operating system

Results 276 - 300 of 341Sort Results By: Published Date | Title | Company Name

Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec Application

Published By: Symantec     Published Date: Oct 20, 2014
ApplicationHA leverages more than 12 years of development of well-known Symantec Cluster Server technology to provide an application monitoring package that runs inside a Hyper-V guest operating system, with full integration for Failover Clustering and the Heartbeat monitoring service.
Tags : 
symantec, business critical applications, virtualization, data center, hyper v, network architecture, servers, clustering, storage virtualization, server virtualization, data center design and management
    
Symantec

Endpoint Security for the Enterprise

Published By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : 
security, defense, cloud, threats, attack, symantec, enterprise, endpoint, solutions, global, intelligence, network, devices, mobile, workforce
    
Symantec

Advanced Endpoint Security for Dummies

Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec

Protect Your Applications— and Reputation—with Symantec EV Code Signing

Published By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : 
symantec, malware, applications, security, code signing, application security, security policies
    
Symantec Corporation

Exploit Kits: Cybercrime’s Growth Industry

Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, malware, viper
    
ThreatTrack Security

Systems of Insight - Moving Beyond Traditional Analytics

Published By: TIBCO Software     Published Date: Aug 13, 2018
There are so many opportunities for businesses to collect data that getting a clear picture of all of it can be an uphill battle—and leveraging it for insight can be nearly impossible. But whether you are a start-up or a multinational conglomerate, not taking advantage of the available data is a mistake you cannot risk making. According to a 2016 McKinsey & Company study, over the past three years, digital leaders have achieved revenue growth five times greater, an operating margin profit eight times greater, and a return to shareholder value two times higher than laggards. Companies today need a closed loop system that combines data, insight, and action. Download this paper to learn about the goals of a system of insight (SOI), the common set of technologies that all systems of insight need, and how an SOI can make a difference in your business.
Tags : 
    
TIBCO Software

How to Find Everything in Windows 8.1

Published By: Toshiba     Published Date: Nov 21, 2013
It's inevitable that upgrading to a new version of an operating system or application comes with a bit of a learning curve. With Windows 8.1, though--and its predecessor Windows 8--the curve is steep, and just finding simple tools and features can be a challenge.
Tags : 
toshiba, windows, windows 8, windows 81, microsoft, internet explorer, search bar, copiers, printers, mfp, computers, employees, laptop, small business networks, mobile computing, best practices, it spending, microsoft exchange, windows server, business technology
    
Toshiba

Achieving NERC Compliance Through Tripwire IT Security and Compliance Automation Solutions

Published By: Tripwire, Inc     Published Date: Mar 10, 2010
NERC enforces comprehensive reliability standards for planning and operating the collective bulk power system, including the Critical Infrastructure Protection (CIP) Cyber Security Standards.
Tags : 
tripwire, nerc compliance, it security, automation, cip, cyber security, reliability standard, log, event management, compliance, internet security, business process automation
    
Tripwire, Inc

Three Mobile Email Marketing Challenges - and What You Can Do About Them

Published By: Unica     Published Date: Mar 29, 2010
Marketers have been limited to bland options for sending communications to consumers on their mobile phones. With the introduction of Apple's iPhone and operating systems like Google's Android and Palm's Pre/Pixi, now offering similarly rich user experiences, you have the opportunity to reach your customers, anywhere, any time, on their mobile devices.
Tags : 
unica, email, emarketing, esp, email trends, social media, sms, spam, mobile email, templates
    
Unica

Six Fairy Tales of VMware and Hyper-V Backup

Published By: Unitrends     Published Date: Dec 16, 2011
Mware host level backup works well with all deduplication strategies. In this paper we explore 6 fairy tales of VMware and Hyper-V backup.
Tags : 
vmware, hyperv, hyper-v, backup, backup and recovery, deduplication, host level, host-level, strategies, host enviornments, guest-operating-systems, guest operating systems, ip storage, iscsi, network attached storage, storage area networks, storage management, storage virtualization, data deduplication, virtualization
    
Unitrends

MODERN SOFTWARE UPDATE FEATURES WITH VEEAM DATALABS

Published By: Veeam '18     Published Date: Oct 28, 2019
Support for Microsoft Windows Server 2008 R2 will be discontinued soon, and organizations need to prepare for the transition from the old system to new platforms, such as Microsoft Windows Server 2019. This article details how to work with Veeam ® DataLabs and provides information on using Veeam with Microsoft Azure. After reading this article, you will learn about the popular way to use Veeam DataLab. It will help to eliminate obsolete operating systems and to feel confident in the transition to new versions. The main topics of the article: Veeam DataLab working principles; principles of transition to the new version of Windows Server; testing updates.
Tags : 
    
Veeam '18

MODERN SOFTWARE UPDATE FEATURES WITH VEEAM DATALABS

Published By: Veeam '18     Published Date: Oct 28, 2019
Support for Microsoft Windows Server 2008 R2 will be discontinued soon, and organizations need to prepare for the transition from the old system to new platforms, such as Microsoft Windows Server 2019. This article details how to work with Veeam ® DataLabs and provides information on using Veeam with Microsoft Azure. After reading this article, you will learn about the popular way to use Veeam DataLab. It will help to eliminate obsolete operating systems and to feel confident in the transition to new versions. The main topics of the article: Veeam DataLab working principles; principles of transition to the new version of Windows Server; testing updates.
Tags : 
    
Veeam '18

Shortcut Guide to Business Security Measures Using SSL

Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
    
VeriSign Authentication Services, now a part of Symantec Corp.

The Shortcut Guide to Business Security Measures Using SSL

Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing, international computing
    
VeriSign Incorp.

Common Vulnerabilities in Business IT Systems

Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Read this white paper from VeriSign and RealTime Publisers to examine common vulnerabilities in IT systems and business practices that undermine information security.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing, wpa
    
VeriSign Incorp.

Evaluating Cloud-based Mobile Device Management

Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research, analytical applications, business intelligence, data protection, data quality
    
Virtela Communications, Inc.

OpenStack for Enterprise: The Tipping Point Cometh E-Book

Published By: VMTurbo     Published Date: Jul 08, 2015
This E-Book covers a brief history of the OpenStack cloud operating system, its releases and projects, significant enterprise adoptions, and the function and contributions VMTurbo.
Tags : 
cloud strategy, cloud operating systems, enterprise adoption, database management, business integration, web interface, application management, software licensing, application integration, application performance management, business analytics, business management, server virtualization, database development, software compliance, cloud computing, data center design and management, virtualization
    
VMTurbo

How Can VMware & CA Help Maximize Availability, Business Value & Resiliency of IT Infrastructure?

Published By: VMware     Published Date: Feb 26, 2009
VMware Virtual Infrastructure and CA Recovery Management (CA ARCserve Backup and CA Xosoft products) team up to deliver higher availability and risk-resistance for business-critical information and applications, while lowering management and operational costs and complexity.
Tags : 
vmware, it infrastructure, virtual infrastructure, ca recovery management, business critical information, business continuity, disaster recovery, high availability, operational costs, virtual infrastructure, multi-processor support, virtual machines, disk-to-disk-to-tape, multiple operating systems, value-enhancing services, security, storage, storage virtualization, return on investment
    
VMware

Migrating to Windows 7 with VMware View

Published By: VMware     Published Date: May 20, 2011
This paper sets out the issues and explores the options - while providing a clear business case for moving forward with a virtualized desktop environment.
Tags : 
vmware, windows 7, migration, windows xp, virtualized desktop environment, microsoft, operating system, virtualization, windows, windows server
    
VMware

The Virtualization Imperative For Client Operating System Migrations

Published By: VMware     Published Date: May 20, 2011
The report highlights the key considerations associated with simplifying application deployments through application virtualization and automating desktop provisioning and management through desktop virtualization.
Tags : 
vmware, desktop virtualization, operating system, migration, forrester consulting, automation, business process automation, virtualization
    
VMware

VMware View Optimization Guide for Windows 7

Published By: VMware     Published Date: Sep 12, 2011
This document provides guidelines for configuring a standard Windows 7 image to be used within a VMware View environment, providing administrators with the information necessary to create a standard image of Windows 7 leveraging the Microsoft Deployment Toolkit or by utilizing a script-based approach to optimize a traditionally installed Windows 7 virtual machine.
Tags : 
vmware, windows 7, microsoft, deployment toolkit, desktop infrastructure, scalability, optimization guide, target virtual machine, installation method, operating systems customization, network attached storage, storage area networks, storage management, windows, data quality, project management, desktop management
    
VMware

Unleash the Potential of Windows 10

Published By: VMware     Published Date: Feb 24, 2017
Windows 10 is Microsoft’s first truly mobile operating system designed to work seamlessly across the unified desktop and mobile devices’ platform. This mobile first, cloud first platform redefines how organizations treat desktop and device management by allowing IT to take full advantage of the new enterprise mobility management (EMM) capabilities. Download the infographic to learn how VMware AirWatch® provides the most comprehensive solution to get your organization Windows 10 ready.
Tags : 
    
VMware

7 End-User Computing "Musts" for the Windows 10 Workforce

Published By: VMware     Published Date: Feb 24, 2017
The workplace has changed radically, and conventional approaches to desktop management and mobile device management (MDM) are no longer adequate for the new digital workplace. Enterprise IT must quickly and dramatically change the way it manages users’ access to digital resources to deliver a consistent experience across all devices, even as operating systems and platforms relentlessly evolve. Fortunately, with the advent of Windows 10, IT now can rethink the way it aligns endpoint management with users’ new digital work styles. Read this UBM whitepaper to learn more about how these seven “musts” can help IT fully leverage Microsoft’s newest operating system to better serve the business.
Tags : 
    
VMware

Modernize Windows 10 Management and Security with Unified Endpoint Management

Published By: VMware     Published Date: Feb 24, 2017
IT organizations are largely siloed between the desktop and mobile management worlds. IT has addressed management of mobile devices with modern enterprise mobility management (EMM) solutions. However, Windows desktops have been managed separately using older PC lifecycle management (PCLM) technologies, which have fallen short of basic IT and end user expectations of today’s evolved, mobile-cloud workforce. The VMware AirWatch® Unified Endpoint Management (UEM) solution is a single, platform-independent approach for managing every device and every operating system across any organizational use case. The solution combines traditional client management requirements with modern EMM efficiencies enabling IT to deliver OS policies, patches, and apps over-the-air. Cloud-first management with instant push technologies and self-service capabilities ensure lower cost management, better security, and peak user experience regardless of the device being used to access the corporate environment.
Tags : 
    
VMware

A Definitive Guide to Windows 10 Management

Published By: VMware     Published Date: Feb 24, 2017
With Windows 10, Microsoft introduces a consolidated operating system (OS) platform that changes how organizations treat the management of End-User Computing (EUC) environments. This new way of managing Windows is more closely aligned to the enterprise mobile management (EMM) based approaches found in mobile management tools today. This whitepaper provides an overview of how Windows management evolved from a rigid and disruptive PC-centric approach to one offering a flexible and light-touch model. It will also delve into the specific management technologies that Windows 10 introduces, as well as leveraging conventional Windows management tools that are in use today.
Tags : 
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.