase and becomes mainstream, many organizations find themselves scrambling to overcome the challenges that come with a more distributed infrastructure. One of those difficulties is getting through a major cloud migration.
Tags : 
    
AppDynamics

Migration to AWS in Five Steps

Published By: AppDynamics     Published Date: Mar 05, 2018
Cloud computing has been gaining momentum for years. Many more enterprises see public cloud as their top priority, up from 29 percent in 2017 to 38 percent in 2018 according to the RightScale “State of the Cloud Report” published in 2018. As the technology leaves the early adopter phase and becomes mainstream, many organizations find themselves scrambling to overcome the challenges that come with a more distributed infrastructure. One of those difficulties is getting through a major cloud migration.
Tags : 
    
AppDynamics
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.