suse

Results 26 - 50 of 51Sort Results By: Published Date | Title | Company Name

How Your Trusty Office Printer Can Put Your Legal Files At Risk

Published By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices… It’s hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America

Unix, Linux Uptime and Reliability Increase; Patch Management Woes Plague Windows

Published By: IBM     Published Date: Jun 02, 2009
Linux reliability has come of age. Several major Linux distributions including Novell SUSE, Red Hat Enterprise Linux and Ubuntu scored high in reliability, improved over 2006 uptime statistics and achieved near parity with Unix distributions. Security incidents plagued Windows Server 2003, which saw uptime decrease by roughly 10% during last year. Corporations must continue to adhere to best practices in configuration, management and security to ensure optimal server operating system and application reliability.
Tags : 
reliability, uptime, performance, management, service-level agreement, sla, compliance, linux, unix, ibm, red hat enterprise linux, rhel, ubuntu, debian, real-time resources, smbs, small and medium businesses, operating system, total cost of ownership, tco
    
IBM

The Real Fault Tolerant

Published By: Stratus Technologies     Published Date: Mar 10, 2009
Fault Tolerant is a pretty common term in the world of IT, also an often misused and misleading term.  For 3 decades, Stratus Technologies has been engineering and manufacturing purpose built Fault Tolerant solutions. Check out this short video to understand what it takes to be REAL Fault Tolerant.
Tags : 
stratus, virtualization, fault tolerance, real fault, it management, industry standard components, disaster prevention, enterprise applications, enterprise resource planning, server virtualization
    
Stratus Technologies

SUSE Linux Enterprise Server on the IBM PureFlex System

Published By: IBM Corporation     Published Date: May 22, 2012
The SUSE Enterprise Linux Server, now on the IBM PureFlex System, provides an open, reliable and secure IT environment with faster deployment,better business agility, lower power consumption, better hardware utilization and lower total cost of owners
Tags : 
suse linux enterprise server, ibm pureflex system, mission-critical computing, cloud computing, integrated systems strategy, open virtualization format, ovf, business technology
    
IBM Corporation

CEO Disconnect is Weakening Cybersecurity

Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation

How to Win the Battle Against Spyware with Next Generation Technology

Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection, security, anti spyware, anti virus
    
Process Software

Accelerate And Modernize Container Application Delivery With SUSE

Published By: AWS     Published Date: Jun 04, 2019
Description Organizations are shifting to containers for its many benefits, including increased developer productivity and an improved, modernized environment for customized applications. While Kubernetes helps organizations get the most out of those benefits, it is complex by nature and can be difficult to manage on your own. Developers need a solution that drives productivity without needing to worry about managing infrastructure. SUSE Cloud Application Platform on Amazon Web Services (AWS) provides a lean and fast platform to accelerate containerized application delivery. By leveraging a managed Kubernetes environment, SUSE makes it easier for DevOps teams to deliver applications, accelerate innovation, and improve IT responsiveness.
Tags : 
    
AWS

Bon-Ton Stores: Maximizing Peak Capacity; Minimizing Stack Costs

Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail, application performance management, business analytics, business intelligence, customer experience management
    
IBM

Taking Linux and the Open Community to New Heights

Published By: IBM     Published Date: Jul 07, 2016
Listen to videos with WIRED Editor Jim Daily and technology experts from The Linux Foundation, Canonical/Ubuntu, SUSE, The Met Office and IBM as they discuss how the latest hybrid cloud infrastructure technology and the best of Linux and open source can yield business innovation and growth.
Tags : 
ibm, linux, ibm linuxone, open source, open solutions, enterprise applications
    
IBM

Building an Enterprise Linux Solution: SUSE & Power Systems

Published By: IBM     Published Date: Jul 07, 2016
With SUSE Linux Enterprise Server on IBM Power Systems, you gain the benefits of the latest generation of Enterprise Linux OS with the power and reliability of IBM hardware. This combination provides the performance and flexibility to run the most demanding business-critical workloads.
Tags : 
ibm, ibm power systems, suse, suse linux enterprise server, linux, ibm hardware, open source, knowledge management
    
IBM

SUSE Enterprise Linux Server and IBM Power Systems: Making the Leap to Open Source

Published By: IBM     Published Date: Jul 07, 2016
Open-source is becoming an increasingly critical component being leveraged by agile enterprises. The capital investment required to develop next generation business solutions demands that components be built and targeted to the platform best suited for the task. Understanding the tools available for you or your developers to gain efficiencies to build solutions once, and deploy on a choice of scalable and reliable platforms is of paramount importance.
Tags : 
ibm suse, suse enterprise linux server, linux, ibm power systems, open source, agile, knowledge management
    
IBM

Choose the Right Platform for Your SAP HANA Strategy, from SUSE & IBM

Published By: IBM     Published Date: Jul 07, 2016
In this webinar, you will learn about the availability of SAP HANA across the entire IBM Power Systems line with pre-sized IBM POWER8 configurations that are optimised for SAP HANA, highly available/disaster recovery options for SAP HANA on Power Systems deployments, and systems management solutions to maintain the SAP HANA systems. You will also hear client use cases on why they chose to implement their SAP HANA solution on IBM Power Systems..
Tags : 
ibm, sap, sap hana, suse, ibm power systems, enterprise applications, open source
    
IBM

Customer Best Practices for SAP HANA on IBM Power and SUSE Linux

Published By: IBM     Published Date: Jul 07, 2016
See how and why businesses everywhere are using SAP HANA on SUSE Linux Enterprise Server and IBM Power Systems to improve productivity, reduce cost, and gain insight.
Tags : 
ibm, ibm power systems, sap, sap hana, linux, suse linux enterprise server, open source, knowledge management
    
IBM

The Future Of Data Security And Privacy: Growth And Competitive Differentiation

Published By: IBM     Published Date: Sep 30, 2016
Data is the lifeblood of today’s digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits, stolen IP can destroy competitive advantage, and unnecessary privacy abuses can bring unwanted scrutiny and fines from regulators while damaging reputations. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model; position data security and privacy capabilities as competitive differentiators; and build a new kind of customer relationship.
Tags : 
ibm, security, data, privacy, forrester, forrester research, data management, business technology
    
IBM

Building an Enterprise Linux Solution: SUSE & Power Systems

Published By: IBM     Published Date: Oct 11, 2016
Topics to be discussed include: - The need for new RAS characteristics in next-gen applications - The benefits of having an agile and scalable platform for workloads running SUSE Linux Enterprise Server on IBM Power Systems
Tags : 
ibm, hardware, systems hardware, linux, linux on power, security, software development, enterprise applications, business technology
    
IBM

Taking Linux and the Open Community to New Heights

Published By: IBM     Published Date: Oct 18, 2016
Listen to videos with WIRED Editor Jim Daily and technology experts from The Linux Foundation, Canonical/Ubuntu, SUSE, The Met Office and IBM as they discuss how the latest hybrid cloud infrastructure technology and the best of Linux and open source can yield business innovation and growth.
Tags : 
ibm, linux, ibm linuxone, open source, open solutions, enterprise applications
    
IBM

SUSE Linux Enterprise Server on the IBM PureFlex System

Published By: IBM     Published Date: Jan 09, 2014
The SUSE Enterprise Linux Server, now on the IBM PureFlex System, provides an open, reliable and secure IT environment with faster deployment, better business agility, lower power consumption, better hardware utilization and lower total cost of ownership.
Tags : 
suse enterprise, linux, ibm, enterprise, pureflex system, linux enterprise, open virtualization, mission critical, security, storage, data management, business technology, virtualization, cloud computing, infrastructure
    
IBM

Bandwidth bandits; Are you keeping them in check?

Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Our analysis shows 25% of internet bandwidth can be lost to employee misuse, streaming media & spam. Understand bandwidth wastage in your business & steps you can take to control it.
Tags : 
messagelabs symantec, internet bandwidth, it management, tco, bandwidth management, network management, total cost of ownership
    
MessageLabs Ltd.

Optimize Retail Operations and Lower Costs by Enhancing Your Use of IT

Published By: IBM     Published Date: Feb 08, 2008
Point of service is the key to every retail operation. But with e-mail marketing, in-store/self-service kiosks and more, the definition of point of service is changing. These changes create a unique opportunity to utilize advanced technologies to improve the customer experience. The IBM Retail Environment for SUSE LINUX (IRES) is designed to help retailers do just this -- while generating higher profits.
Tags : 
pos, point of service, tco, marketing, customer experience, increase sales, profitability, retail, cost control, ibm, marketing automation, sales automation, customer experience management, spend management
    
IBM

Risk-Free Travel: A Look At Swiss Re

Published By: Pointsec     Published Date: Aug 21, 2009
Critical data is best protected against misuse on business trips complete encryption of notebook hard disks. If 4,500 notebooks are involved, as is the case for the Zurich firm Swiss Re, precise selection criteria and exact planning for the international rollout are important.
Tags : 
data protection, laptop, lost laptop, lost notebook, encryption, data encryption, laptop encryption, vulnerability, pointsec, wireless, mobile computing, mobile data systems, mobile workers, wifi, wireless security
    
Pointsec

E-Policy Best Practices Guide

Published By: St Bernard Software     Published Date: Aug 21, 2009
Download this information-packed white paper by Nancy Flynn, Executive Director of the ePolicy Institute, for a no-nonsense look at the business risks and legal liabilities associated with employee misuse of the Internet, email, instant messaging (IM), and peer-to-peer (P2P) file-sharing technology.
Tags : 
spyware, security policy, security policies, policy based management, email security, secure im, st. bernard, st bernard, epolicy, anti spyware, secure instant messaging
    
St Bernard Software

Protecting Backup Media with AES Encryption

Published By: EMC     Published Date: Nov 06, 2006
Offsite media can be lost or stolen while in transit, exposing sensitive information to potential misuse. By using AES encryption on backup data, a business can feel confident that sensitive customer information will remain safe and secure, even if the backups tapes are lost of stolen.
Tags : 
disaster plan, encryption, disk backup, tape backup, offsite storage, offsite, off-site, backup data, data backup, aes encryption, data protection, emc, emc insignia, storage, backup and recovery
    
EMC

Employee Web Use and Misuse Whitepaper

Published By: MessageLabs     Published Date: Jan 13, 2009
Drawing the line between employee web usage and company policy is challenging for IT Managers. Download this whitepaper to help make informed decisions about your own web monitoring requirements FREE Whitepaper (PDF/40KB)
Tags : 
messagelabs, employee web use, employee web misuse, employee web surfing, employee internet usage, web use monitoring, web use blocking, security, it management, access control
    
MessageLabs

Bon-Ton Stores: Maximizing Peak Capacity; Minimizing Stack Costs

Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail
    
IBM

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Start   Previous    1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.