service providers

Results 276 - 300 of 446Sort Results By: Published Date | Title | Company Name

The Power and Payback of Unified IT Monitoring

Published By: CA Technologies     Published Date: Feb 09, 2015
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications, data management, business technology, virtualization, cloud computing, infrastructure
    
CA Technologies

It’s Time To Take Global Load Balancing To The Cloud

Published By: Dyn     Published Date: Feb 06, 2015
Whether you’re serving customers, partners, or internal users through two data centers or twenty, you want all users to have the best experience. Global load balancing (GLB) is the effective management and balancing of the Internet traffic to and from your data centers and cloud service providers and has become critical to growing enterprise ecommerce revenue, serving customers and empowering employee productivity.
Tags : 
glb, internet traffic, ecommerce revenue, employee productivity, cloud-based services, it management, enterprise applications, data management, data center
    
Dyn

Augmented VPN

Published By: McAfee     Published Date: Jan 20, 2015
Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.
Tags : 
asset, networking, encryption, firewalls, internet security, network security appliance
    
McAfee

Running Out of Bandwidth? Take a Fresh Look at 100G

Published By: Cisco     Published Date: Jan 15, 2015
Service providers around the world share concerns about running out of bandwidth. Business challenges surrounding continued bandwidth growth, linked to video, mobility, and cloud applications, are significant. Service providers also report declining revenue from a cost-per-bit perspective, so not only does the network need to grow, it also needs to grow more cost effectively. The Cisco Virtual Networking Index™ (Cisco VNI™) predicts that over 50 billion devices will be connected over these networks by 2020. The network effects of the Internet of Things, LTE mobility, and mobile video are just beginning to be understood. In a world where mobile device network additions are growing four times faster than the population, and machine-to-machine (M2M) device network additions are growing five times faster than mobile device additions, this problem is clearly becoming highly important and requires a good solution.
Tags : 
cloud, growth, traffic, projection, account, network, it management, enterprise applications
    
Cisco

Four Key Trends Impacting Mobile Infrastructure Strategy

Published By: IBM     Published Date: Jan 09, 2015
As mobile technology evolves, it’s bringing rapid change to enterprises everywhere, so it’s essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst report to get expert insight into how you can benefit from key mobile trends; building blocks and best practices for successful deployment and adoption of any mobility initiative; critical factors to consider when evaluating an IT services provider; and details on how IBM MobileFirst services can help you achieve a sustainable competitive advantage
Tags : 
ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges, iot, byod, infrastructure, trends, analytics, networking, security, it management, wireless
    
IBM

Want to know what your competitors are sending in email?

Published By: eDataSource     Published Date: Jan 05, 2015
We track daily 25 million email campaigns from 50,000 brands. Download this 1 page white paper on how we do it and learn how you gain real-time e-mail competitive intelligence.
Tags : 
email campaigns, email competitive intelligence, email monitoring, real-time, email service providers
    
eDataSource

Magic Quadrant for Cloud Infrastructure as a Service

Published By: CenturyLink     Published Date: Jan 02, 2015
The market for cloud compute infrastructure as a service (a virtual data center of compute, storage and network resources delivered as a service) is still maturing and rapidly evolving. Strategic providers must therefore be chosen carefully.
Tags : 
gartner, magic quadrant, compute infrastructure, storage resources, network resources, strategic providers, it management, knowledge management, data center
    
CenturyLink

Magic Quadrant for Cloud Infrastructure as a Service

Published By: CenturyLink     Published Date: Jan 02, 2015
The market for cloud compute infrastructure as a service (a virtual data center of compute, storage and network resources delivered as a service) is still maturing and rapidly evolving. Strategic providers must therefore be chosen carefully.
Tags : 
gartner, magic quadrant, compute infrastructure, storage resources, network resources, strategic providers, it management, knowledge management
    
CenturyLink

Independent Research Firm releases new Wave Leader Report for MSSP : North America, Q4 2014

Published By: SilverSky     Published Date: Dec 11, 2014
Forrester's 26-criteria evaluation of managed security service providers (MSSPs) included the 13 most significant vendors in the North American market that security and risk professionals can turn to for solving some of their most important security challenges. Forrester’s assessment evaluates MSS offerings based on current offering, market presence and strategy. SilverSky was named a “leader” in the report, with highest marks for delivery capabilities and services and its market presence in North America. Forrester states in the report that, “SilverSky capabilities rival those of larger companies."
Tags : 
mssps, managed security service, security challenges, security professionals, security, it management, knowledge management, enterprise applications
    
SilverSky

Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment, it management, enterprise applications
    
Centrify Corporation

Rethink Storage: Transform the Data Center with EMC ViPR Software-Defined Storage

Published By: EMC Corporation     Published Date: Dec 01, 2014
The following paper opens with the evolution of the Software-Defined Data Center and the challenges of heterogeneous storage silos in making the SDDC a reality. It continues by introducing EMC ViPR Software-Defined Storage and details how it enables enterprise IT departments and service providers to transform physical storage arrays into pools of virtual shared storage resources enable the delivery of innovative data services across arrays.
Tags : 
data center, software-defined storage, enterprise it departments, virtual shared storage
    
EMC Corporation

The Power and Payback of Unified IT Monitoring

Published By: CA Technologies     Published Date: Nov 12, 2014
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers, including both the organizational and strategic impacts as well as the business case surrounding it. It goes further to examine CA Unified Infrastructure Management as an example of unified IT monitoring, and reviews three case studies where the solution has been deployed for active use in a unified manner.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, enterprise applications, data management, business technology, virtualization, cloud computing, infrastructure
    
CA Technologies

RCN Transforming Business Communications

Published By: RCN Business     Published Date: Nov 11, 2014
In a changing business climate, you're only productive as the technology that supports you. In fact, having the right services can mean the difference between one more happy sale or one less customer. Don’t settle for "one less" - get the right solution for your business with RCN Business Services. RCN Business Services offers a full suite of communications products and services to businesses of all sizes, including Internet, voice, video and network solutions. We are a facilities-based provider that offers extensive fiber density with redundancy and superior performance. Spanning over 6,000 miles, the advanced fiber-rich network is completely diverse from other communications providers, enabling businesses to experience exceptional customer service, quicker installation and issue resolution. RCN Business operates on three fundamental tenets: Partnership, Choice and Technology. These fundamental tenets guide how RCN Business approaches the sales process, addresses its customers, and supports its products and services. Partnership: The process starts with a dedicated RCN Business account representative actively listening and learning the needs, goals and challenges of a business. The trained and experienced RCN Business staff then delivers a customized solution. Choice: RCN Business understands that one size does not fit all. The goal is to create a reliable, customized technology solution that contributes to a business’s success and growth. Technology: Technology and customer support are critical to any business. With RCN Business owning and having full control of its network, businesses get local U.S. based operations, faster response times and a continuous monitoring for superior uptime.
Tags : 
lan, voip, business communication, wan, pbx, networking, wireless, analog communications, digital signal processing, embedded systems and networking, business technology, telecom
    
RCN Business

Content is the New Perimeter: The Security and Regulatory for Information Rights Management

Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security, business technology
    
Intralinks

HYBRID CLOUD MYTHS

Published By: Equinix     Published Date: Oct 27, 2014
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-in—having only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability.
Tags : 
data center, enterprise, cloud, experience, hybrid, performance, strategy, interconnectivity, network, drive, evolution, landscape, server, mobile, technology, globalization, stem, hyperdigitization, consumer, networking
    
Equinix

The Rise Of The Protection Storage Architecture

Published By: CDW     Published Date: Sep 10, 2014
Leading organizations don’t think of data protection in traditional back-office terms—and that’s no accident. They think and act like service providers, and in doing so transform data protection operations from mere cost centers to business enablers. Traditional data protection architectures can’t meet today’s challenges of massive growth, application performance, and data availability. And they aren't designed for services-oriented business models.
Tags : 
protection, storage, architecture, massive growth, integrated, data
    
CDW

Maximizing Data Security with Whitewater Cloud Storage Gateways

Published By: Riverbed     Published Date: Sep 05, 2014
Information is becoming the currency of the 21st century, and organizations of all sizes are creating more information than ever before. Frequently, organizations struggle with how best to balance storage requirements with available budgets. The benefits of greater storage capacity are clear: better change management and roll-back, easier archival and discovery, reliable backup and recovery. But to continually grow on-site capacity requires unsustainable investment and introduces unnecessary risk. Prominent cloud service providers present an appealing alternative with their vast amounts of storage, offering low cost, high availability, and built-in redundancy. Riverbed’s Whitewater® family of cloud storage gateways is a drop-in replacement for existing tape- and diskbased backup targets, cuts backup costs 30-50% compared to tape and disk, and provides effective DR capability with minimal effort.
Tags : 
data security, cloud storage, gateways, requirements, archival, discovery, management, storage, data management
    
Riverbed

Email and Web Security Try & Buy

Published By: Cisco     Published Date: Aug 18, 2014
Cisco offers an approach to network security that protects against new and emerging threats while enhancing network visibility and control. Cisco’s proven email and web security products protect 50 percent of Fortune 1000 companies, more than 20 percent of the world's largest enterprises, and eight of the 10 largest Internet service providers.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, security, web services, web service security
    
Cisco

HP 3PAR StoreServ Storage: optimized for flash

Published By: HP     Published Date: Jul 22, 2014
In this white paper, we will begin by looking at HP’s flash design strategy and how it differs from other vendors. Then we will present the architectural requirements for delivering real advantages in flash-based storage performance, efficiency, resiliency, and data mobility. We’ll also unveil the technical details of the new HP 3PAR StoreServ 7450 Storage, the only all-flash array in the industry to deliver the performance advantages of a flash-optimized architecture while delivering the Tier 1 resiliency and data services that power three of the world’s four largest managed service providers.
Tags : 
3par, storeserv, storage, data, flash, data mobility, performance, data management, business technology
    
HP

Selecting ERP for Oil & Gas Contractors

Published By: IFS     Published Date: Jun 25, 2014
Find out how ERP can help EPC contractors, equipment fabricators and service providers meet new demands from oil/gas companies.
Tags : 
ifs, erp, oil contractors, gas contractors, soa, enterprise applications, it management
    
IFS

HP StoreOnce:  Boldly Go Where No Deduplication Has Gone Before

Published By: HP     Published Date: Jun 05, 2014
Fast-growing data and widespread virtualization have ratcheted up data protection challenges no matter what the size of your business. This paper will describe the challenges of data protection, why deduplication is critical to meeting the challenges, how HP is achieving its vision of federated dedupe with StoreOnce – and what HP’s StoreOnce VSA announcement and achievement means to backup services providers, enterprises with remote or branch offices and small and medium businesses as well.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication, storeonce, it management, data management
    
HP

The Total Cost of Ownership of EHR in a Meaningful Use World

Published By: GE Healthcare     Published Date: Jun 04, 2014
The central theme of industry wide adoption of EHRs is based on the concept of “meaningful use,” which by design is a metric that will connect all the moving parts of this complicated initiative into a system that communicates and delivers high-grade electronic healthcare services. To qualify as a “meaningful user,” eligible providers must demonstrate use of a “qualified EHR” in a “meaningful manner.” It is a lofty and worthwhile goal. This white paper examines the total cost of ownership for “meaningful” EHR adoption in a physician practice.
Tags : 
ge healthcare, emr, emr replacement, electronic medical records, emr adoption, meaningful use, productivity, vendor, change management, healthcare it
    
GE Healthcare

Cloud Business Email: The Market Leaders

Published By: SilverSky     Published Date: May 22, 2014
Who are the current leaders in the business email market? The Radicati Group, a technology market research firm, said SilverSky offers “one of the most secure Cloud Business Email services available in the market today.” When run on IBM SoftLayer, it’s also the most reliable. Read the full report.
Tags : 
silversky, ibm, email, email services, email service providers, cloud, cloud business email, cloud business email services, ibm softlayer, content delivery, messaging, cloud computing, business technology
    
SilverSky

Five Strategies for Email Data Loss Prevention

Published By: SilverSky     Published Date: May 22, 2014
Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.
Tags : 
silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention, data loss prevention, dlp, encryption, content delivery, secure content management, cloud computing, business technology
    
SilverSky
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.