next generation intel

Results 1 - 25 of 35Sort Results By: Published Date | Title | Company Name

Why Server Hardware Matters: Recent Survey Evaluates Server Adoption and Market Misperceptions

Published By: Dell EMC     Published Date: Aug 01, 2019
Software might run the world, but software still runs on hardware. It’s a misperception that hardware has little value anymore. Every application, every workload, every data set runs on physical servers. Read “Hardware Does Matter: Global Server Brands are Perceived as Superior for Driving Digital Business,” a Frost & Sullivan report of 500 IT decision makers, on the value of global server brands vs. commodity servers. Look beyond commodity status to discover: • Key server purchase criteria • How top brands directly compare • How to choose based on workload Server brands very significantly, and a commodity brand may not provide the outcomes you need, especially for new and next-generation applications. Download this analyst report from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC

Cisco NGFW Stands Above the Competition

Published By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : 
security, enterprise network, firewall, cisco, gartner, magic quadrant
    
Cisco

Embrace no- compromise, next generation enterprise client PCs

Published By: Intel Corp.     Published Date: May 15, 2018
Organizations today are undertaking tremendous digital transformations. They are adopting new technologies to identify new marketplace opportunities, enhance the customer experience, increase internal efficiencies and more. Meet end- user expectations and enterprise IT requirements using PCs equipped with next- generation Intel Core vPro processors.
Tags : 
    
Intel Corp.

Reliability Analysis of the Juniper Networks SRX5000 Line of Services Gateways

Published By: Juniper Networks     Published Date: Oct 20, 2015
The SRX Series features a carrier-grade next-generation firewall with layered security services such as application security, unified threat management (UTM), integrated IPS, and advanced integrated threat intelligence to guard against cyber threats and malware.
Tags : 
juniper, network, srx, gateway, reliability analysis, firewall, threat management, networking
    
Juniper Networks

When your business relies on the cloud, you need an AI-enabled cloud platform

Published By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
    
IBM

Counterpoint Research Paper

Published By: HERE Technologies     Published Date: Sep 27, 2018
Location has become paramount to building new apps, services, experiences and business models. If data is the new oil, then location is the crude oil. This is why most of the top location platform players have been developing technologies to power next-generation autonomous mobility systems. And the “richness” of location data and real-time intelligence are becoming strong monetization opportunities. The 2018 Counterpoint Research Location Ecosystems Update compared 16 location platform vendors, including Google, TomTom and Mapbox. Learn why the HERE Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
    
HERE Technologies

IBM i2 Enterprise Insight Analysis for Cyber Intelligence

Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM

5G Driving Device to Cloud Innovations

Published By: Intel     Published Date: Nov 29, 2016
Just after the turn of the decade researchers are predicting there will be somewhere north of 24 million subscriptions to next generation 5G networking services. Today most of those services are little more than pilot projects. But thanks to emerging network function virtualization (NFV) software running on Mobile Edge Computing (MEC) platforms enabled by Intel most of those 5G services should be in production before the end of the decade. Come learn how MEC platforms are about to transform every corner of the networking world to not only drive the creation of a vast array of new IT services, but also make networks more agile and responsive than anyone ever thought possible.
Tags : 
    
Intel

The Data-Driven Approach to Sales Performance Management

Published By: Beqom     Published Date: Jun 14, 2019
New Techniques That Will Drive Revenue in 2019 If you’re ready to move beyond simple calculations and realize the vast potential of data driven selling, you’re ready to explore the next generation of SPM platforms. Download the report to learn how the modern technologies like Artificial Intelligence and Machine Learning, can give your sales reps a roadmap to better performance and give sales management insights that will enable them to achieve more profitable sales.
Tags : 
    
Beqom

The Next Evolution of Chatbots: How to Ensure a Bold Bot Future

Published By: LogMeIn     Published Date: Feb 27, 2018
When Facebook released their bot feature, M, the virtual assistant living inside their Messenger platform, it was billed as the next generation of how people connect and interact with the internet. Since then, over 18,000 companies have created their own branded chatbots with the help of Facebook’s platform. Never ones to miss out on a trend, Microsoft, Google and Apple have all been hard at work developing their own integrated chatbot features. Brands of all shapes and sizes, from American Express to 1800-Flowers to Domino’s Pizza, all have their own chatbots, proving the versatility of the concept. As Microsoft CEO Satya Nadella said at the 2016 Build conference, “As an industry, we are on the cusp of a new frontier that pairs the power of natural human language with advanced machine intelligence.”
Tags : 
    
LogMeIn

Exija más. Saque el mayor partido de la migración a los Firewall de Próxima Generación

Published By: McAfee     Published Date: May 19, 2014
A medida que la tecnología de firewall de próxima generación (NGFW - next-generation firewall) se convierte en más convencional, es el momento de revisar las capacidades y funciones avanzadas que separan a los líderes de los rezagados. En su forma más básica, el consenso de una definición de NGFW incluiría estas capacidades: funciones estándares de firewall como la inspección de estado y la traducción de direcciones de red, prevención de intrusiones integrada, control de aplicaciones y un cierto nivel de inteligencia e integración con bases de datos de vulnerabilidad y reputación.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusos, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, seguridad, gestión de ti
    
McAfee

Exija mais e obtenha o máximo de benefício da migração para um firewall de próxima geração

Published By: McAfee     Published Date: Aug 15, 2014
À medida que a tecnologia de firewall de próxima geração (NGFW, next-generation firewall) se populariza, é necessário analisar as funções e os recursos avançados que separam os “líderes” dos “atrasados”. Nos termos mais básicos, o consenso sobre a definição do NGFW incluiria as seguintes capacidades: recursos de firewall padrão como conversão de endereços de rede e inspeção com monitoramento de estado, prevenção de intrusões integrada, reconhecimento de aplicativos e algum nível de inteligência e integração com bancos de dados de vulnerabilidades e reputações.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, segurança, gerenciamento de ti
    
McAfee

Securing Enterprise Hybrid Clouds (solution brief)

Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks

SC Mag SIEM and UTM Group Test 2016

Published By: LogRhythm     Published Date: Aug 08, 2016
It feels as if these folks have been around forever. They started life as a SIEM with a heavy emphasis on log management. Today they are all that plus a solid suite of next-generation attributes. They have many of the attributes of next-gen SIEMs: artificial intelligence, sophisticated log correlation, sophisticated pattern recognition and behavioral analysis. Their strength is, as it always has been, log management. But “log management” has taken on an entirely new dimension with this product. As is absolutely necessary today, it has the intelligence to analyze, correlate and make sense of huge amounts of data.
Tags : 
security, technology, best practices, information technology, business intelligence, business analytics, business management, business technology
    
LogRhythm

Smart, rugged and adaptable—the first industrial thermal printers built for Industry 4.0.

Published By: Zebra Technologies     Published Date: Mar 07, 2018
To keep your operations running smoothly, you need industrial printers that are ready for today, ready for tomorrow, ready for anything. Zebra’s new ZT600 printers deliver next-generation power, intelligence and performance, in virtually any industrial environment. Building on the legacy of the legendary Xi™ Series, the ZT610™ and ZT620™ are built for best-in-class integration, deployment, management and maintenance: • Link-OS® remote management and cloud capabilities give you complete visibility—anywhere, anytime. • Secure cloud connections with advanced diagnostics let you scale up or down quickly and easily. • Micro-consistent printing delivers high-quality labels as small as 3mm. • Field-installable upgrades and flexible configuration options future-proof your set-up. Rugged environments? Demanding applications? Unpredictable challenges? Keep your supply chains working at full tilt with full visibility, thanks to the brawn, brains and adaptability of Zebra’s new ZT600 printers.
Tags : 
industrial printer, supply chain operations, plant floor, warehouse inventory, loading docks, printer durability, printer management, rugged environments
    
Zebra Technologies

Latest Intel Technologies Power New Performance Levels On VMWare VSAB

Published By: VMWare     Published Date: May 08, 2018
Intel Xeon Scalable processors together with Optane and 3D NAND enable increased VM density, better performance and efficiency. Working with Intel and VMware, Evaluator Group tested several next generation Hyperconverged configurations based on VMware vSAN and Intel technologies, including a new class of storage media known as OptaneTM for extreme performance levels.
Tags : 
    
VMWare

High-end processors deliver high-end value

Published By: IBM     Published Date: May 04, 2009
Even with increased start-up costs, higher-end processors can offer a lower TCO thanks to better performance. This white paper shows detailed comparisons between higher- and lower-end servers with surprising results—including a 42% lower TCO and 87% faster performance for the higher-end processor.
Tags : 
ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x
    
IBM

Public Safety: Fighting Fraud with “Big Data” Visibility and Intelligence

Published By: IBM     Published Date: Dec 17, 2012
This seminar will show you how next-generation solutions are solving the "big data" challenge, and are providing enterprises with the visibility and analysis they need to move from post-incident forensics to pro-active and fraud intelligence.
Tags : 
ibm, big data, government, data management, visibility, business intelligence, it management, business technology
    
IBM

How Traditional Firewalls Fail Today's Network

Published By: Dell SonicWALL     Published Date: Nov 28, 2012
Why your current firewall may be jeopardizing your security
Tags : 
firewall security, dell, dell sonicwall, sonicwall, security intelligence, nss svm, next generation firewall, network control
    
Dell SonicWALL

IT Security Trends in 2013

Published By: Dell SonicWALL     Published Date: Nov 28, 2012
Dell™ SonicWALL™ thought leaders identify top IT security drivers for the year ahead.
Tags : 
firewall security, dell, dell sonicwall, sonicwall, security intelligence, nss svm, next generation firewall, network control
    
Dell SonicWALL

New Set of Network Security Challenges

Published By: Dell SonicWALL     Published Date: Nov 28, 2012
A new IDG survey reveals optimism about the ability of next- generation firewalls to help IT balance productivity and security.
Tags : 
firewall security, security intelligence, nss svm, next generation firewall, network control, it security, security threats, network management
    
Dell SonicWALL

Quantifying the Impact of Network Based Attacks

Published By: Dell SonicWALL     Published Date: Nov 28, 2012
The Impact of Attacks on Your Bottom Line
Tags : 
firewall security, dell, dell sonicwall, sonicwall, security intelligence, nss svm, next generation firewall, network control
    
Dell SonicWALL

Strategic BPM in the Cloud

Published By: IBM     Published Date: Apr 15, 2015
Optimize your business processes in the cloud with a next generation BPM strategy — an intelligent Business Platform (iBP) that implements an on demand, “service as you need it” model. Take advantage of Infrastructure as a Service (IaaS) for pure technology - processing, storage, networks with payment based on usage. Develop and manage business processes using the BPM Platform as a Service (BPMaaS), providing the BPMS tools supported by cloud services. Work with live business processes used by customers, suppliers, employees and trading partners, using Business Processes as a Service.
Tags : 
ibm, optimization, cloud computing, iaas, business platform, data storage, business intelligence, system management software
    
IBM

Providing a Frontline Defense Against Fileless Malware

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance

IPAM Intelligence: All Roads Lead to Proteus

Published By: BlueCat     Published Date: Jul 09, 2008
A number of factors are fueling the demand for a new, intelligent approach to IP Address Management (IPAM). This document describes these factors while highlighting deficiencies in the legacy IPAM solutions and manual management techniques commonly used today. It also introduces the 'Five Pillars of IPAM Intelligence', BlueCat's framework for articulating its revolutionary, holistic approach to IPAM, and the foundation for the design of Proteus, BlueCat's next generation, intelligent IPAM platform.
Tags : 
ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat
    
BlueCat
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.