purpose

Results 176 - 200 of 402Sort Results By: Published Date | Title | Company Name

The Evolution and Value of Purpose-Built Backup Appliances

Published By: Symantec     Published Date: Nov 19, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, disaster recovery, security policies, database security, data loss prevention
    
Symantec

Transportation Network Architecture Guide

Published By: ALE     Published Date: Jan 10, 2019
The purpose of this design guide is to present the requirements and considerations relevant to the transportation vertical along with design options, best practices and configuration guidelines. While this design guide is focused on Shortest Path Bridging (SPB-M) based networks, it also addresses data networking solutions applicable for this transportation vertical. Although several modes of transport exist, this document focuses on rail (metro, heavy, light) and road transport. More specifically, this document focuses on the fixed network infrastructure underpinning the multiple systems that enable the safe and reliable operation of rail and intelligent transport systems. To find out more download this whitepaper today.
Tags : 
    
ALE

Federation Products 2008

Published By: Burton Group     Published Date: Jul 07, 2008
The identity federation market enjoys an exceptional supply of products. With well over a dozen products available to enterprise customers, most architects have more choices than time will allow for evaluation. This abundance of products is partly the result of the inherent difficulty of developing a truly multipurpose federation server. Although federation products are similar in name, each has its own personality and idiosyncrasies that make it suitable for certain environments but insufficient in others.
Tags : 
fim, federated identity management, identity federation, access control, identity management, passport, burton group, networking, password management
    
Burton Group

Entrust IdentityGuard Cloud Services Smart Credentials

Published By: Entrust Datacard     Published Date: May 15, 2014
Multipurpose Smartcards, USB Tokens & Mobile Smart Credentials
Tags : 
entrust, identityguard, smart credentials, certificate based security, security, pki software, cloud, networking, it management
    
Entrust Datacard

Entrust IdentityGuard Cloud Services SSL: Centralized Management of Digital Certificates

Published By: Entrust Datacard     Published Date: May 15, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.
Tags : 
entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud, networking, it management
    
Entrust Datacard

Entrust IdentityGuard Cloud Services Smart Credentials: Multiuse Smartcards, USB Tokens & Mobile

Published By: Entrust Datacard     Published Date: Jul 21, 2014
One of the most secure and simple-to-use methods for strong authentication is achieved via multipurpose smartcards. Unfortunately, many smartcard solutions require too many point products, are complex and place a heavy burden on IT.
Tags : 
identity guard, cloud service, smart credentials, authentication, multipurpose, technology, usb token, mobile, security
    
Entrust Datacard

Entrust IdentityGuard Cloud Services SSL: Centralized Management of Digital Certificates

Published By: Entrust Datacard     Published Date: Jul 21, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly.
Tags : 
identity guard, cloud service, ssl, management, digital certification, multiple web servers, self-service, security
    
Entrust Datacard

A comprehensive framework for securing virtualized data centers

Published By: PC Mall     Published Date: Mar 02, 2011
Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
pc mall, virtualization, server virtualization, data centers, data center security, security, disaster recovery, data protection, database security, data center design and management
    
PC Mall

HP Scanjet: All-purpose Business Scanning

Published By: PC Mall     Published Date: Mar 03, 2012
Quickly and easily turn your hardcopy documents into digital files with the HP Scanjet Professional 1000 Mobile Scanner or the HP Scanjet Professional 3000 Sheet-feed Scanner.
Tags : 
scanjet, business scanning, hardcopy, mobile scanner, convergence, infrastructure, configuration management, data replication, cloud computing, data center design and management, content management, virtualization
    
PC Mall

Worldwide Purpose-Built Backup Appliance 2011-2015 Forecast and 2010 Vendor Share

Published By: EMC Corporation     Published Date: Nov 08, 2011
This study provides the market size and initial five-year forecast for the worldwide PBBA market as part of IDC's Storage Solutions coverage.
Tags : 
back up, backup, backup appliance, forecast, purpose built, pbba, storage solutions, storage, revenue, vendors, terabytes, 2015, 2014, 2013, 2012, 2011, 2010, convergence, backup and recovery, ip storage
    
EMC Corporation

A comprehensive framework for securing virtualized data centers

Published By: PC Mall     Published Date: Mar 21, 2011
Companies realize the benefits of moving to virtualization, however, most virtualized environments today are being deployed in an insecure manner. Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
keywords: virtualization, server virtualization, data centers, data center security, security, storage virtualization, access control, intrusion prevention, cloud computing, data center design and management, virtualization, design and facilities
    
PC Mall

Why You Need a Better Way to Manage Email Attachments

Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt

The Total Economic Impact™ of Citrix NetScaler: Cost Savings And Business Benefits

Published By: Citrix Systems     Published Date: Nov 23, 2015
The purpose of this study is to provide a framework for businesses to evaluate the potential financial impact that NetScaler can have in their organizations based on results from existing customers.
Tags : 
citrix, netscaler, business benefits, networks, applications, cost savings, networking, storage, data management, business technology, data center
    
Citrix Systems

Total Economic Impact™ Of Trend Micro Enterprise Security

Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.
Tags : 
trend micro, enterprise security, forrester, roi, total economic impactt, web security, vendor management savings, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service, internet content security, smart protection network
    
Trend Micro Inc.

CDW: Mobile Solutions

Published By: CDW     Published Date: Oct 10, 2013
Increasing staff productivity while lowering costs tied to this growing enterprise resource. A productive mobile program starts with holistic research and planning. Approaching mobility from a lifecycle standpoint will help an organization focus on optimizing each stage of the process. Having some guidance on what to expect at the different points of the mobility lifecycle is valuable for planning purposes.
Tags : 
mobile solutions, byod, mobile safety, mobile strategies, data access, secure foundation, applications, mobile app, app security, secure network
    
CDW

Top 10 Reasons Your Company Does NOT Need McAfee Vulnerability Manager

Published By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : 
mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo, mcafee epolicy orchestrator, patch tuesdays, mcafee policy auditor, mcafee risk & compliance, security, it management, data management, business technology, data center
    
McAfee

Your Competition is Just a Touch Away

Published By: Teradata     Published Date: Apr 30, 2014
In the past decade, banks have applied a vast array of strategies to attract new customers—free checking, high interest savings, low interest mortgage, cash deposits, and product give-a-ways. Many offers were bundles with credit, either in the form of a new credit line or in the form of low interest on transferred credit balances. The purpose is to attract new customers who bring new account balances. Although successful in attracting new customers, those customers usually brought small balances. It didn’t matter if each account’s balance was small. The sum of these small account balances would be a very large amount. This new amount could be leveraged into loans and hence profits. – Download our whitepaper today!
Tags : 
teradata, marketing, data driven marketing, connecting to customers, higher revenue, customer experience
    
Teradata

NPMD Solutions Support PCI DSS Compliance

Published By: Viavi Solutions     Published Date: Apr 14, 2017
NPMD solutions are typically not directly involved in the actual card cardholder transaction. However, given that many can potentially capture and transmit cardholder data they must be viewed as an integral part of a business’ PCI DSS compliance strategy, especially when investigating data breaches for the purposes of reporting or remediation. Therefore, beyond satisfying your service delivery monitoring and troubleshooting requirements, be sure to verify your NPMD solution protects cardholder data and aids your efforts in PCI DSS compliance.
Tags : 
network security, account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Viavi Solutions

802.11AC Migration Guide

Published By: Aruba Networks     Published Date: Jul 03, 2013
The purpose of this paper is to provide a level of guidance towards the migration to 802.11ac.
Tags : 
802.11ac, mobile technology, migration, 5ghz
    
Aruba Networks

Get the 2013 Gartner Magic Quadrant for General-Purpose Disk Arrays

Published By: Nimble Storage     Published Date: Oct 28, 2013
Improvements in scalability, availability, performance, and functionality of midrange storage systems have blurred the boundaries between network-attached, midrange, and high-end storage systems. This Magic Quadrant will help IT leaders understand storage vendors' strategies and market strengths.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage, high-performance storage, storage efficiency, storage management, storage for vdi, storage for virtualized servers, storage for private cloud, storage for vmware, storage for oracle, storage for microsoft, storage for exchange, storage for sharepoint, storage
    
Nimble Storage

The Total Economic Impact of VMware vCenter Site Recovery Manager: Forrester TEI Study

Published By: VMware, Inc     Published Date: Dec 05, 2013
Executive Summary: In November 2012, Vmware Commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Vmware vCenter Site Recovery Manager (SRM). The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the VMware vCenter Site Recovery Manger on their organizations. Please download the white paper to learn more.
Tags : 
vmware, roi, return on investment enterprises, vmware vcenter site recovery manager, forrester consulting. srm, networking, it management, knowledge management, enterprise applications, storage, data management, disaster recovery, business technology, data center, data loss prevention
    
VMware, Inc

The Data Center as a Strategic Asset

Published By: Compass Datacenters     Published Date: Jul 07, 2015
The purpose of this white paper is to describe the provider thinking and product elements that must be addressed to change the data center selection process from one that is tactical to one that is strategic in nature.
Tags : 
data center, it decision making, data center operators, it management, storage management, data protection, data loss prevention
    
Compass Datacenters

FlexPod Data Center with Microsoft Fast Track Private Cloud 3

Published By: Cisco     Published Date: May 15, 2015
The purpose of this document is to describe the Cisco and NetApp® FlexPod® solution, which is a validated approach for deploying Cisco and NetApp technologies as a shared cloud infrastructure.
Tags : 
cloud computing, erp, productivity, applications, efficiency, cisco, infrastructure, migration, network management, network performance
    
Cisco

CenturyLink Hyperscale Testing: Final Engagement Report

Published By: CenturyLink     Published Date: Jan 02, 2015
This report summarizes testing of CenturyLink Cloud Hyperscale compute instances in April 2014. Compute instances from Amazon Elastic Compute Cloud (EC2), Rackspace Cloud, as well as non-Hyperscale CenturyLink Cloud instances were included in testing for comparison purposes. CenturyLink engaged CloudHarmony to conduct this testing and provide independent performance analysis and comparisons of these services. This report summarizes the results of this testing.
Tags : 
centurylink, hyperscale testing, cloud, amazon elastic compute cloud, rackspace cloud, cloudharmony, it management, data center
    
CenturyLink

A Proven Security Intelligence Model for Combating Cyber Threats: A Reference Model for IT Security

Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats, mobility, business analytics, business management, business technology
    
LogRhythm
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.