service providers

Results 126 - 150 of 445Sort Results By: Published Date | Title | Company Name

Transform Your Business with HCI

Published By: Dell EMC     Published Date: Dec 01, 2017
Hyperconverged infrastructure (HCI) is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: What are the most effective uses of HCI today and in the future? Who benefits from HCI, and who doesn’t? What enterprise infrastructure challenges could be solved with HCI? This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand
Tags : 
    
Dell EMC

Transform Your Business with HCI

Published By: Dell EMC     Published Date: Dec 01, 2017
perconverged infrastructure (HCI) is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: What are the most effective uses of HCI today and in the future? Who benefits from HCI, and who doesn’t? What enterprise infrastructure challenges could be solved with HCI? This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand th
Tags : 
    
Dell EMC

Transform Your Business with HCI

Published By: Dell EMC     Published Date: Dec 01, 2017
Hyperconverged infrastructure is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: What are the most effective uses of HCI today and in the future? This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand the key requirements enterprise IT administrators should consider as they begin their initial deployments or expand
Tags : 
    
Dell EMC

Transform Your Business with HCI

Published By: Dell EMC     Published Date: Dec 01, 2017
Hyperconverged infrastructure is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: -What are the most effective uses of HCI today and in the future -Who benefits from HCI, and who doesnt -What enterprise infrastructure challenges could be solved with HCI This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand the ke
Tags : 
    
Dell EMC

Understanding And Mitigating DDOS Attacks

Published By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle

10 Software and Cloud Services Providers to Consider for Your GDPR Compliance Needs

Published By: Mimecast     Published Date: Nov 28, 2017
With the pending EU General Data Protection Regulation (GDPR), your organization must consider a wide variety of changes for compliance if you hold EU resident data. Your organization should look at GDPR as an opportunity to modernize storage, compliance and security needs. But what services should be considered? Download to learn more including: • How the right providers can help you build a business case for GDPR compliance • Ways providers can directly aid in the compliance process • Why the right tools can help with not just technology but process changes as well
Tags : 
software provider, cloud service provider, gdpr
    
Mimecast

Is a Hyper converged Infrastructure Cost-Competitive with the Cloud?

Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
The Cloud, once a radical idea in IT, is now mainstream. Whether it’s email, backup or file sharing, most consumers probably use a cloud service or two. Similarly, most IT professionals are familiar with cloud service providers such as Amazon, Google and Microsoft Azure, and many companies have moved at least some of their information technology processes into the cloud. In fact, the cloud has become so popular it’s easy to assume that running IT applications on-premises is not cost competitive with a cloud based service. In this report Evaluator Group will test the validity of that assumption with a TCO (Total Cost of Ownership) model analyzing a hyperconverged appliance solution from HPE and a comparable cloud service from Amazon Web Services (AWS).
Tags : 
infrastructure, cost competitive, cloud, hyper converged, amazon web services, total cost of ownership, tco
    
Hewlett Packard Enterprise

2017 Spotlight Report – Use of Managed Security Service Providers (MSSPS)

Published By: AlienVault     Published Date: Oct 20, 2017
This 2017 Spotlight report reveals the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs. You'll learn about key findings including: The predominant driver for organizations to consider managed security services The most critical capabilities organizations look for in MSSPs The most requested security services offered by MSSPs Key benefits respondents have achieved by partnering with an MSSP Whether you are evaluating using an MSSP, or are an MSSP yourself, download this report to gain valuable insights into how MSSPs are helping their clients improve their security posture.
Tags : 
    
AlienVault

Threat Intelligence Evaluator's Guide

Published By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault

Making the Case for a Cloud Access Security Broker

Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Cloud Access Security Brokers are one of the fastest growing security technologies today because they provide cloud service visibility, data security, threat protection, and compliance. CASBs are an effective and easy way to mitigate the top cloud security threats and security practitioners look to trusted CASB providers as strategic partners to help advise on key cloud security decisions.
Tags : 
    
Oracle Security Solutions

The 3 Stage Journey To The All Flash Cloud

Published By: Pure Storage     Published Date: Oct 09, 2017
Cloud computing and all-flash storage are two of the most important innovations driving next-generation IT initiatives. While it may seem at first that these are parallel trends, in reality they are inextricably intertwined. Without the benefits of all-flash storage —driving new levels of performance, agility and management simplicity — enterprises would not be able to modernize their infrastructures to deliver cloud services. It is no coincidence that the largest hyperscale cloud providers rely on all-flash storage solutions as their storage foundation. Pure Storage all-flash storage arrays provide enterprise customers with a safe, secure and smooth path to the all-flash cloud. You can take the journey in stages, starting small with a single application or two, and then adding more applications through consolidation and virtualization. You can also implement multiple stages at once.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Pure Storage

7 Secrets to Saas Subscription Revenue Growth Without Compromise

Published By: Vindicia     Published Date: Oct 04, 2017
Software-as-a-service (SaaS) businesses and other cloud-based service providers have taken the industry by storm. Innovative startups hatched just a few short years ago have now exploded into major household brands such as Angie’s List, LifeLock, and Allrecipes.
Tags : 
    
Vindicia

Uncovering Critical Revenue Drivers for Online Service Providers

Published By: Vindicia     Published Date: Oct 04, 2017
If your company provides subscription based online services or softwareas-a-service (SaaS), your business success depends upon improving two key metrics: customer acquisition and customer retention. At Vindicia, our in-depth experience in handling more than 240 million accounts that have transacted over $21 billion for our clients enables us to provide unique insights into how well companies performs relative to industry standards. Such business insights can help your company improve your online services business, potentially leading to millions in incremental revenue through increased acquisition and retention numbers.
Tags : 
    
Vindicia

The Forrester Wave™: Services Providers For Next-Generation SAP Products, Q1 2016

Published By: IBM APAC     Published Date: Sep 25, 2017
Today, SAP’s solution portfolio looks very different and addresses different business needs than the SAP of a few years ago. Instead of primarily managing back-office enterprise resource planning (ERP) processes such as finance and the supply chain, SAP is evolving into a new type of software company that’s poised to enable digital business. Numerous acquisitions — including leading eCommerce solution hybris and cloud solutions Ariba, Concur, and SuccessFactors — and a new platform strategy based on SAP Hana, an in-memory computing solution, mean that the SAP core is positioned to support real-time digital business in the era of connected everything.
Tags : 
digital transformation, architecture, business processes, best practices, customer engagement, employee engagement
    
IBM APAC

PSD2 and Transaction Risk Analysis: Why it’s Important to You

Published By: FICO     Published Date: Sep 12, 2017
PSD2 puts accountability for unauthorised or fraudulent payments squarely on payment service providers. PSPs are now obliged to confirm their customer’s identity robustly when making payments and when managing their accounts. But these measures threaten to put barriers in the way of the frictionless journey that customers want.
Tags : 
psd2, accountability, security, customer authentication, risk analysis, payment fraud, fico
    
FICO

Protecting Data in the Healthcare Industry

Published By: Mimecast     Published Date: Aug 22, 2017
Healthcare organizations are a favorite target for determined attackers. Any disruption to critical services provides a strong incentive to pay a ransom and patient medical data is highly lucrative for the information it contains. Research finds that providers have traditionally under invested in IT security, which further compounds the problem. Read the report to learn: • Important cyber security risks • The impact of a data breach to your organization • Key regulations around the globe
Tags : 
healthcare, data protection, patient medical data
    
Mimecast

5 OAuth Essentials for API Access Control

Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth puts the user in control of delegating access to an API. This allows one service to integrate with another service on behalf of that user. The same social Web providers who popularized the pattern of exposing an API to enable third-party developers to enrich their platforms were the first ones to apply such delegated authorization mechanisms. OAuth was defined in 2006, to standardize mechanisms of this kind.
Tags : 
    
CA Technologies

5 Steps to a 5G-Ready Cloud

Published By: Intel     Published Date: Aug 17, 2017
5G will be a transformative force, offering enhanced mobile broadband and enabling a huge volume of machine to machine communications, based on its ultra-reliable, and low latency network. For comms service providers it puts them in a strong position to offer new services, including in the Internet of Things (IoT), visual computing, analytics, and enhanced mobility.
Tags : 
    
Intel

Virtualizing the Evolved Packet Core (vEPC)

Published By: Intel     Published Date: Aug 17, 2017
Communications service providers are looking for alternative deployment models that will help them support fast-growing network demand. Moving to a virtualized EPC (vEPC) solution can help service providers achieve more cost-e?ective scaling by using standard high-volume servers in place of purpose-built systems. System integrators, software vendors, and platform providers rely on Intel® technologies to deliver the performance and scalability required for vEPC solutions. Intel is also participating in the development of open standards, contributing to the open source community, developing reference architectures, engaging with industry participants, and collaborating on trials that can help facilitate the evolution to vEPC solutions and accelerate network transformation by use of network functions virtualization.
Tags : 
    
Intel

Bolstering Competitiveness by Virtualizing the IMS

Published By: Intel     Published Date: Aug 17, 2017
Virtualizing the IMS will bolster competitiveness for communications service providers. This Intel solution brief details how vIMS and NFV provides operators the ability to rapidly and inexpensively deploy, configure, launch, and upgrade services and provide a competitive advantage and accelerating new revenue generation.
Tags : 
    
Intel

Cloud Service Providers: Meet Your Future Customer

Published By: Intel     Published Date: Jul 27, 2017
As organizations go through major business and technology changes, they will increasingly depend on digital platforms to deliver products and services. More than half of the organizations we spoke with said they would increase spending with their primary hosting and cloud service provider (CSP) in 2017, and individual quarterly plans for hosting and cloud services suggest that the growth in spending will be persistent.
Tags : 
    
Intel

Cloud Service Providers: Drive More Profitable Growth from the Cloud

Published By: Intel     Published Date: Jul 27, 2017
Worldwide spending on public cloud services is set to reach USD 122.5 billion in 2017, an increase of 24.4 percent over 20161. In fact, the compound annual growth rate (CAGR) of spending on public cloud services is almost seven times that of overall IT spending growth and IDC predicts that by 2020, it will top USD 203.4 billion worldwide2. The size of the opportunity for cloud service providers (CSPs) is huge but fierce competition, accelerating innovation and the need to keep prices low continue to create enormous pressure. This paper outlines some of the primary challenges faced by CSPs in making and keeping their business profitable and suggests strategies and innovations that can help cloud businesses to take a greater share of the market opportunity.
Tags : 
    
Intel

HP reinvents with 3D printing technology

Published By: HP Inc.     Published Date: Jul 17, 2017
HP builds large-format inkjet printers for corporate clients, print service providers and others with high print volumes. Purchasing a printer in this category is an important decision. HP’s latex technology offers excellent quality and reliability and, with the right print volume, outstanding economics. The engineers who build HP’s 2D printers began thinking about how they could use 3D printing to help reduce costs and innovate more quickly.
Tags : 
3d printing, 3d design, digital materials, 3d prototyping, product design, print services, hp technology, printer, print solution
    
HP Inc.

Ensuring secure and compliant cloud app use with Symantec

Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec

Technical Brief – Secondary/Multi DNS patterns

Published By: Oracle     Published Date: Jul 05, 2017
Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Best-of-breed managed DNS service providers have the global DNS infrastructure and deep DNS network operations expertise to ensure your success. Adding a secondary DNS service can help you deliver consistent, high-quality user experiences across the world and mitigate outage risk. To learn more read our white paper: High Availability DNS Reduces Downtime Risk and Improves End-User Experience
Tags : 
dns, service, serve traffic, corporate firewall, service features, api daemon
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.