udp

Results 1 - 18 of 18Sort Results By: Published Date | Title | Company Name

Designing Your Data Strategy for the Cloud First Age

Published By: Dell EMC     Published Date: Aug 22, 2017
Data is the foundation of the digital economy, but managing data growth poses a big challenge as organizations ramp up cloud adoption. Whether your organization is adopting a hybrid cloud strategy or building modern apps in the cloud, there are many challenges that can limit your effectiveness. With Isilon CloudPools and ECS, you can take advantage of cloud capabilities without a disruptive time-consuming migration of your data. In this webinar, we’ll discuss how Dell EMC puts you in control with a flexible cloud design, allowing you to take an application-centric approach to your data platform.
Tags : 
    
Dell EMC

Leitfaden zur Erstellung erstklassiger Apps

Published By: Microsoft     Published Date: Mar 31, 2017
Visual Studio 2015 hilft Ihnen dabei, großartige Ideen in großartige Geschäftsanwendungen zu verwandeln. Mit unserer flexiblen Cloudplattform und den für Unternehmen konzipierten DevOps-Tools können Sie nun noch einfacher skalierbare, hochmoderne Geschäftsanwendungen für jede beliebige Plattform (Web, mobile Geräte, Cloud oder lokal) entwickeln. Erstellen Sie mit der leistungsstarken Entwicklungsumgebung von Visual Studio beeindruckende Apps für Windows, Android, iOS und das Web. Arbeiten Sie über die Cloud zusammen – mit Versionskontrolle, Agilität, Continuous Delivery und App-Analysen sowie mit jeder beliebigen Programmiersprache und für jede beliebige Plattform.
Tags : 
mobile applications, mobile apps, ios, .net, devops, android
    
Microsoft

Solution Brief: EMC Isilon Cloudpools

Published By: Dell EMC     Published Date: Jun 29, 2016
EMC Isilon Cloudpools software provides policy-based automated tiering that lets you seamlessly integrate with the cloud as on additional storage tier for the isilon cluster at your data center. Learn more about groundbreaking software in this solution brief.
Tags : 
data, storage, best practices, enterprise, management, network attached storage, storage area networks, storage management
    
Dell EMC

Veritas CloudPoint & Pure Storage FlashArrays

Published By: Veritas & PureStorage     Published Date: Nov 14, 2018
Step-by-step guide to configure Pure Storage FlashArray with Veritas CloudPoint.
Tags : 
    
Veritas & PureStorage

Veritas CloudPoint & Pure Storage FlashArrays

Published By: Veritas / PureStorage     Published Date: Nov 16, 2018
Step-by-step guide to configure Pure Storage FlashArray with Veritas CloudPoint.
Tags : 
    
Veritas / PureStorage

Increase application security and availability with Imperva

Published By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
    
AWS

Arcserve Unified Data Protection Workstation FREE

Published By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : 
arcserve, unified data protection, software download, bandwidth, deduplication, it management, knowledge management, enterprise applications
    
Arcserve

Configuring Quality of Service: Prioritizing Network Traffic

Published By: Astrocom     Published Date: Apr 23, 2008
Quality of Service (QoS) enables outbound network traffic to be identified and controlled to give priority to certain types of traffic. Network traffic may be categorized based on a variety of criteria including addressing information, protocol, port number (TCP and UDP), and packet length.
Tags : 
astrocom, networking, traffic, quality of service, traffic management, network management, network performance
    
Astrocom

Delivering ROI with Data Protection, Challenging Times Demand ROI Focused Vendors

Published By: InMage     Published Date: Feb 18, 2009
During challenging economic times, companies are increasingly questioning every budget dollar they spend. Furthermore, companies are reviewing their core vendor relationships to assess which partnerships have lived up to their expectations vs. which have overpromised and under delivered.
Tags : 
inmage, roi, data protection, it spend management, drscout, storage replication, downtime, universal data protection, udp, continuous data protection, cdp, enterprise applications, data management, database development, data quality, database security
    
InMage

Cloud Servers: New Risk Considerations

Published By: Cloud Passage     Published Date: Nov 15, 2012
The tremendous scalability, flexibility, and speed of Infrastructure-as-a-Service (Iaas) make it one of the fastest-growing sectors of the cloud computing markets. Read on to learn more of the new risk considerations and major challenges of cloud.
Tags : 
cloudpassage, cloud infrastructure, cloud server, cloud elasticity, risk considerations, security, it management, data management, business technology, data center
    
Cloud Passage

PCI and the Cloud: Practical Advice for Sustainable Compliance Through Automation

Published By: Cloud Passage     Published Date: Nov 15, 2012
Cloud computing has sparked a huge trend in rapid-fire application development and dynamic, elastic application for hosting. This white paper provides cloud teams with real-world advice on handling PCI in dynamic cloud hosting environments.
Tags : 
pci, cloud, practical advice, sustainable compliance, automation, cloudpassage, cloud computing, security, data management, business technology, data center
    
Cloud Passage

Cloud(n): Innovative IaaS Public Cloud Services Backed by NTT and Built on Citrix CloudPlatform

Published By: Verio     Published Date: Aug 06, 2014
Neovise, a cloud computing industry research and analyst firm, prepared this Perspective Report. • Cloud(n), an IaaS public cloud solution developed by NTT and hosted by Verio, delivers unique value, flexibility, reliability, backed by 24/7 customer support. • Using NTT’s vast global network, Verio can offer 99.99% reliability as well as free bandwidth and fixed pricing caps, so customers never pay more than expected. • Citrix CloudPlatform provides developers with a secure, reliable, hypervisor agnostic foundation supporting almost any workload, scaling in and out, as needed. • The intuitive management portal enables custom configured cloud servers to be spun up in minutes, using pre-set or uploaded templates. Load balancing, auto scaling, and monitoring are included. With an extensible API, the portal integrates with over 200 3rd party solutions, including AWS. • ISVs, SaaS and developers should seriously consider the many advantages of Cloud(n).
Tags : 
ntt, cloudn, cloud(n), public cloud, iaas, citrix, cloudplatform, aws, free bandwidth, ease-of-use, templates, cloud services, portal, load balancing, auto scaling, monitoring, 24/7 support, affordable, 99.99% reliability, web services
    
Verio

CloudFlare advanced DDoS protection

Published By: CloudFlare     Published Date: Jul 25, 2016
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks. This document explains the anatomy of each attack method and how the CloudFlare network is designed to protect your web presence from such threats.Below you will find detailed information on these attacks and how the CloudFlare network protects against them.
Tags : 
cloudflare, best practices, technology, security, access control, business intelligence, business technology, cloud computing
    
CloudFlare

EMC Isilon Cloudpools: Extend the Data Lake to the Cloud

Published By: EMC     Published Date: Jun 13, 2016
EMC Isilon Cloudpools software provides policy-based automated tiering that lets you seamlessly integrate with the cloud as on additional storage tier for the isilon cluster at your data center.
Tags : 
emc, cloud computing, data center management, clusters, data integration, network architecture, servers, backup and recovery, clustering, storage virtualization, server virtualization, data center design and management
    
EMC

Het mysterie van cloudbeveiliging ontrafeld

Published By: Workday Netherlands     Published Date: Aug 07, 2018
Maar executives schrikken er vaak voor terug om informatie buiten de onderneming te verplaatsen. Zij geloven - ten onrechte - dat hun IT-personeel het beste in staat is om gevoelige informatie te beveiligen. Voor een succesvolle toekomst moeten CIO’s hun traditionele visie op beveiliging (on-premise is het beste) laten varen, en het beheer van hun belangrijkste applicaties overdragen aan een cloudprovider.
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands

Het mysterie van cloudbeveiliging ontrafeld

Published By: Workday Netherlands     Published Date: Aug 07, 2018
Maar executives schrikken er vaak voor terug om informatie buiten de onderneming te verplaatsen. Zij geloven - ten onrechte - dat hun IT-personeel het beste in staat is om gevoelige informatie te beveiligen. Voor een succesvolle toekomst moeten CIO’s hun traditionele visie op beveiliging (on-premise is het beste) laten varen, en het beheer van hun belangrijkste applicaties overdragen aan een cloudprovider.
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands

MEMCACHED REFLECTION ATTACKS: A NEW ERA FOR DDoS

Published By: Akamai Technologies     Published Date: Dec 05, 2018
DDoS attack size doubled in early 2018 after attackers discovered and employed a new, massive DDoS reflection and amplification method with the potential to multiply their attack resources by a factor of 500K. The attack vector, called memcached UDP reflection, uses resources freely exposed on the internet — no malware or botnet required.
Tags : 
    
Akamai Technologies

Het mysterie van cloudbeveiliging ontrafeld

Published By: Workday Netherlands     Published Date: Aug 07, 2018
Maar executives schrikken er vaak voor terug om informatie buiten de onderneming te verplaatsen. Zij geloven - ten onrechte - dat hun IT-personeel het beste in staat is om gevoelige informatie te beveiligen. Voor een succesvolle toekomst moeten CIO’s hun traditionele visie op beveiliging (on-premise is het beste) laten varen, en het beheer van hun belangrijkste applicaties overdragen aan een cloudprovider.
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Search      

Add Research

Get your company's research in the hands of targeted business professionals.