enterprise appliance

Results 26 - 46 of 46Sort Results By: Published Date | Title | Company Name

Proven Value with the Oracle Database Appliance

Published By: Oracle Corp.     Published Date: Mar 05, 2013
While Oracle has long offered Oracle Exadata to serve the needs of larger enterprises, the Oracle Database Appliance now offers that same high availability, service, and reliability to small- and mid-sized markets.
Tags : 
oracle, database, oracle database appliance, oracle exadata, business technology
    
Oracle Corp.

Qsent Calls NeoScale for Encryption Assistance

Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Qsent needed to shore up its disaster recovery strategy. This meant sending backup tapes – each with more than 2.5 terabytes of data – between data centers and storing them offsite. To keep all its data safe and secure, Qsent chose NeoScale’s CryptoStor wire-speed tape security appliance to encrypt and decrypt data.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.

Rapid WebSphere Application Server Provisioning with WebSphere CloudBurst Appliance

Published By: IBM Corporation     Published Date: Sep 20, 2010
This IBM® Redguide™ publication provides a high level overview of the new IBM WebSphere® CloudBurst™ Appliance, including current issues being faced in the information technology (IT) industry and how WebSphere CloudBurst can address many of these issues.
Tags : 
application servers, enterprise software, ibm websphere, application server, middleware, cloudburst appliance, server provisioning, server virtualization, web sphere, service oriented architecture, cloud computing
    
IBM Corporation

Riverbed vs Silver Peak: WAN Optimization Vendors Put to the Test

Published By: Silver Peak     Published Date: Jun 24, 2013
Enterprises are relying on WANs to carry more data than ever. With cloud computing, offsite disaster recovery and big data on the rise, it's more important than ever for IT professionals to boost application performance across the WAN. However, times are changing. Instead of deploying a physical WAN optimization appliance to improve application performance, the industry is moving to a better approach - virtual WAN acceleration software. It can be downloaded in minutes, runs almost anywhere, and controlled with the click of a mouse for maximum flexibility. In this report we not only explore the requirements for virtual WAN optimization but compare how Silver Peak's virtual WAN acceleration stacks up against Riverbed's physical Steelhead appliance.
Tags : 
enterprises, cloud computing, offsite disaster recovery, big data, technology, virtual wan, software, optimization, application, security, knowledge management, storage, business technology
    
Silver Peak

SAM in an Imperfect World: How to Address The Real-World Challenges of Managing Software Assets

Published By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management, remote access
    
CDW

Scale your Splunk Deployment with Gemini Data's Security Appliance for Splunk

Published By: Gemini Data     Published Date: Jan 16, 2018
The increasing reliance on big data platforms for all functions of the organization has been transformative. As these environments mature and data volumes increase, organizations face infrastructure and management scalability challenges. Gemini Enterprise Manager simplifies deployment and management with a turnkey, NoOps appliance, providing simplicity, security, and speed to accelerate the time to value for any analysis use case. Manager allows you to control your Splunk deployment as a single, unified solution deployed on premises, in the cloud or both.
Tags : 
    
Gemini Data

Simplifying the Distributed Datacenter with VCE VxRail Appliances

Published By: Dell EMC     Published Date: Nov 04, 2016
While some distributed enterprises look to the cloud to reduce server sprawl and centralize operations, in many cases, the cloud simply isn’t feasible. Maybe the offices are in remote locations with limited Internet service or low-bandwidth connectivity causes issues such as latency and availability. Download the solutions brief to discover why VCE VxRail hyper-converged appliances from Dell EMC are ideal for consolidating multiple applications in a remote location onto a single, high-performance and high-availability platform that’s easy to deploy and manage.
Tags : 
distributed enterprises, vmware, storage, virtualization, software management, appliances, storage management, infrastructure management
    
Dell EMC

Snow Secures Man-Sized Cost Savings For FTSE 250 Investment Specialist

Published By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, man investments, asset, softcat, it management
    
CDW

Spectrum Federal Credit Union Implements NeoScale Encryption Solution

Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.

Straight Talk 7 Consideration to Future-proof Your Load Balancing Strategy

Published By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises to become more application-centric. With application owners seeking public-cloud-like simplicity and flexibility in their own data centers, IT teams are under pressure to reduce wait times to provision applications. Legacy load balancing solutions force network architects and administrators to purchase new hardware, manually configure virtual services, and inefficiently overprovision these appliances. Simultaneously, new infrastructure choices are also enabling IT teams to re-architect applications into autonomous microservices from monolithic or n-tier constructs. These transformations are forcing organizations to rethink load balancing strategies and application delivery controllers (ADCs) in their infrastructure.
Tags : 
    
Avi Networks

Straight Talk: 7 Considerations to Future-Proof Your Load Balancing Strategy

Published By: Avi Networks     Published Date: Mar 17, 2016
Software-defined architectures have transformed enterprises to become more application-centric. With application owners seeking public-cloud-like simplicity and flexibility in their own data centers, IT teams are under pressure to reduce wait times to provision applications. Legacy load balancing solutions force network architects and administrators to purchase new hardware, manually configure virtual services, and inefficiently overprovision these appliances. Simultaneously, new infrastructure choices are also enabling applications to be re-architected into autonomous microservices from monolithic or n-tier constructs. These transformations are forcing organizations to rethink load balancing strategies and application delivery controllers (ADCs) in their infrastructure.
Tags : 
avi networks, load balancing strategy, best practices, software defined architecture, application centric, application performance, application services, application delivery controller, automation, networking
    
Avi Networks

Technology Insights: The Total Software Management Guide

Published By: CDW     Published Date: Feb 27, 2015
CDW’s Technology Insights guides provide a high-level, informative take on today’s most pressing IT solution areas and related issues. Speaking to the interests and concerns of IT managers and their staff, as well as their enterprise counterparts, the guides provide up-to-date summaries, strategic guidance and best practice tips on the technologies driving IT operations forward.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, it management, distributed computing, collaboration, business technology
    
CDW

Ten Reasons Enterprises are Moving Security to the Cloud

Published By: Zscaler     Published Date: Oct 26, 2018
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.” Organizations understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web filtering. Thousands of companies have already switched their IT security from appliances to experience the benefits of the Zscaler™ Security Cloud. Download this whitepaper today to find out why.
Tags : 
    
Zscaler

Ten Reasons Enterprises are Moving Security to the Cloud

Published By: Zscaler     Published Date: May 15, 2019
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.”
Tags : 
    
Zscaler

The Data-Driven Era Requires Modern IT Infrastructure, Enabling Business Transformation

Published By: Oracle ODA     Published Date: Dec 06, 2016
IT leaders must consider new approaches to database administration, implementation, and security, including proactive management, to reduce time-consuming administrative tasks. This, in turn, will free them to develop strategies for capitalizing on the new data-driven initiatives that can help transform the enterprise. Learn more about these opportunities as well as how products, such as an integrated Database Appliance, can streamline the management of these tasks, while reducing costs and time.
Tags : 
    
Oracle ODA

Unlock Analytic Performance with Revolution R for Enterprise and IBM

Published By: Netezza IBM US     Published Date: Mar 27, 2012
Across all industries, Revolution R Enterprise advanced analytics platform leverages the capabilities of IBM Netezza Analytics on IBM Netezza's family of data warehouse appliances, merging high-performance, scalable data warehouse technology with advanced in-database analytics and massively parallel capabilities
Tags : 
ibm, technology, netezza, analytics, enterprise analytics, application integration, application performance management, business analytics, business intelligence, business technology
    
Netezza IBM US

UT Health Science Center at Houston Safeguards Personal Health Information with NeoScale

Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.

Vega Enterprise SBC Appliance Data Sheet

Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma's Vega Enterprise SBC provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, enterprise appliance, vega sbc, sangoma, datasheet, cost effective solution, networking, knowledge management, enterprise applications, business technology
    
Sangoma

Video Brief: Data Protection Appliances

Published By: Arcserve     Published Date: May 29, 2015
Find out what you need to know about data protection appliances in this video brief by the Enterprise Strategy Group’s Sr. Data Protection Analyst, Jason Buffington. In this short video he’ll analyze: -Various types of data protection appliances -Market trends regarding appliance adoption -What data protection specialists expect from appliances -How Arcserve has evolved to solve the issues of today’s complex organizations Watch this video brief today!
Tags : 
data protection appliances, appliance adoption, arcserve, security, it management, knowledge management, data management
    
Arcserve

What Most Backup Vendors Don't Want You To Know

Published By: Unitrends     Published Date: Aug 18, 2015
There are always a few "secrets" in any industry—and the backup and restore business has its share. Our secrets are widely known within the industry but are less well-known outside of it—for the obvious reason that none of these secrets helps the majority of the vendors in this space. In this white paper, we will reveal these secrets to you.
Tags : 
unitrends, backups, backup software consolidated backup, backup software enterprise, program backup software, network appliance backup, continuous backup software, backup software server, vps, virtual server, data management, business technology, data center
    
Unitrends

Whitepaper: How to Enhance your Blue Coat with Zscaler Security

Published By: ZScaler     Published Date: Nov 18, 2011
Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft, governance, grid computing, infrastructure
    
ZScaler
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.