purpose

Results 176 - 200 of 389Sort Results By: Published Date | Title | Company Name

A comprehensive framework for securing virtualized data centers

Published By: PC Mall     Published Date: Mar 21, 2011
Companies realize the benefits of moving to virtualization, however, most virtualized environments today are being deployed in an insecure manner. Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
keywords: virtualization, server virtualization, data centers, data center security, security, storage virtualization, access control, intrusion prevention, cloud computing, data center design and management, virtualization, design and facilities
    
PC Mall

Why You Need a Better Way to Manage Email Attachments

Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt

The Total Economic Impact™ of Citrix NetScaler: Cost Savings And Business Benefits

Published By: Citrix Systems     Published Date: Nov 23, 2015
The purpose of this study is to provide a framework for businesses to evaluate the potential financial impact that NetScaler can have in their organizations based on results from existing customers.
Tags : 
citrix, netscaler, business benefits, networks, applications, cost savings, networking, storage, data management, business technology, data center
    
Citrix Systems

Total Economic Impact™ Of Trend Micro Enterprise Security

Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.
Tags : 
trend micro, enterprise security, forrester, roi, total economic impactt, web security, vendor management savings, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service, internet content security, smart protection network
    
Trend Micro Inc.

CDW: Mobile Solutions

Published By: CDW     Published Date: Oct 10, 2013
Increasing staff productivity while lowering costs tied to this growing enterprise resource. A productive mobile program starts with holistic research and planning. Approaching mobility from a lifecycle standpoint will help an organization focus on optimizing each stage of the process. Having some guidance on what to expect at the different points of the mobility lifecycle is valuable for planning purposes.
Tags : 
mobile solutions, byod, mobile safety, mobile strategies, data access, secure foundation, applications, mobile app, app security, secure network
    
CDW

Top 10 Reasons Your Company Does NOT Need McAfee Vulnerability Manager

Published By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : 
mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo, mcafee epolicy orchestrator, patch tuesdays, mcafee policy auditor, mcafee risk & compliance, security, it management, data management, business technology, data center
    
McAfee

Your Competition is Just a Touch Away

Published By: Teradata     Published Date: Apr 30, 2014
In the past decade, banks have applied a vast array of strategies to attract new customers—free checking, high interest savings, low interest mortgage, cash deposits, and product give-a-ways. Many offers were bundles with credit, either in the form of a new credit line or in the form of low interest on transferred credit balances. The purpose is to attract new customers who bring new account balances. Although successful in attracting new customers, those customers usually brought small balances. It didn’t matter if each account’s balance was small. The sum of these small account balances would be a very large amount. This new amount could be leveraged into loans and hence profits. – Download our whitepaper today!
Tags : 
teradata, marketing, data driven marketing, connecting to customers, higher revenue, customer experience
    
Teradata

NPMD Solutions Support PCI DSS Compliance

Published By: Viavi Solutions     Published Date: Apr 14, 2017
NPMD solutions are typically not directly involved in the actual card cardholder transaction. However, given that many can potentially capture and transmit cardholder data they must be viewed as an integral part of a business’ PCI DSS compliance strategy, especially when investigating data breaches for the purposes of reporting or remediation. Therefore, beyond satisfying your service delivery monitoring and troubleshooting requirements, be sure to verify your NPMD solution protects cardholder data and aids your efforts in PCI DSS compliance.
Tags : 
network security, account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Viavi Solutions

802.11AC Migration Guide

Published By: Aruba Networks     Published Date: Jul 03, 2013
The purpose of this paper is to provide a level of guidance towards the migration to 802.11ac.
Tags : 
802.11ac, mobile technology, migration, 5ghz
    
Aruba Networks

Get the 2013 Gartner Magic Quadrant for General-Purpose Disk Arrays

Published By: Nimble Storage     Published Date: Oct 28, 2013
Improvements in scalability, availability, performance, and functionality of midrange storage systems have blurred the boundaries between network-attached, midrange, and high-end storage systems. This Magic Quadrant will help IT leaders understand storage vendors' strategies and market strengths.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage, high-performance storage, storage efficiency, storage management, storage for vdi, storage for virtualized servers, storage for private cloud, storage for vmware, storage for oracle, storage for microsoft, storage for exchange, storage for sharepoint, storage
    
Nimble Storage

The Total Economic Impact of VMware vCenter Site Recovery Manager: Forrester TEI Study

Published By: VMware, Inc     Published Date: Dec 05, 2013
Executive Summary: In November 2012, Vmware Commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Vmware vCenter Site Recovery Manager (SRM). The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the VMware vCenter Site Recovery Manger on their organizations. Please download the white paper to learn more.
Tags : 
vmware, roi, return on investment enterprises, vmware vcenter site recovery manager, forrester consulting. srm, networking, it management, knowledge management, enterprise applications, storage, data management, disaster recovery, business technology, data center, data loss prevention
    
VMware, Inc

The Data Center as a Strategic Asset

Published By: Compass Datacenters     Published Date: Jul 07, 2015
The purpose of this white paper is to describe the provider thinking and product elements that must be addressed to change the data center selection process from one that is tactical to one that is strategic in nature.
Tags : 
data center, it decision making, data center operators, it management, storage management, data protection, data loss prevention
    
Compass Datacenters

FlexPod Data Center with Microsoft Fast Track Private Cloud 3

Published By: Cisco     Published Date: May 15, 2015
The purpose of this document is to describe the Cisco and NetApp® FlexPod® solution, which is a validated approach for deploying Cisco and NetApp technologies as a shared cloud infrastructure.
Tags : 
cloud computing, erp, productivity, applications, efficiency, cisco, infrastructure, migration, network management, network performance
    
Cisco

CenturyLink Hyperscale Testing: Final Engagement Report

Published By: CenturyLink     Published Date: Jan 02, 2015
This report summarizes testing of CenturyLink Cloud Hyperscale compute instances in April 2014. Compute instances from Amazon Elastic Compute Cloud (EC2), Rackspace Cloud, as well as non-Hyperscale CenturyLink Cloud instances were included in testing for comparison purposes. CenturyLink engaged CloudHarmony to conduct this testing and provide independent performance analysis and comparisons of these services. This report summarizes the results of this testing.
Tags : 
centurylink, hyperscale testing, cloud, amazon elastic compute cloud, rackspace cloud, cloudharmony, it management, data center
    
CenturyLink

A Proven Security Intelligence Model for Combating Cyber Threats: A Reference Model for IT Security

Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats, mobility, business analytics, business management, business technology
    
LogRhythm

Beyond Liquidity: Optimizing Product Selection (Greenwich Associates)

Published By: iShares by BlackRock     Published Date: Jun 15, 2018
While the accumulated knowledge of a portfolio manager should not be undervalued, a move toward more systematic instrument selection could ultimately enhance fund returns. This material is provided for educational purposes only and is not intended to constitute investment advice or an investment recommendation within the meaning of federal, state, or local law. Investing involves risk, including possible loss of principal. This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. Prepared by BlackRock Investments, LLC, member FINRA. BlackRock, Inc. is not affiliated with The Economist. 530180
Tags : 
best practices, business management, return on investment, business technology
    
iShares by BlackRock

The Business Value of Data Domain Boost

Published By: EMC     Published Date: Sep 11, 2014
This paper focuses on Data Domain Boost and the many benefits it provides compared to doing traditional backups. Its purpose is to explain the technical and business reasons why DD Boost will change the way you do backups.
Tags : 
data domain boost, ddb, backups, data protection, data backup, benefits of ddb, emc, backup and recovery, storage management, storage virtualization, database security
    
EMC

The Business Value of Data Domain

Published By: EMC     Published Date: Sep 11, 2014
This paper focuses on Data Domain technology leadership and differentiation and why it matters to you. The purpose of this paper is to explore the technical and financial reasons why Data Domain systems are ideal for backup and archiving in your environment.
Tags : 
data domain technology, benefits of data domain, backup and archiving emc, backup and recovery, storage management, storage virtualization, data protection, database security
    
EMC

Analyst Case Study: US Bank Increases Top-Line Revenue with E-Signatures

Published By: E-SignLive by Silanis     Published Date: Oct 23, 2013
In this case study from Ombud Open Research, you will learn how US Bank is using electronic signature technology to streamline account openings and SMB loans. With e-signatures deployed across more than 3,000 branches, US Bank is leveraging both the Silanis on-premise e-signature solution and the Silanis cloud e-signature service for different processes. As a result, they have achieved operational efficiencies, improved customer experience and increased top-line revenue. The bank is currently e-signing 460,000 documents each week – a number that will continue to grow as US Bank’s initial implementation of electronic signatures is currently being re-purposed across the entire organization.
Tags : 
banking, account openings, financial services
    
E-SignLive by Silanis

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security

Published By: McAfee EMEA     Published Date: Nov 15, 2017
Machine learning offers the depth, creative problem-solving capabilities, and automation to help security organizations gain significant ground against attackers. It’s a powerful tool for processing massive amounts of data for the purpose of malware classification and analysis, especially for unknown threats. Through supervised learning, human researchers can continually develop new training models that expand the understanding and competency of machine learning systems.
Tags : 
analytics, security, problem solving, creative, data, researching, malware
    
McAfee EMEA

Too Many Files? NAS Is the Answer

Published By: HP     Published Date: Aug 03, 2009
The usual cure for exploding file volumes is to add more general purpose file servers. That strategy eventually leads to server sprawl, which brings with it more management complexity, stranded disk capacity, wildly differing storage utilization rates and slower file access. Network-attached storage (NAS) appliances can add file serving capacity that's more easily managed, shareable, more scalable and more efficient than a sprawl of general purpose servers. Read this online article to learn about three basic considerations that can help simplify your NAS buying decision.
Tags : 
nas, network-attached storage, servers, storage, network attached storage, storage management
    
HP

Extending the Reach of Your Business Intelligence Insight through a Single, Complementary Solution

Published By: SRC,LLC     Published Date: Jun 01, 2009
To mine raw data and extract crucial insights, business decision‐makers need fast and comprehensive access to all the information stored across their enterprise, regardless of its format or location. Furthermore, that data must be organized, analyzed and visualized in ways that permit easy interpretation of market opportunities growth, shifts and trends and the business‐process changes required to address them. Gaining a true perspective on an organization’s customer base, market area or potential expansion can be a challenging task, because companies use so many relational databases, data warehouse technologies, mapping systems and ad hoc data repositories to gather and house information for a wide variety of specialized purposes.
Tags : 
src, enterprise, enterprise applications, convergence, compared, counted, combined, reorganized, analyzed, visualized, mapped, database, gis, geographic business intelligence, data independence, etl, csv, delimited text file, mdb (both for microsoft access, esri personal geodatabase
    
SRC,LLC

Gartner Magic Quadrant for Identity and Access Management as a Service

Published By: Okta     Published Date: Feb 24, 2015
Gartner recently released the Magic Quadrant for Identity and Access Management as a Service (IDaaS) and has named Okta a leader in the space. This Magic Quadrant evaluates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases.
Tags : 
identity and access management, idaas, service providers, multiple use, vendor evaluation, identity management
    
Okta

Defining a Framework for Cloud Adoption

Published By: Aberdeen Group     Published Date: Sep 11, 2012
The purpose of this paper is to introduce the cloud computing adoption framework from IBM and make it available for use by any organization looking for a standardized frame of reference for cloud computing discussions.
Tags : 
cloud, computing, aberdeen, technology, ibm, cloud, cloud adoption, application integration, business technology, data center, cloud computing
    
Aberdeen Group

Defining a Framework for Cloud Adoption

Published By: Aberdeen-IBM     Published Date: Sep 12, 2012
The purpose of this paper is to introduce the cloud computing adoption framework from IBM and make it available for use by any organization looking for a standardized frame of reference for cloud computing discussions.
Tags : 
cloud, computing, aberdeen, technology, ibm, cloud, cloud adoption, application integration, business technology
    
Aberdeen-IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.