service providers

Results 276 - 300 of 438Sort Results By: Published Date | Title | Company Name

It’s Time To Take Global Load Balancing To The Cloud

Published By: Dyn     Published Date: Feb 06, 2015
Whether you’re serving customers, partners, or internal users through two data centers or twenty, you want all users to have the best experience. Global load balancing (GLB) is the effective management and balancing of the Internet traffic to and from your data centers and cloud service providers and has become critical to growing enterprise ecommerce revenue, serving customers and empowering employee productivity.
Tags : 
glb, internet traffic, ecommerce revenue, employee productivity, cloud-based services, it management, enterprise applications, data management
    
Dyn

Navigating Your Journey Through Managed Services

Published By: Mindtree     Published Date: Nov 01, 2016
Learn how to cut costs so you can self-fund growth initiatives. An expert Managed Services guide can help you map a smart path to streamlining processes, outsourcing services and rearchitecting systems. With a customized plan in place, your Managed Services provider can begin to optimize IT and increase efficiencies through continuous improvements. Discover how Managed Services providers: Guarantee savings every year so you can invest in growth opportunities such as digital and analytics Optimize the run-the-business side of IT to accelerate innovation Deliver continuous improvements to productivity, quality and time to market
Tags : 
mindtree, growth initiatives, managed services guide, managed services, analytics, knowledge management, enterprise applications, business technology
    
Mindtree

ESG: NetApp Multi - cloud Private Storage: Take Charge of Your Cloud Data

Published By: NetApp     Published Date: Mar 11, 2015
Seventy-five percent of enterprise organizations currently use some type of cloud service from cloud providers that offer new capabilities and economies of scale. No single cloud, however, is guaranteed to meet all your needs today and in the future. Learn about a flexible, hybrid, multicloud approach that keeps you free to choose the right cloud resources for business at hand.
Tags : 
    
NetApp

PCI DSS 3.0 Compliance: How Trend Micro Cloud and Data Center Security Solutions Can Help

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : 
security, software development, it management
    
CDW-Trend Micro

Cloud Security through Trend Micro Deep Security

Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : 
networking, security, it management
    
CDW-Trend Micro

Hybrid Cloud Myths

Published By: Equinix     Published Date: Mar 26, 2015
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-in—having only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability. The good news is that more solutions become available every day, but with a learning curve and numerous management challenges and considerations. This CITO Research paper provides advice for managers about how to c
Tags : 
hybrid cloud, computing infrastructure, enterprises, storage, application availability, it management, data center
    
Equinix

Equinix Customer Success Story: Fortune 500 Financial Services Company

Published By: Equinix     Published Date: Mar 26, 2015
A leading U.S.-based financial services firm was faced with the growing challenge of providing consistent application performance to a vast employee base and nationwide network of partners. The company turned to Equinix to help redesign its network, both to improve performance and prepare for a move to a cloud-enabled environment. Equinix worked with the firm to deploy bi-coastal Equinix Performance Hubs, extension nodes of the company’s existing network placed in strategically located Equinix International Business Exchange (IBX) data centers. A Performance Hub moves services closer to end users and provides direct access to networks and cloud providers. By deploying Performance Hubs, the customer created a high-performance services platform for its business. The result was a dramatic decrease in network latency, improvements in application performance and an enhanced user experience.
Tags : 
financial services, cloud-enabled environment, cloud providers, network latency, application performance, enhanced user experience, it management, enterprise applications
    
Equinix

Driving Customer Loyalty Through Network Service Quality

Published By: IBM     Published Date: Mar 10, 2015
This white paper reviews the finding of recent Heavy Reading research into wireless CSP attitudes to and plans for driving customer loyalty through control of network service quality
Tags : 
ibm, customer data, customer service, customer loyalty, communications, service providers, big data, customer satisfaction
    
IBM

Orchestrating Security in the Cloud

Published By: Evident.io     Published Date: Nov 19, 2015
Collaboration services, email, managed services, and backups and disaster recovery are the most common current use cases for cloud services, according to the results of a new SANS survey on cloud security. The 485 IT professionals who participated in the survey reported using a variety of cloud providers and service models, including software-as-aservice (SaaS) cloud offerings, along with a fairly even mix of infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) implementations. Most respondents said they are investing in both public and private clouds as needs dictate.
Tags : 
evident, cloud security, collaboration services, 485 it, disaster recovery, cloud services, saas, networking
    
Evident.io

Best Practices for Securing Workloads in Amazon Web Services

Published By: Evident.io     Published Date: Nov 23, 2015
AWS is the most widely deployed public cloud infrastructure as a service (IaaS) solution in the world and is a leader in Gartner's Magic Quadrant for IaaS (see "Magic Quadrant for Cloud Infrastructure as a Service"). AWS offers a large number of built-in security capabilities (see Note 1), and questions on the proper practices for securing workloads in AWS are increasing.1 AWS is a not a "consumer grade" IaaS cloud. It is a market leader, with a portfolio of security capabilities and security ecosystem partners unmatched by other IaaS providers. However, simply moving existing workloads to AWS without rethinking security tools, processes and system management will result in workloads that are less secure than they were when located within enterprise data centers. Conversely, a properly managed and secured workload in AWS will be at least as — and, in most cases, more — secure than in an enterprise data center.
Tags : 
security, best practices, web services, amazon, workload, aws, data centers, enterprise
    
Evident.io

LogicNow Global IT Service Providers Harmony Report

Published By: LogicNow     Published Date: Mar 10, 2016
Our annual health check of the global IT support market looks at the relationships between IT Service Providers and IT departments and asks, are the two sides working together in harmony, or in a state of Discord? Based on the views of over 1,300 IT departments and almost 700 IT Service Providers, this report delivers the data and vital insights that will help every IT Service Provider to focus on improving sales figures, growing their portfolio and ensuring their service matches customer expectations. Overlook at your peril!
Tags : 
logicnow, it service providers, cyberdefense, cybersecurity, security, network security
    
LogicNow

Digital Innovation: Seize Your Next Market Opportunity

Published By: Oracle     Published Date: Apr 16, 2018
This is a digibook that discusses at a very high level the challenges faced by today’s financial services providers, and how they must innovate to remain relevant.
Tags : 
digital, innovation, market, technologies, industry
    
Oracle

The Engaged Financial Services Provider: Meeting Today's Customer Expectations

Published By: Oracle     Published Date: Apr 16, 2018
Is a guide for financial services providers to building enduring customer relationships through technology
Tags : 
engaged, financial, services, customer, experiences
    
Oracle

ThousandEyes for Application Delivery

Published By: ThousandEyes     Published Date: Nov 17, 2016
The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services has increased the complexity application delivery. Online Operations and Site Reliability teams in firms of all types are now responsible for many parts of the application delivery chain. When things go wrong, no matter where, they’re expected to react quickly to minimize the impact on their customers. The challenge for application providers is that users may often experience service degradation when the application stack seems to be working perfectly fine, making troubleshooting extremely difficult. Download now to learn more!
Tags : 
    
ThousandEyes

Aberdeen Report: Security Operations in Public Cloud Services - Going with your Strengths

Published By: McAfee     Published Date: Mar 31, 2017
Aberdeen Group discusses the move to the public cloud and the security shared responsibility model that leverages the strengths of both the public cloud service providers and  enterprises
Tags : 
virtualization, public cloud, infrastructure as a service, iaas, cloud security, devops, devsecops 
    
McAfee

Questions to Ask Your Cloud Service Provider

Published By: McAfee     Published Date: Apr 04, 2017
Engaging a cloud service provider (CSP) for Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) or Software-as-a-Service (SaaS) is now common practice for enterprise IT. It is essential to make the right choice of providers and services, particularly as it relates to security practices, data privacy, and operational capabilities. Be sure to put potential Cloud Service Provider (CSP) partners under the microscope by asking them the right questions about how they will secure your most essential information.
Tags : 
saas, iaas, cloud service provider, cloud
    
McAfee

Smart Building Connectivity: Realize a More Reliable Building Network

Published By: Commscope     Published Date: Jun 25, 2019
The less you hear about your building’s network, the better. Enterprise networks rarely make the news unless the news is bad—and an unplanned outage is about as bad as it gets. In 2017, a tech’s typo at one of the world’s largest cloud services providers took a large swath of servers offline for four agonizing hours. According to one estimate, it cost S&P 500 companies $150 million—and U.S. financial-service companies $160 million—in lost revenue. Of course, the financial hit is just one aspect of an outage. The true cost also includes lost productivity and damage to your reputation. As our reliance on ITC infrastructure increases, the cost of an unplanned outage will only go up.
Tags : 
    
Commscope

Concentric Hosted Exchange Whitepaper

Published By: Concentric     Published Date: Mar 27, 2009
Email, calendaring, collaboration, and mobility solutions are moving from corporate data centers to service provider networks. Service providers can realize far greater economies of scale than most businesses and deliver higher levels of service to more users at a lower cost; in fact, the fewer the users, the higher cost for each. Concentric Hosted Exchange is a fast, reliable and affordable solution for email, calendaring, collaboration, and mobility based on Microsoft® Exchange Server 2007 Service Pack 1 (SP1) and Microsoft Outlook® 2007. Concentric Hosted Exchange provides all of the benefits of Microsoft Exchange and Outlook 2007 without the up-front infrastructure costs or ongoing overhead.
Tags : 
concentric, hosted exchanged, email, calendaring, collaboration, mobility, corporate data centers, service provider networks
    
Concentric

Virtual Support Networks: Ten Tips for Delivering Managed Services to On-Site Systems

Published By: WebEx     Published Date: Apr 02, 2009
The business of taking care of remote hardware and software has never been bigger:-Managed systems and services for retail, point of sale, hospitality, and other distributed operations are a hot growth area.- Enterprise help desks manage an increasingly dispersed array of hardware and software.- Enterprise software providers are moving to managed services and other value added support offerings to preserve margins in the face of increasing price pressure.
Tags : 
webex, virtual support networks, virtual support network, vsn technology, standard remote management, it server management, local area network, lan
    
WebEx

5 Steps to Secure Internet SSO

Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing
    
Ping Identity

Identity Enabled Web Services: Standards-based identity for Web 2.0

Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity

Secure Internet Single Sign-On 101

Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity

Top 10 Reasons Why You Should Consider a Hosted UCaaS Solution

Published By: Arkadin     Published Date: Sep 11, 2013
Unified Communications (UC) transforms the workplace, making it more productive, efficient and effective. Hosted UC service providers remotely deliver and manage various communications services using shared resources enabling customers to consolidate and outsource much, or possibly all, of their communications and collaborations needs for a fixed monthly cost. This whitepaper details the top reasons to consider a hosted unified communication solution for your enterprise.
Tags : 
unified communication, unified collaboration, enterprise unified communication, hosted unified communication, hosted uc, hosted ucaas, uc total cost of ownership, uc tco
    
Arkadin

Whitepaper: The Wild, Wild West of Mobile Apps

Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : 
mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security, business technology
    
Webroot

The Benefits of Cloud-Based Telephony

Published By: RingCentral     Published Date: May 14, 2013
There has never been a better time to shop for a new phone system, due to the growing number of service and equipment options. In today's competitive environment, businsses are looking for ways to lower expenses, eliminate multiple vendors and communication providers, refocus IT staff on other areas of business, and allow employees to easily connect regardless of location and device. Read this white paper to learn what the benefits of cloud based telephony are.
Tags : 
benefits of cloud based telephony, cloud based telephony, benefits of cloud telephony, it staff, ringcentral
    
RingCentral
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.