host based

Results 26 - 49 of 49Sort Results By: Published Date | Title | Company Name

Azure Cosmos DB E-book

Published By: Microsoft Azure     Published Date: Apr 11, 2018
When you extend the global reach of your enterprise, you’ll find new markets for your products and services. That means reaching more potential customers, bigger growth potential, and higher ROI. But to tap into those emerging markets, you need to provide the best, most consistent user experience. Now, it’s possible for you to build, deploy, and manage modern apps at scale with a globally-distributed database—without the hassles associated with hosting in your data center. Read the e-book Build Modern Apps with Big Data at a Global Scale and learn how Azure Cosmos DB, a globally-distributed turnkey database service, is transforming the world of modern data management. Keep access to your data available, consistent, and safe—with industry-leading, enterprise-grade security and compliance. Start developing the best app experience for your users based on five well-defined consistency models: Strong: Favors data consistency. Ideal for banks, e-commerce processing, and online booking. Boun
Tags : 
    
Microsoft Azure

How It Works: InterScan Messaging Hosted Security Advanced

Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, anti spam, anti virus, application security, policy based management
    
Trend Micro SaaS

Key Trends in the Contact Center Services Market

Published By: AT&T     Published Date: Nov 07, 2011
Contact center hosting and cloud-based solutions are fast becoming integral to enabling customer care service for enterprises.
Tags : 
contact center services, contact center, trends in contact centers, services, solutions, customers, enterprises, at&t, att, at+t, mobile devices, communication, information, exchange, cloud, mobile computing, mobile data systems, mobile workers, pda, smart phones
    
AT&T

Concentric Hosted Exchange Whitepaper

Published By: Concentric     Published Date: Mar 27, 2009
Email, calendaring, collaboration, and mobility solutions are moving from corporate data centers to service provider networks. Service providers can realize far greater economies of scale than most businesses and deliver higher levels of service to more users at a lower cost; in fact, the fewer the users, the higher cost for each. Concentric Hosted Exchange is a fast, reliable and affordable solution for email, calendaring, collaboration, and mobility based on Microsoft® Exchange Server 2007 Service Pack 1 (SP1) and Microsoft Outlook® 2007. Concentric Hosted Exchange provides all of the benefits of Microsoft Exchange and Outlook 2007 without the up-front infrastructure costs or ongoing overhead.
Tags : 
concentric, hosted exchanged, email, calendaring, collaboration, mobility, corporate data centers, service provider networks, service providers, microsoft® exchange server 2007, sp1, microsoft outlook® 2007, total cost of ownership, tco, concentric hosted exchange, cli, command line interface, lower bandwidth cost, hmc, global address list
    
Concentric

Providing a Frontline Defense Against Fileless Malware

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance

Discover and Classify Endpoints in Five Seconds or Less

Published By: ForeScout     Published Date: Mar 28, 2017
Miercom analysts review results of its tests verifying the ForeScout platform’s ability to quickly discover, classify and assess endpoints, including unmanaged BYOD and IoT devices—without agents—and apply network and host-based controls to enforce security policy and remediation.
Tags : 
discover, classify, endpoints, miercom, byod, iot
    
ForeScout

Best Practices for Oversubscription of CPU, Memory and Storage in vSphere Virtual Environments

Published By: Dell     Published Date: Aug 16, 2013
"Virtualization has changed the data center dynamic from static to fluid. While workloads used to be confined to the hardware on which they were installed, workloads today flow from host to host based on administrator-defined rules, as well as in reaction to changes in the host environment. The fluidic nature of the new data center has brought challenges to resource allocation; find out how your organization can stay ahead of the curve. Read the White Paper"
Tags : 
best practices, cpu, memory, storage, vsphere, virtual, storage management, database security, virtualization, infrastructure
    
Dell

Ovum Decision Matrix: Selecting and Identity-as-a Service (IDaaS)

Published By: IBM     Published Date: Oct 26, 2017
Identity-as-a-service (IDaaS) is the cloud alternative to maintaining identity and access management (IAM) products on-premise. Fully featured IDaaS offers authentication, access control, single sign-on (SSO), provisioning and password management, infrastructure and directory management, reporting, alerting, and monitoring services, and is hosted, managed, and delivered as a cloud-based service.
Tags : 
idaas, identity and access management, data protection, cloud based security, identity management
    
IBM

Online Marketing is Content Marketing: Part 2: Technology - The Web Content Marketing Suite

Published By: CrownPeak     Published Date: Jun 30, 2009
This is the second of a three part CrownPeak White Paper exploring Why Content Marketing Is Online Marketing. In this series we present the new idea that Web content marketing is the central and most important tenet of online marketing. Today, the function of online marketing revolves around the Web which, itself, revolves around content. So as we talk about online marketing/marketers and content marketing/marketers consider them and yourself one and the same. Learn more today!
Tags : 
crownpeak, roi, web content marketing, cms, content management system, web site development, infocenter, hosted services, open source software, project definition, rfp, request for proposal, vendor strengths, os/ databases, hardware, infrastructure, document management, portal, licensing, workflow management
    
CrownPeak

The Move to Push Button Business Recovery, The New Corporate Requirement for Enterprise Business

Published By: InMage     Published Date: Feb 18, 2009
Companies of all sizes realize that near real-time business recovery is no longer a nice-to-have – it is becoming a new corporate must have. Competition, regulations and the 24x7 nature of businesses all push for continual application and data availability under almost any circumstances.
Tags : 
inmage, service level agreements, slas, enterprise business continuity, dcig, continuous data protection, cdp, host-based, san-based, corporate recovery point objectives, rpos, enterprise applications, data management, security management, data protection, data replication, database security
    
InMage

Enterprise Strategy Group Replication Methodologies and Applications

Published By: InMage     Published Date: Feb 18, 2009
Replication has become a catchall phrase that while gaining in allure is also gaining in confusion – especially in the mid-tier where data is just as important as the high-end, but IT staffing and budgets are far more limited. IT people as well as vendors have a tendency to lump all data movement functions together as replication, regardless of the method or the reason.
Tags : 
inmage, esg, replication methodologies, replication applications, disaster recovery, recovery time objectives, rto, recovery point objectives, rpo, akamai model, remote backup consolidation, host based software, array based software, network based, hybrid methodologies, enterprise applications, data management, application integration, database development, data protection
    
InMage

Key Trends in the Contact Center Services Market

Published By: AT&T     Published Date: Nov 07, 2011
Contact center hosting and cloud-based solutions are fast becoming integral to enabling customer care service for enterprises.
Tags : 
contact center services, contact center, trends in contact centers, services, solutions, customers, enterprises, at&t, att, at+t, mobile devices, communication, information, exchange, cloud, infrastructure, network architecture, mobile computing, mobile data systems, mobile workers
    
AT&T

Hosted Microsoft Exchange Market Quadrant

Published By: SilverSky     Published Date: Mar 26, 2014
The Radicati Group, a technology market research firm, highlights its choices for Hosted Microsoft Exchange providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.
Tags : 
silversky, ibm, radicati group, technology market reserach, hosted microsoft exchange providers, hosted microsoft exchange, cloud mailbox, data center, cloud business email providers, it management, email security, microsoft exchange, information management, messaging, cloud computing
    
SilverSky

Classic Network Design Using Cisco Nexus 9000 Series Switches

Published By: Cisco     Published Date: Dec 21, 2016
The data center infrastructure is central to the overall IT architecture. It is where most business-critical applications are hosted and various types of services are provided to the business. Proper planning of the data center infrastructure design is critical, and performance, resiliency, and scalability need to be carefully considered. Another important aspect of the data center design is the flexibility to quickly deploy and support new services. Designing a flexible architecture that can support new applications in a short time frame can result in a significant competitive advantage. The basic data center network design is based on a proven layered approach that has been tested and improved over the past several years in some of the largest data center implementations in the world. The layered approach is the foundation of a data center design that seeks to improve scalability, performance, flexibility, resiliency, and maintenance.
Tags : 
    
Cisco

Virtual Patching: A Proven Cost Savings Strategy

Published By: Trend Micro     Published Date: Oct 12, 2012
This special report, commissioned by Trend Micro, reinforces the security and operational cost savings of host-based virtual patching with the Deep Security and OfficeScan products
Tags : 
infomation security, software costs, trend micro, security, application security, internet security, security management, return on investment, total cost of ownership, business technology, virtualization
    
Trend Micro

Choosing a Fax Solution Deployment Model

Published By: OpenText     Published Date: Aug 19, 2014
A lot of talk is in the marketplace about enterprise software deployment models: on-premises, cloud, hybrid, managed/hosted. The conversation is an important one for every enterprise as it considers enterprise applications. This document is designed to help you evaluate the available deployment options for enterprise fax solutions. It includes easy-to-follow tables that will allow you to build selection criteria based on your organization’s requirements and needs.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management, enterprise applications
    
OpenText

Cisco and Vocalocity Deliver Cost Savings Opportunities for Small Businesses

Published By: Vocalocity     Published Date: Aug 24, 2011
Vocalocity, a leader in hosted communications platforms, has partnered with Cisco to deliver an agile, cost-effective, technologically innovative phone solution.
Tags : 
vocalocityr⪚, cisco, hosted pbx, telephony, small businesses, cost savings opportunities, cloud-based communications platforms, functionality, hosted communications platforms, phone solution, business agility, ip telephony, business process management, voice over ip, spend management, financial management, expense management, cloud computing
    
Vocalocity

IDS Evaluation Guide

Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault

Intelligent Defense for Enterprise Assets: The Need for Host Intrusion Prevention

Published By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : 
intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips, intrusion prevention system, security strategy, security management, third brigade, firewalls, internet security, intrusion detection
    
Third Brigade

The New Threat: Attackers That Target Healthcare Organizations (And what you can do about it)

Published By: Third Brigade     Published Date: Aug 21, 2009
Healthcare organizations are being targeted by financially motivated attackers that steal and sell valuable data, including identities and computing resources. This white paper defines the new threat, and outlines three important steps that providers can take to protect their critical systems.
Tags : 
hipaa, hipaa compliance, network security, network security appliance, security management, intrusion prevention, intrusion detection, hacker detection, ips, host-based ips, third brigade, security, access control, application security, authentication, firewalls, internet security
    
Third Brigade

4 Key Qualities of Effective Host-Based Intrusion Prevention (HIP) Systems

Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips, security strategy, third brigade, security, security management, secure content management
    
Third Brigade

The Sky is the Limit for the SkyVantage Network Powered by KEMP’s High-Availability Load Balancer

Published By: KEMP Technologies     Published Date: Aug 04, 2008
SkyVantage, a provider of hosted airline reservation services, provides an industry-leading airline reservation and management system for specialized small-to-medium and start-up airlines, as well as airline charter organizations. In an industry with high operating costs and tight competition, SkyVantage was founded based on the need to deploy a web-based, lower-cost software management solution to the airline industry, without sacrificing features.
Tags : 
software management, skyvantage, load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, high availability
    
KEMP Technologies

Guide to Malware and Attack Methods

Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips, mission critical systems, system av, patch management, policy management, layered security, end user security awareness training, strong policies, audited procedures
    
Perimeter E-Security

IBM Redefining Enterprise Systems – Charles King Report

Published By: IBM     Published Date: Jan 09, 2014
Today, large organizations are being buffeted by a host of changes, many of them unexpected or unfamiliar. Business information is virtually exploding in size, kind and locale, taxing the abilities of even the most progressive enterprises to keep up. Mobile technologies and business analytics that were once exclusively used by employees with specialized needs and skills are now common across the entire workforce. As a result of all this, IT is bending under the strain of developing and delivering necessary new services while at the same time maintaining core service quality. This report will consider these issues, as well as IBM’s position in and efforts around developing next generation enterprise systems solutions, including its System z mainframes, POWER7+ processor-based Power Systems servers and System Storage offerings focused on those areas and use cases.
Tags : 
enterprise systems, system performance, power7+, power systems servers, system storage, it infrastructure, analytics solutions, business analytics, business processes, charles king, pund-it, inc., ibm, infrastructure, cloud computing, power and cooling, data center design and management, infrastructure management
    
IBM
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.