enterprise infrastructure

Results 401 - 425 of 520Sort Results By: Published Date | Title | Company Name

Top 3 Reasons Many Enterprises Are Moving to a Private Cloud

Published By: Rackspace     Published Date: Jan 19, 2016
For many enterprises, the last few years were about deciding whether to move to the cloud. Would it be safe? Would it really deliver the promised cost savings and business flexibility? Today, those questions have largely been answered, and the “land rush” to the cloud has begun, with over 60 percent of enterprises expected to have at least half their infrastructure on cloud-based platforms by 2018.
Tags : 
rackspace, enterprise, private cloud, data, infrastructure, enterprise applications, business technology
    
Rackspace

The Current State of Hyperconvergence

Published By: Pivot3     Published Date: Sep 27, 2017
Over the last several years, there have been some dramatic changes in enterprise computing. Not only have there been new applications introduced such as business analytics, there have also been important developments in the infrastructure components used to enable these critical application services.
Tags : 
    
Pivot3

The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164

Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi, health and human services, hhs, health care, insurance, ehrs, electronic ph, ephi, access controls, password management, account management, access control, unique user identification
    
Tripwire

Addressing Compliance Initiatives with Tripwire and the Center for Internet Security (CIS)

Published By: Tripwire     Published Date: Mar 31, 2009
Learn the basics about security benchmarks, and specifically how the security benchmarks developed by the Center for Internet Security (CIS) can help you with your compliance initiatives.
Tags : 
center for internet security, cis, tripwire, compliance, internet security, cis-certified, framework, regulation, security investment, risk, risk management, it security, cis benchmark, e-commerce security, gramm-leach-bliley act (glba), sarbanes-oxley act (sox), health insurance portability, accountability act (hipaa), windows server, sysadmin
    
Tripwire

Beyond PCI Checklists: Securing Cardholder Data with Tripwire's Enhanced File Integrity Monitoring

Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire

2016 Gartner Report: Magic Quadrant for Enterprise Mobility Management Suites

Published By: IBM MaaS360     Published Date: Jul 01, 2016
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives.
Tags : 
ibm, gartner, mobile, enterprise mobility, enterprise mobility management suites, wireless, enterprise applications
    
IBM MaaS360

Forrester Wave: Enterprise Mobile Management Q4 2015

Published By: IBM MaaS360     Published Date: Jul 01, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
ibm, forrester, enterprise mobile management, mobile, security, wireless
    
IBM MaaS360

IT Executive Guide to Security Intelligence

Published By: IBM     Published Date: Apr 04, 2016
Just as business intelligence helps enterprises make decisions that maximize opportunities and minimize business risks, security intelligence enables them to better detect threats, identify security risks and areas of noncompliance, and set priorities for remediation. One of the most compelling arguments for security intelligence is operational efficiency, or better use of people, time and infrastructure. This white paper discusses how security intelligence is an essential ingredient to comprehensive and cost-effective information security.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, cloud siem, security intelligence event management, security, knowledge management, enterprise applications, network security
    
IBM

Improve Your Mobile Application Security with IBM MobileFirst Platform

Published By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security, mobile computing, mobile data systems, mobile workers, smart phones, wireless application software, wireless phones
    
IBM

Understanding the impact and value of enterprise asset management

Published By: IBM     Published Date: May 09, 2016
Understanding the impact and value of enterprise asset management: Implementing IBM Maximo Asset Management to enable success across your smarter infrastructure
Tags : 
ibm, watson, iot, internet of things, enterprise asset management, ibm maximo asset management, knowledge management, enterprise applications, business technology
    
IBM

Top 5 Reasons to Deploy Cisco UCS

Published By: Cisco     Published Date: Jul 11, 2016
If you need to deploy and scale applications faster to increase revenue, Cisco’s integrated infrastructure solutions can help you achieve your goals—and reduce risk. Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System™ (Cisco UCS®) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
    
Cisco

Unleashing IT: Innovation for the People (Microsoft)

Published By: Cisco     Published Date: Jul 11, 2016
Operational efficiency and cost savings. Datadriven business insights. Organizational agility and market differentiation. Enterprises in every industry are pursuing such gains, but they cannot be achieved with a fragmented, siloed technology infrastructure. Technological integration doesn’t happen overnight, of course. It takes years of behind-the-scenes teamwork and engineering—backed by decades of expertise, research, and development—to have a broad and lasting impact. This special edition of Unleashing IT highlights the fruits of those labors, showcasing the unparalleled alignment of Microsoft, Cisco, and Intel technologies. In the following pages, you’ll read about the advancement and unique value of integrated solutions, spanning cloud environments, data centers, and management tools. You’ll also hear from organizations that are aking advantage of these converged technologies, including King County, Provincia Net, and Swinburne University.
Tags : 
    
Cisco

IDC: Pulsant Delivers Agile and Cost-Effective Hybrid Cloud

Published By: Cisco     Published Date: Jul 11, 2016
Pulsant is a United Kingdom-based IT infrastructure services provider focused on the small and medium-sized enterprise market. It offers public, private, and hybrid cloud services and a variety of managed, collocation, and professional services. Pulsant was one of the first cloud service providers to embrace software-defined networking (SDN) as a way to simplify its IT infrastructure, unify control of physical and virtual environments, and reduce capital expenses (capex) and operating expenses (opex). After evaluating a number of vendors, Pulsant chose Cisco's Application Centric Infrastructure (ACI) as the best SDN solution for delivering its hybrid cloud services.
Tags : 
    
Cisco

The Business Value of a Security Monitoring and Analytics Platform

Published By: IBM     Published Date: Jul 28, 2017
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology/infrastructure: To identify and assess security-related risks, and manage them to an acceptable level To achieve, sustain, and demonstrate compliance with policies and regulatory requirements To improve the efficiency and cost-effectiveness of ongoing operations, e.g., to provide greater flexibility and scale at lower total annual cost For several years now, Aberdeen Group has referred to this trifecta of strategic objectives as the quest for enterprise computing infrastructure to be secure, compliant, and well-managed.
Tags : 
information technology, information infrastructure, security risks, operation efficiency, operation flexibility
    
IBM

IBM Security: Combat the Latest Security Attacks with Global Threat Intelligence

Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM

Hosted Microsoft Exchange Architecture

Published By: SilverSky     Published Date: Apr 16, 2013
SilverSky operates a major hosted infrastructure dedicated to providing world-class enterprise messaging solutions. This whitepaper is an in-depth overview of our Hosted Microsoft Exchange architecture and how we implement best practices across systems management, testing, application deployment, infrastructure and security to provide increased productivity and reduced costs.
Tags : 
microsoft exchange, architecture, silversky, hosted infrastructure, enterprise messaging, best practices, application deployment, infrastructure, load balancing, network architecture, network management, application integration, application performance management, design and facilities, infrastructure management
    
SilverSky

Maximizing Your Virtual Environment for the Latest Business Initiatives

Published By: IBM     Published Date: Oct 10, 2013
Virtualization is one of the most highly demanded of all IT projects this decade because it enables enterprises to reduce capex and opex costs and at the same time increase business efficiency and agility. However, implementing, supporting, and managing virtualization can often be difficult tasks, especially as deployments increase in scale and complexity and impact more areas of the datacenter. These more complex infrastructures often require highly skilled engineers with in-depth business knowledge and systems management capabilities. Projects such as infrastructure optimization and automation initiatives for self-service provisioning are key because they enable enterprises to streamline business processes and utilize cloud strategies and mobility solutions. IDC shows how partnering with experts who can implement, optimize, support, and manage virtualized environments may be the right course of action. By utilizing partners, enterprises will be able to avoid some of the potential pit
Tags : 
virtual environment, business initiatives, maximize initiatives, datacenter, complex infrastructure, business efficiency, business agility, deployments, automation initiatives, cloud strategies, mobility solutions, infrastructure, business management, server virtualization, productivity, cloud computing
    
IBM

Putting mobile first: best practices of mobile technology leaders - Findings from the IBM Global IT

Published By: IBM     Published Date: Oct 10, 2013
With 2.5 billion employee-owned mobile devices in the workplace today, enterprises are struggling to capture the business benefits while bracing their IT infrastructure against data breaches and a deluge of mobile traffic. A new study reveals that the most mobile-savvy organizations are employing specific best practices, including mobile planning, integration, optimization and management to achieve mobile infrastructure maturity.
Tags : 
mobiles, mobile technology, technology leaders, ibm, global it, it leaders, mobility, wireless, business benefits, mobile traffic, gaining traffic, employing practices, mobile infrastructure, infrastructure maturity, mobile devices, data breach, enterprises, it management, data management, ebusiness
    
IBM

The Total Economic Impact Of IBM Managed Mobility for BYOD

Published By: IBM     Published Date: Oct 10, 2013
As your employees bring their own smartphones and tablets to the workplace, you need to create a flexible mobile environment that allows personally owned and corporate-issued devices to co-exist. IBM Mobile Enterprise Services for managed mobility is designed to help reduce the complexity that comes with multiple mobile platforms. IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program. In this report, you’ll learn how these companies: Increased employee productivity and satisfaction; expanded revenues from improved sales mobility, and decreased replacement, mobility infrastructure and support costs.
Tags : 
managed mobility, byod, michelle evangelista, bring your own device, mobile, flexible, mobile environment, ibm mobile enterprise services, mobile enterprise, managed mobility, mobile platforms, roi, employee productivity, sales mobility, mobility infrastructure, mobile computing, return on investment, telecom, research
    
IBM

Top 10 Reasons to Switch to Cisco UCS when Migrating from Windows 2003

Published By: Cisco     Published Date: Sep 16, 2015
Foremost, you’ll learn the top-10 reasons why the Cisco Unified Computing System™ (Cisco UCS®) is the most effective platform for your Windows Server 2003 migration. You’ll understand how Cisco UCS can vastly improve the performance of your Windows Server 2003 applications while simultaneously providing improved availability and reliability for your business-critical workloads.
Tags : 
enterprise, policy-based, infrastructure, cloud, visibility, scalability, convergence, network management, network performance, network performance management, server hardware, servers
    
Cisco

Forrester: TEI of Cisco Data Virtualization

Published By: Cisco     Published Date: Sep 16, 2015
Cost Savings And Business Benefits Enabled By Cisco’s Data Virtualization Solution
Tags : 
enterprise, policy-based, infrastructure, cloud, visibility, scalability, network management, network performance, servers, data center design and management
    
Cisco

ESG: Microsoft SQL Server on Cisco UCS Feb 2015

Published By: Cisco     Published Date: Sep 16, 2015
We’re experiencing a disruptive period of data transformation—and managing today’s database infrastructures during this disruptive period is not only critically important, but also more challenging than ever. An historic growth in data and cutting-edge technology trends, like the Internet of Everything, is causing an explosion in connections and data creation that is reshaping everything we do.
Tags : 
enterprise, policy-based, infrastructure, cloud, visibility, scalability, network architecture, network management, server hardware, servers, data center design and management
    
Cisco

Ovum: Connected Analytics for the Enterprise

Published By: Cisco     Published Date: Sep 16, 2015
Increasingly, clues to what is happening with critical enterprise business processes will be found in data supplied by underlying infrastructure; indeed, the network can tell a story of how quickly and reliably customers are being served, operations are being run, or fraud or security threats are being repelled.
Tags : 
unified computing system, virtualization, networking, storage, enterprise resource planning, enterprise software
    
Cisco

Cisco CloudCenter Solution Use Case: Hybrid IT as a Service

Published By: Cisco     Published Date: Dec 21, 2016
Enterprises are using applications to gain competitive advantage. Success in this technology-based environment requires agility and flexibility. And if IT wants to be the primary technology solution partner for the business, the IT staff needs processes and tools in place to deliver solutions at a much faster pace. As digital services propel more and more business processes, cloud technology is proving to be a crucial addition to the IT services portfolio. It is far more scalable, and in many cases more cost effective, than its predecessors. Cloud infrastructure as a service (IaaS) and softwaredefined data center technologies—virtualized computing, networking, and storage—have helped IT address the “fast IT” challenge.
Tags : 
    
Cisco

Pulsant Delivers Agile and Cost-Effective Hybrid Cloud Services with Cisco ACI

Published By: Cisco     Published Date: Dec 21, 2016
Pulsant is a United Kingdom-based IT infrastructure services provider focused on the small and medium-sized enterprise market. It offers public, private, and hybrid cloud services and a variety of managed, collocation, and professional services. Pulsant was one of the first cloud service providers to embrace software-defined networking (SDN) as a way to simplify its IT infrastructure, unify control of physical and virtual environments, and reduce capital expenses (capex) and operating expenses (opex). After evaluating a number of vendors, Pulsant chose Cisco's Application Centric Infrastructure (ACI) as the best SDN solution for delivering its hybrid cloud services.
Tags : 
    
Cisco
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.