federated

Results 1 - 23 of 23Sort Results By: Published Date | Title | Company Name

The Future of IT in a Flat World: CMDBs, Automation, and the IT Value Chain

Published By: ASG Software Solutions     Published Date: Oct 16, 2008
Limited visibility has tethered CIOs' success in both IT and business. However, using federated CMDB technology, CIOs can view the complete IT infrastructure and the entire lifecycle of a business service.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, automation
    
ASG Software Solutions

Why StoreOnce Federated Deduplication Matters to HP—and Should to You, Too

Published By: HPE     Published Date: Feb 11, 2015
According to ESG’s 2014 IT Spending Intentions Survey, improving data backup and recovery is the most often mentioned priority for midmarket organizations for the third year in a row. It is the third most frequently cited priority by enterprises and midmarket organizations overall. Additionally, business continuity and disaster recovery (BC/DR) also appear in the top-ten priority lists of both midmarket and enterprise respondents.
Tags : 
    
HPE

Edge To Endpoint

Published By: Oracle     Published Date: Nov 30, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle

Edge To Endpoint

Published By: Oracle Dyn     Published Date: Dec 06, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle Dyn

Modern Data Warehousing on AWS

Published By: AWS     Published Date: Aug 20, 2018
A modern data warehouse is designed to support rapid data growth and interactive analytics over a variety of relational, non-relational, and streaming data types leveraging a single, easy-to-use interface. It provides a common architectural platform for leveraging new big data technologies to existing data warehouse methods, thereby enabling organizations to derive deeper business insights. Key elements of a modern data warehouse: • Data ingestion: take advantage of relational, non-relational, and streaming data sources • Federated querying: ability to run a query across heterogeneous sources of data • Data consumption: support numerous types of analysis - ad-hoc exploration, predefined reporting/dashboards, predictive and advanced analytics
Tags : 
    
AWS

Eliminating Authentication Silos and Password Fatigue with Federated Identity and Access Management

Published By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : 
security, cloud, application delivery, authentication, access control, application security, silos, password fatigue
    
F5 Networks Inc

Federation Products 2008

Published By: Burton Group     Published Date: Jul 07, 2008
The identity federation market enjoys an exceptional supply of products. With well over a dozen products available to enterprise customers, most architects have more choices than time will allow for evaluation. This abundance of products is partly the result of the inherent difficulty of developing a truly multipurpose federation server. Although federation products are similar in name, each has its own personality and idiosyncrasies that make it suitable for certain environments but insufficient in others.
Tags : 
fim, federated identity management, identity federation, access control, identity management, passport, burton group, networking
    
Burton Group

eBook: Modern Data Warehousing on AWS

Published By: AWS     Published Date: Jun 20, 2018
Data and analytics have become an indispensable part of gaining and keeping a competitive edge. But many legacy data warehouses introduce a new challenge for organizations trying to manage large data sets: only a fraction of their data is ever made available for analysis. We call this the “dark data” problem: companies know there is value in the data they collected, but their existing data warehouse is too complex, too slow, and just too expensive to use. A modern data warehouse is designed to support rapid data growth and interactive analytics over a variety of relational, non-relational, and streaming data types leveraging a single, easy-to-use interface. It provides a common architectural platform for leveraging new big data technologies to existing data warehouse methods, thereby enabling organizations to derive deeper business insights. Key elements of a modern data warehouse: • Data ingestion: take advantage of relational, non-relational, and streaming data sources • Federated q
Tags : 
    
AWS

Opportunity For An Improved Authentication Mode

Published By: VASCO     Published Date: Jul 12, 2012
Read more of this white paper to find out how federated identity management can solve the password complexity and the "token necklace" problem while keeping up with increasing security requirements.
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security
    
VASCO

5 Steps to Secure Internet SSO

Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing
    
Ping Identity

Identity Enabled Web Services: Standards-based identity for Web 2.0

Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity

Secure Internet Single Sign-On 101

Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity

HP 3PAR Online Import for EMC Storage

Published By: HP     Published Date: Jul 22, 2014
HP 3PAR StoreServ Storage arrays are rapidly being adopted into many IT data centers. With the adoption of the array comes the need to support a non-disruptive method (supported by OS) to import data from aging architectures to new HP 3PAR StoreServ arrays. There is an increasing demand to support the migration from non-HP standard storage arrays to HP 3PAR StoreServ arrays as part of the migrations. In the past, HP has supported migrations from HP 3PAR to HP 3PAR using HP 3PAR Peer Motion technology and EVA to HP 3PAR using HP 3PAR Online Import as part of the federated storage movement. HP is now announcing the ability to migrate data from EMC arrays to HP 3PAR StoreServ Storage.
Tags : 
3par, online, storage, data, array, storeserv, data management, business technology
    
HP

Strengthen Security With Intelligent Identity and Access Management

Published By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : 
user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking
    
IBM

HP Converged Storage - Business White Paper

Published By: Hewlett-Packard     Published Date: Aug 02, 2013
As the amount of information we generate grows, and as our relationship with information grows more complex, the race to innovate new products and services to help us harness information, manage it, and tap into it more easily intensifies. This paper discusses the continuing development of HP’s strategy for delivering Converged Storage that improves the ability of your business to capitalize on information. Building on the foundation provided by fusing industry-standard technologies, federated scale-out software, and converged management, HP is now extending Converged Storage into new solutions and segments with a new initiative that introduces the next evolution of this HP Converged Storage strategy and vision.
Tags : 
storage, converged storage, backup and recovery, blade servers, ip storage, network attached storage, storage area networks, storage management
    
Hewlett-Packard

HP StoreOnce:  Boldly Go Where No Deduplication Has Gone Before

Published By: HP     Published Date: Jun 05, 2014
Fast-growing data and widespread virtualization have ratcheted up data protection challenges no matter what the size of your business. This paper will describe the challenges of data protection, why deduplication is critical to meeting the challenges, how HP is achieving its vision of federated dedupe with StoreOnce – and what HP’s StoreOnce VSA announcement and achievement means to backup services providers, enterprises with remote or branch offices and small and medium businesses as well.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication, storeonce, it management
    
HP

ESG Whitepaper- Why StoreOnce Federated Deduplication Matters to HP and should to you too

Published By: HP     Published Date: Aug 08, 2014
Deduplication is not new—and HP was certainly not the first to market it. Instead, by watching how deduplication was introduced and listening to the evolving demands of customers who struggle with storage and backup issues, HP built StoreOnce as a next-generation or “Dedupe 2.0” architecture that is available now. With its formidable enterprise experience, server and storage product lines, and broad partner ecosystem, HP intends to catch up with and, in fact, surpass the status quo to bring better deduplication at a lower cost.
Tags : 
federated, storeonce, deduplication, storage, it benefits, backup systems, challenges, challenges
    
HP

Powerful Data Protection with Deduplication 2.0

Published By: HP     Published Date: Aug 11, 2014
A few years ago, two technologies emerged to dramatically improve the industry’s ability to protect data. The cost of disk drives came down, and deduplication technology was introduced. This breakthrough is sometimes referred to as Deduplication 1.0. Like any technology, you’d expect it to evolve over time. HP launched the HP StoreOnce deduplication technology roadmap in 2010 to do just that. The result? Deduplication 2.0 or what HP calls “Federated Deduplication”. This next generation deduplication addresses some of the issues inherent in existing deduplication solutions: performance, flexibility, and data management and not only that, when moving from your legacy storage backup systems, you can reduce the amount of your stored backup data by 95 percent or we’ll make up the difference with free disk capacity and support.
Tags : 
deduplication, storage, it benefits, backup systems, challenges, challenges, technologies, data management
    
HP

The Power of One: Top Reasons to Choose HP BladeSystem eBook

Published By: HP     Published Date: Aug 22, 2014
To accomplish this mission, you need an infrastructure platform that can be highly optimized for today’s and tomorrow’s virtualized workloads to provide operational simplicity that allows you to move at the speed of business. Unfortunately, a traditional infrastructure won’t get you there. A siloed environment requires too many tools and manual processes, which creates unnecessary complexity. That complexity, in turn, causes downtime, slows service delivery, and drains your IT staff productivity.
Tags : 
bladesystem, economics, platform, service, delivery, converged, automated, federated
    
HP

The Power of One: Top Reasons to Choose HP BladeSystem Brief

Published By: HP     Published Date: Aug 22, 2014
Now, more than ever, your IT managers are under enormous pressure to deliver applications and services that innovate and transform your business. You’re being asked to deliver a data center defined by lower costs, rapid time to value, and rock-solid reliability. To accomplish this mission, you need an infrastructure platform that can be highly optimized for today’s and tomorrow’s virtualized workloads to provide operational simplicity that allows you to move at the speed of business.
Tags : 
bladesystem, economics, platform, service, delivery, converged, automated, federated
    
HP

Smart Choice HP BladeSystem eBook

Published By: HP     Published Date: Aug 22, 2014
IBM has announced its intention to exit the x86 server market - leaving you with an important decision to make. How do you choose the right strategic partner for your data center? This guide will help you get started down the right path.
Tags : 
bladesystem, economics, platform, service, delivery, converged, automated, federated
    
HP

The Power of One: Top reasons to choose HP BladeSystem Infographic

Published By: HP     Published Date: Aug 22, 2014
Working together, HP BladeSystem and HP OneView help you transform business economics by accelerating service delivery. Accelerate service delivery with the Power of One—one infrastructure, one management platform—that’s converged, federated, and automated.
Tags : 
bladesystem, economics, platform, service, delivery, converged, automated, federated
    
HP

Identity Enabled Web Services: Standards-based identity for Web 2.0

Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity
Search      

Add Research

Get your company's research in the hands of targeted business professionals.