managed service

Results 101 - 125 of 343Sort Results By: Published Date | Title | Company Name

Enterprise Mobile & Apple: Taking Care of Business

Published By: Enterprise Mobile     Published Date: Dec 04, 2014
While the consumer benefits of Apple devices are well known, less attention is paid to their role in an enterprise environment. It’s time to start paying attention. Apple offers a number of features built for business and as the first company approved for mobile deployments by the Apple Consultants Network, Enterprise Mobile has unique insight into these features.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile deployment
    
Enterprise Mobile

Beyond MDM: A Multidimensional Mobility Strategy

Published By: Enterprise Mobile     Published Date: Dec 11, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile

Implementing a cost-effective, high quality PKI - Why you should outsource your PKI

Published By: Entrust Datacard     Published Date: Nov 10, 2009
This white paper examines the elements that comprise a high quality PKI and the advantages of outsourcing to Entrust Managed Services PKI.
Tags : 
pki, digital certificates, hosted certificates, managed services pki, managed certificates, authentication, digital signature, entrust
    
Entrust Datacard

Orchestrating Security in the Cloud

Published By: Evident.io     Published Date: Nov 19, 2015
Collaboration services, email, managed services, and backups and disaster recovery are the most common current use cases for cloud services, according to the results of a new SANS survey on cloud security. The 485 IT professionals who participated in the survey reported using a variety of cloud providers and service models, including software-as-aservice (SaaS) cloud offerings, along with a fairly even mix of infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) implementations. Most respondents said they are investing in both public and private clouds as needs dictate.
Tags : 
evident, cloud security, collaboration services, 485 it, disaster recovery, cloud services, saas, networking
    
Evident.io

Is the Future of Enterprise Security in Managed Services?

Published By: F5 Networks Inc     Published Date: Jan 31, 2017
In a world where IT has become increasingly complex, cyber threats are unrelenting, and the cost to mitigate is becoming overwhelming, organizations are reconsidering the DIY approach to security and embracing the idea of outsourced security services. And while there are caveats to outsourcing security services, many organizations are reaping the OpEx and CapEx benefits while freeing themselves from becoming in-house security experts - refocusing on their core business. Read the whitepaper to learn more.
Tags : 
enterprise security, managed services, security
    
F5 Networks Inc

Choosing The Right Model: A Guide To DDoS Protection

Published By: F5 Networks Inc     Published Date: Aug 16, 2018
Integrated on-premises solutions offer tight control and flexibility, but can be quickly overwhelmed by a large volumetric attack. Managed cloudbased services deliver protection from those largeattacks, but can be expensive if used for all traffic, all the time. By using a combination of on-premises security devices and a cloud-based scrubbing service to handle volumetric attacks, organizations maintain control, while spinning up cloud-protection services as needed to handle the largest volumetric floods.
Tags : 
model, ddos, protection, solutions
    
F5 Networks Inc

Accelerate Cloud App Adoption without Compromising Security

Published By: Forcepoint     Published Date: Jul 30, 2019
How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint

Accelerate Cloud App Adoption without Compromising Security

Published By: Forcepoint     Published Date: Oct 03, 2019
Accelerate Cloud App Adoption without Compromising Security How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint

Maximizing Uptime for Mission-Critical File Transfers: Availability and Scalability for Managed File

Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper provides guidance on common high-availability and scale-out deployment architectures, and discusses the factors to consider for your specific business environment. Three basic models are described for deploying an on-site managed file transfer (MFT) solution. The attributes of each option are described; each has pros and cons and offers a different balance of cost, complexity, availability, and scalability. The paper explains that, no matter how reliable each model is, any deployment can experience outages. The recommendation is to use clustering services to protect your data when the inevitable hardware, software, or network failures occur.
Tags : 
clustering, uptime, failover, mft, network failure, high volume, scale-out configuration, sla
    
Globalscape

Putting An End To Content Chaos

Published By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
Consider the volume of business content that your organization generates or receives every day: applications, forms, reports, office documents, audio, video, and even social media about your company. If it is poorly managed, not digitized, or disconnected from critical business processes, it creates chaos. This chaos impacts your ability to deliver exceptional customer service; it slows down important processes, increases security risk, and negatively impacts revenue. Conversely, controlling content chaos can significantly improve your analytics strategy by gaining insight and business value from dark or unstructured data sources. In this eBook, learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it as you grow.
Tags : 
business content, volume, cloud-based, enterprise content management, ecm
    
Group M_IBM Q1'18

Emid: A pioneer of cloud-based banking on the value of IBM Z

Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Emid is a leading provider of managed ICT solutions and a pioneer of cloudbased banking systems in Africa. Based in Pretoria, Emid began as part of a major South African retail bank, providing core banking capabilities for other financial providers, and was acquired in 2015 by EOH, the largest technology service provider in Africa. Today, Emid provides managed services including networking, infrastructure, and IT support for businesses across industry sectors, as well as offering its C4 cloud-hosted, core-banking omni-channel platform.
Tags : 
    
Group M_IBM Q418

Enterprise messaging in the cloud

Published By: Group M_IBM Q418     Published Date: Oct 26, 2018
Why is messaging so essential to your success in the emerging cloud environment? Because it provides data resilience, performance and simplicity across your IT infrastructure. This holds particularly true in systems that span multiple environments and in organizations where certain components may not always be available. Read this white paper to learn two of the most common ways organizations consume messaging in the cloud: Deploy a software messaging system into a cloud environment. Use a managed messaging service operated by a cloud provider.
Tags : 
    
Group M_IBM Q418

Master the Cloud Cliff

Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
To better understand how companies are finding the unique, hybrid cloud architectures that best meet their needs, we interviewed executives at companies that had reduced or changed their use of managed or cloud IaaS or that chose to avoid the public cloud in the first place. These companies include retail, social media, healthcare, financial services, and public sector companies. Some of these companies were born in the cloud while others transitioned from traditional IT infrastructures. Company sizes ranged from 300 employees to more than 300,000.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, iaas
    
Hewlett Packard Enterprise

Accelerate Workload Performance: A Blueprint to Storage Modernization

Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Organizations are running their business on exponentially more data, created by more users, from different devices, and through different IT services and digital processes. While some data growth is fueled by new applications, it also arrives increasingly from non-traditional IT sources, including digital media, machines, and edge devices. Edge IoT devices are generating a massive amount of data that must be managed, monitored, stored, and analyzed. Deciding where to perform each of these functions is critical to supporting new data-driven global business services and processes. This blueprint from HPE Pointnext, the Services division of HPE, is based on real-world experiences from many customers across a range of industries on how to leverage flash storage modernization.
Tags : 
    
Hewlett Packard Enterprise

Deluxe Corporation Transforms Business Model With Hitachi Managed Cloud Solutions and Hitachi UCP

Published By: Hitachi Vantara     Published Date: Mar 20, 2018
Challenge: Ensure that technology infrastructure will support business transformation, new growth and services. Solution: Implement highly automated converged infrastructure and managed cloud services from Hitachi Vantara. Outcomes: Use new capabilities to integrate acquired companies, deploy next-generation security and speed time to the market.
Tags : 
    
Hitachi Vantara

Deluxe Corporation Transforms Business Model With Hitachi Managed Cloud Solutions and Hitachi UCP

Published By: Hitachi Vantara     Published Date: Mar 21, 2018
Challenge: Ensure that technology infrastructure will support business transformation, new growth and services. Solution: Implement highly automated converged infrastructure and managed cloud services from Hitachi Vantara. Outcomes: Use new capabilities to integrate acquired companies, deploy next-generation security and speed time to the market.
Tags : 
    
Hitachi Vantara

Why a Mobility Strategy Matters

Published By: Honeywell     Published Date: Feb 18, 2016
A revolution is taking place, and it’s happening in every corporate office across the globe. Mobile devices have completely transformed the way we work, and with the increasing capabilities of the next generation of devices, the need to incorporate mobility into your strategic planning is only going to increase.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, honeywell enterprise mobility, mobility, enterprise mobility, mobile strategy, mobile management
    
Honeywell

HP 3PAR StoreServ Storage: optimized for flash

Published By: HP     Published Date: Jul 22, 2014
In this white paper, we will begin by looking at HP’s flash design strategy and how it differs from other vendors. Then we will present the architectural requirements for delivering real advantages in flash-based storage performance, efficiency, resiliency, and data mobility. We’ll also unveil the technical details of the new HP 3PAR StoreServ 7450 Storage, the only all-flash array in the industry to deliver the performance advantages of a flash-optimized architecture while delivering the Tier 1 resiliency and data services that power three of the world’s four largest managed service providers.
Tags : 
3par, storeserv, storage, data, flash, data mobility, performance, data management
    
HP

Take Control Of Your Records

Published By: HP     Published Date: Jun 09, 2014
HP Records Managed Services - An HP Information Governance Service.
Tags : 
record management, records managed services, information governance service, storage management, analytical applications, data protection
    
HP

Frost & Sullivan whitepaper “Data Center Management Services"

Published By: HPE Intel     Published Date: Mar 15, 2016
To free up staff resources to focus on strategic business initiatives, many IT leaders are considering engaging a partner to handle ongoing data center maintenance and optimization. But, too often, data center management services fall short of expectations. Standard care services may be limited in scope, and may not support the range of legacy hardware already in the data center. Conversely, complex managed or outsourced services may involve a costly, fully-customized engagement, in which costs are unpredictable, and control is wrested away from the enterprise. Finally—and perhaps most importantly—many data center management service providers seem to lack the innovative spark that will ensure continuous improvement to data center operations.
Tags : 
    
HPE Intel

IBM System Storage Products Help You Save, Grow and Innovate for the Future

Published By: IBM     Published Date: Jun 19, 2008
End-to-end storage means that your data is well-managed, protected, and available when you and your customers need it most. IBM System Storage products simplify your infrastructure with servers and storage in one, allowing you to grow, and lowering the total cost of ownership through advanced energy management. Discover the IBM System Storage family of products, services and solutions, and see how they can bring value to your bottom line.
Tags : 
ibm, express seller, storage, storage management
    
IBM

Get Protection on Demand with Managed Security Services

Published By: IBM     Published Date: Sep 18, 2008
Organizations of all sizes need security that can adapt to their ever-changing environments. IBM Managed Security Services can help you integrate security with business processes for increased flexibility, efficiency and productivity. Read this white paper to learn how IBM can put you in the driver’s seat with protection on demand.
Tags : 
ibm, ibm mmdg, managed security, productivity, security, it management, security management
    
IBM

Enterprise Master Data Management: An MDM Institute MarketPulse In-Depth Report

Published By: IBM     Published Date: Dec 30, 2008
Corporate master data is a critical asset that must be increasingly managed within and beyond the enterprise, primarily to solve business problems in compliance, customer service, sales, and marketing. Such master data may be indentified, harmonized and integrated at multiple levels of the software stack to materialize a single customer view (or supplier, product, view etc.).
Tags : 
ibm, enterprise master data management, corporate master data, data integration, enterprise applications, data management, customer relationship management, enterprise resource planning
    
IBM

Keep unwelcome activity away from your data.

Published By: IBM     Published Date: Oct 13, 2009
Stopping inappropriate data access. This turnkey solution safeguards servers - where business data is stored and accessed - with a combination of software and managed security services that automate critical areas of security oversight. By monitoring and tracking system access, the solution is effective at enforcing security policies.
Tags : 
security threats, ibm, server, express mps, security policies, intrusion prevention, server sensor, internet security systems
    
IBM

B2B Integration and Collaboration: Strategies for Building a ROI Business Case

Published By: IBM     Published Date: Sep 27, 2011
Take a look at this summary which reveals that companies who have implemented comprehensive B2B Integration programs are reaping huge benefits!
Tags : 
supply chain visibility, network intelligence, data management, b2b integration, b2b collaboration, managed services, cloud computing, social supply chain
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.