rios

Results 201 - 225 of 260Sort Results By: Published Date | Title | Company Name

Dedupe 2.0: What HP has in Store(Once)

Published By: Intel Corp.     Published Date: Aug 08, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. In these scenarios, the awareness of what data is already in the deduplicated storage and the discernment to send new data or not is performed within the production server instead of the backup server or deduplicated storage. Hence, network savings begin at the production server and backups are significantly faster since only changed data is transmitted from the production server to the storage solution.
Tags : 
dedupe, 2.0, store, once, enterprise, strategy, group, client
    
Intel Corp.

Making the Business Case for Threat Intelligence

Published By: Cyveillance     Published Date: Oct 20, 2015
In this white paper, we examine what we consider to be three necessary steps when making a business case for threat intelligence for your organization. Companies must define what they need and why they need it, align security needs and business objectives, and finally, develop an effective plan. We then offer two example scenarios of how businesses can put these steps together and created a solid justification for threat intelligence.
Tags : 
cyveillance, threat intelligence, security, security professionals, it management, it security
    
Cyveillance

Running at the speed of business

Published By: IBM     Published Date: Apr 16, 2014
IBM DB2 offers multi-platform flexibility and optimized capabilities for a variety of workloads. This e-book highlights some common scenarios where DB2 helps businesses derive unprecedented value from expanding data stores—affordably and reliably.
Tags : 
ibm, ibm db2, platform, flexibility, workload, data stores, agile, infrastructure
    
IBM

ECM and the Cloud: My Documents or Our Documents?

Published By: IBM     Published Date: Feb 24, 2015
Read this report from AIIM to discover what issues on-premise ECM users are facing, how external collaboration support is managed, what cloud and mobile functionalities users are requesting, and what alternative scenarios are being considered.
Tags : 
ibm, ecm, ecm users, mobile funtionalities, cloud functionalities, it management, knowledge management, enterprise applications
    
IBM

Which DevOps Middleware scenario do you use?

Published By: IBM     Published Date: Jan 21, 2016
Join us on this TechByte session, where we will provide an overview of the most common DevOps scenarios we come across, as well as highlight characteristics and benefits of each of these lifecycle patterns.
Tags : 
ibm, devops, middleware, lifecycle patterns, it management, enterprise applications, business technology
    
IBM

Safeguard Sensitive Data Against Insider Threats and External Attacks: Top 5 scenarios

Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data, security, dbms, data management
    
IBM

Broker Software and Cloud Services with IBM Cloud Brokerage

Published By: IBM     Published Date: Dec 07, 2016
This IBM Redguide™ publication introduces Cloud Brokerage and highlights the business value of the solution. It provides a high-level architecture, identifies key components of the architecture, and discusses the hybrid cloud implementation framework, which includes other IBM product offerings. The guide describes example scenarios that use Cloud Brokerage to resolve common business problems.
Tags : 
ibm, cloud, broker, ibm cloud brokerage, broker software, enterprise applications, business technology
    
IBM

From Business Insight To Business Action

Published By: IBM     Published Date: Apr 03, 2017
Businesses today certainly do not suffer from a lack of data. Every day, they capture and consume massive amounts of information that they use to make strategic and tactical decisions. Yet organizations often lack two critical capabilities when it comes to making the right decisions for the business: the ability to make accurate predictions about the future, and to then use those predicted insights in conjunction with organizational goals to identify the best possible actions they should take. The combination of predictive analytics and decision optimization provides organizations with the ability to turn insight into action. Predictive analytics offers insights into likely scenarios by analyzing trends, patterns and relationships in data. Decision optimization prescribes best-action recommendations given an organization’s business goals and business dynamics, taking into account any tradeoffs or consequences associated with those actions.
Tags : 
predictive analytics, analytics, data analytics, financial marketing, market analytics, data resources, data optimization
    
IBM

An Engaging Employee Experience

Published By: Cornerstone OnDemand     Published Date: Feb 07, 2017
Are your employees truly connected to—and engaged with—your business? In a perfect world, every employee is committed to your organization’s goals, is ready to go above and beyond in daily activities, and actively collaborates with other team members. Yet when it comes to employee engagement, there’s a big gap between perfect world scenarios—and the reality.
Tags : 
    
Cornerstone OnDemand

Design Guide: Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Switches

Published By: Cisco     Published Date: Apr 10, 2015
The new Cisco Nexus® 9000 Series Switches provide features optimized specifically for the data center: high 10 and 40-Gbps port densities, reliability, performance, scalability, programmability, and ease of management. With exceptional performance and a comprehensive feature set, the Cisco Nexus 9000 Series offers versatile platforms that can be deployed in multiple scenarios, such as layered access-aggregation-core designs, leaf-and-spine architecture, and compact aggregation solutions.
Tags : 
cisco, data center, switches, optimization, scalability, storage, applications, enterprise support
    
Cisco

Unlock the Key to Repel Ransomware

Published By: Kaspersky     Published Date: Jun 15, 2015
Download Kaspersky Lab’s Unlock the Key to Repel Ransomware to learn common ransomware scenarios and delivery mechanisms.
Tags : 
kaspersky, ransomware, cybercrime, cyberattack, hackers, data leakage, spam, malware
    
Kaspersky

Symantec NetBackup 7.6 Benchmark Comparison: Data Protection In A Large Scale Environment (Part 1)

Published By: Symantec     Published Date: Oct 20, 2014
In this report, we'll present the results of a 3rd party benchmark test that looks into how a few of the most respected solutions out there fared across five very real-world test scenarios to determine who really is the King of Scale. Read the benchmark report to learn more.
Tags : 
symantec, data protection, backup and recovery, disaster recovery, data center, network security, email security
    
Symantec

Office 365 Enterprise Guided Tour

Published By: Microsoft Office 365     Published Date: Apr 05, 2016
Take a guided tour of the new Office 365. It’s a quick and easy way to test drive new enterprise capabilities, including advanced collaboration, analytics, and security features. Step through common enterprise scenarios to see how Office 365 can support your business needs See the latest in-product experience with the most up-to-date versions of the Office applications you use every day as well as the new advanced features Explore the top features and advanced capabilities available for email and calendar management, collaborative meetings, analytics, and security
Tags : 
    
Microsoft Office 365

Office 365 Enterprise Guided Tour

Published By: Microsoft Office 365     Published Date: Apr 14, 2016
Take a guided tour of the new Office 365. It’s a quick and easy way to test drive new enterprise capabilities, including advanced collaboration, analytics, and security features. Step through common enterprise scenarios to see how Office 365 can support your business needs See the latest in-product experience with the most up-to-date versions of the Office applications you use every day as well as the new advanced features Explore the top features and advanced capabilities available for email and calendar management, collaborative meetings, analytics, and security
Tags : 
    
Microsoft Office 365

ECM and the Cloud: My Documents or Our Documents?

Published By: IBM     Published Date: Apr 06, 2015
Read this report from AIIM to discover what issues on-premise ECM users are facing, how external collaboration support is managed, what cloud and mobile functionalities users are requesting, and what alternative scenarios are being considered.
Tags : 
ecm, ibm, external collaboration support, cloud, mobile, security, software development, it management
    
IBM

The Real Cost of 802.11n for the Enterprise

Published By: Ruckus Wireless     Published Date: Sep 28, 2009
In this free white paper, discover the hidden costs of out-of-the-box Wi-Fi. Fluctuating connections can potentially cost thousands per day! Now get cost outlays for 5 vendors in 2 different scenarios; learn which 10 component(s) may avoid catastrophe; and find out when to prioritize coverage over capacity. If your business is riding on Wi-Fi, it pays to play it safe. Learn how-download your copy of this free white paper now.
Tags : 
ruckus, access points, wifi, wi-fi, wlan, aps, networking, wireless
    
Ruckus Wireless

Stress Testing: A View from the Trenches

Published By: SAS     Published Date: Feb 09, 2016
Since the global financial crisis of 2008, stress tests have taken on growing importance and prominence in financial institution supervision and regulation. These tests, designed to measure an institution’s ability to maintain capital buffers and withstand extreme economic shocks, were imposed initially, and primarily, on the biggest multinational firms – those designated global significantly important banks (G-SIBs) or financial institutions (G-SIFIs). However, the circle for supervisory stress testing has widened to include a growing number of banks as defined by domestic jurisdictions – in the United States, for example, down to banks with $10 billion in assets under the Dodd-Frank Act Stress Test (DFAST) rule. What’s more, stress tests and their underlying scenarios can be of considerable value as a strategic management tool to a financial services company of virtually any type or size.
Tags : 
sas, white paper, stress testing, supervisory stress testing, security, it management, knowledge management, enterprise applications
    
SAS

Active Directory Recovery: What it Is, What it Isn't

Published By: ScriptLogic     Published Date: Mar 30, 2012
In this whitepaper, we will walk through a couple of recovery scenarios and how you can accomplish this using native tools and how it could be accomplished using Active Administrator.
Tags : 
active directory, active directory recovery, auditing, native tools, centralized, data, secure, database
    
ScriptLogic

Info-tech Vendor Landscape: Virtual Backup Software

Published By: Symantec     Published Date: Nov 15, 2013
Learn how to determine which virtual backup products are most appropriate for your particular use-cases and scenarios and evaluate whether the total cost of ownership fits your budget.
Tags : 
syamntec, virtual backup software, evaluation report, info-tech research group, backup and recovery, security
    
Symantec

Top 10 Professional Services Automation Software Vendors Revealed

Published By: Business Software     Published Date: May 28, 2013
Professional Services Automation Software: What’s the Value for Your Business? Why Professional Services Automation Software? Your service business is highly competitive,regulated, and fast. Your project teams operate in multiple time zones and currencies. You have to deal with complex revenue recognition and cost accounting rules while at the same time meeting lofty utilization targets. You need dependable utilization and demand forecasts so you can staff and train your teams accordingly. At the same time, you have to deal with multiple billing scenarios since your projects range from fixed bid, milestone driven, or time and material. Not to mention keeping a good handle on your resource pool, both full time staff, part timers, and your consultants, the skills they have acquired, their experience, general interests and preferences, and availability.
Tags : 
professional services, psa, top 10 psa vendors, business software.com, project management
    
Business Software

Virtualization Security: Know Your Options

Published By: Kaspersky     Published Date: May 11, 2016
This whitepaper describes the different virtualization security solution options—conventional agent-based; agentless; and Light Agent— as well as possible scenarios for aligning the right security approach to your organization’s virtual environment.
Tags : 
kaspersky, virtualization security, security management, light agent, server virtualization, data protection, virtualization
    
Kaspersky

Riverbed Optimization System (RiOS): A Technical Overview

Published By: Riverbed     Published Date: Aug 22, 2014
The Riverbed Optimization System (RiOS™) is the software that powers Riverbed’s unique award-winning line of Steelhead™ application acceleration appliances and Steelhead Mobile client software. RiOS is based on patented technologies that solve a range of problems affecting wide area networks (WANs) and application performance.
Tags : 
optimization, rios, technical, software, application, acceleration, technologies, solve problems
    
Riverbed

An Incident Response Playbook: From Monitoring to Operations

Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

Riverbed Optimization System (RiOS) 8.5.1: A Technical Overview

Published By: Riverbed     Published Date: Aug 19, 2014
Riverbed Optimization System (RiOS™) is the software that powers Riverbed’s unique award-winning line of Steelhead™ application acceleration appliances and Steelhead Mobile client software.
Tags : 
optimization, wan bandwidth, high-latency, traffic, wan, wide area networks
    
Riverbed

Radicati Enterprise Mobility Management Magic Quadrant 2016

Published By: VMware     Published Date: Feb 24, 2017
This Radicati Market Quadrant provides a competitive view of key players in the Enterprise Mobility Management market. Vendors are positioned in the quadrant according to two criteria, installed base market share and functionality. Analyzing 14 features such as deployment scenarios and device level analytics, Radicati gave VMware AirWatch® a functionality score of nine out of 10. Additionally, Radicati ranked the AirWatch market share as No. 1, positioning AirWatch as the leader furthest to the top right corner of the quadrant.
Tags : 
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.