multi point

Results 26 - 50 of 130Sort Results By: Published Date | Title | Company Name

Advanced Malware Protection: A Buyer’s Guide

Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco

Improving SaaS Performance Using SD-WAN: Use case scenario

Published By: Cisco     Published Date: Dec 11, 2018
The Cisco SD-WAN solution is a cloud-delivered overlay WAN architecture that enables digital and cloud transformation at enterprises. It significantly reduces WAN costs and time to deploy new services, and, builds a robust security architecture crucial for hybrid networks. Enterprises today face major user experience problems for SaaS applications on account of networking problems. The centralized Internet exit architecture is inefficient and results in poor SaaS performance. And branch sites are running out of capacity to handle Internet traffic which is a concern because more than 50% of branch traffic is destined to the cloud. More importantly there are many dynamic changes in Internet gateways and the SaaS hosting servers that lead to unpredictability in performance. The Cisco SD-WAN solution solves these problems by creating multiple Internet exit points, adding high bandwidth at branch locations, and dynamically steering around problems in real-time, resulting is an optimal SaaS
Tags : 
    
Cisco

Proven VPN WAN—Technology Design Guide

Published By: Cisco Systems     Published Date: Dec 23, 2013
Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology. Download Design Guide
Tags : 
vpn, wan, cisco, cisco validated designs, cvds, remote-site user performance, full-service network, encrypted communications
    
Cisco Systems

Key considerations for delivering secure unparalleled remote access

Published By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
    
Citrix Systems

Modern, Web-Scale Data Protection for the Cloud Era

Published By: Cohesity     Published Date: Apr 24, 2018
In today’s application driven, cloud agnostic world, many organizations still rely on legacy, multiple point backup and recovery products that consist of backup software, target storage, media and master servers, and cloud gateways, all from different vendors. With slow backups and long recovery times of their existing backup products, organizations are unable to meet their tight business SLAs. Constant forklift upgrades and complex management UIs make it expensive to manage the current backup and recovery environments.
Tags : 
    
Cohesity

Solution Brief: Modern, Web-Scale Data Protection for the Cloud Era

Published By: Cohesity     Published Date: May 04, 2018
In today’s application driven, cloud agnostic world, many organizations still rely on legacy, multiple point backup and recovery products that consist of backup software, target storage, media and master servers, and cloud gateways, all from different vendors. With slow backups and long recovery times of their existing backup products, organizations are unable to meet their tight business SLAs. Constant forklift upgrades and complex management UIs make it expensive to manage the current backup and recovery environments. There has to be a simpler, more cost-effective way to keep your data safe. This is the problem that Cohesity is designed to solve, with an entirely new approach to data protection. Download this solution brief to learn more about Cohesity and its advantages!
Tags : 
    
Cohesity

Case Study: UCSB Consolidates Their Data Protection on Cohesity's Single, Web-Scale Platform

Published By: Cohesity     Published Date: Oct 02, 2018
The University of California, Santa Barbara (UCSB) is a public research university and one of the 10 campuses of the University of California system. Its secondary storage was a combination of multiple point solutions. The UI/setup and maintenance was complex. Maintaining multiple licensing and maintenance agreements negatively impacted the administrative cost. The skyrocketing cost for additional backup capacity limited the team’s ability to expand their backup protection to many critical systems. With Cohesity's unified hyperconverged secondary storage platform, the IT team provided a single solution for all 13 departments to consolidate their backups on one platform, and scale-out as required. Read the case study and get details on how UCSB consolidated everything from backup to recovery, analytics to monitoring and alerting.
Tags : 
case, study, ucsb, consolidates, data, protection, cohesity, hyperconverged
    
Cohesity

White Paper: Solve Hybrid Cloud Challenges for Secondary Data and Apps

Published By: Cohesity     Published Date: Nov 20, 2018
Today, hybrid cloud is increasingly the norm, and enterprises are challenged with ways to have visibility, manage and make use of all this data – both on-premises and in the cloud. While much attention has been given to primary data affecting mission-critical workloads, data for secondary workloads – backup, test/dev, disaster recovery, and archiving to name a few – have become siloed the same way application data has, leading to multiple point solutions to manage an increasing amount of data. This white paper looks at the evolution of these challenges and offers practical advice on ways to store, manage and move secondary data in hybrid cloud architectures while extracting the hidden value it can provide. Download to learn more.
Tags : 
    
Cohesity

Solve Hybrid Cloud Challenges for Secondary Data and Apps

Published By: Cohesity     Published Date: Aug 09, 2019
Data for secondary workloads – backup, test/dev, disaster recovery, and archiving to name a few – have become siloed the same way application data has, leading to multiple point solutions to manage an increasing amount of data. This white paper looks at the evolution of these challenges and offers practical advice on ways to store, manage and move secondary data in hybrid cloud architectures while extracting the hidden value it can provide.
Tags : 
    
Cohesity

7 Benefits You Realize with a Holistic Data Protection Approach

Published By: Commvault     Published Date: Jul 06, 2016
Think of a wildfire that quickly spreads as it increases in speed and power. That is what is happening today as data growth increases the volume and management complexity of storage, backup and recovery. Now think of trying to stop that fire with a garden hose. Your traditional backup and recovery process is equally under-equipped to manage and facilitate operations that need more speed, efficiency, scalability and reliability to handle today’s 24/7, always-on environment. Here we examine the benefits of moving from a solution comprised of multiple point products to a holistic data protection platform designed to serve today’s enterprise.
Tags : 
commvault, data protection, storage, backup, recovery, holistic data protection, singe pane of glass, common code base
    
Commvault

Enterprise Networks - 8 Critical Questions to Ask before Buying

Published By: CompareBusinessProducts     Published Date: Dec 03, 2010
Creating Your Needs Analysis First. When buying networking equipment: routers, switches, firewalls, and network management solutions for your company or organization, it's essential to create a needs analysis first, so that you make the right decisions from multiple standpoints
Tags : 
comparebusinessproducts, enterprise networks, network management, firewall, scalability, infrastructure, security, network security
    
CompareBusinessProducts

Create the future of transportation and mobility experience

Published By: Dassault Systèmes     Published Date: May 09, 2018
Technology is transforming mobility and vehicle ownership. To be a game-changer in the transportation and mobility market, organizations must anticipate customer expectations and deliver compelling experiences. • Help my customers experience the future: Digitization, VR and interactive experiences show consumers benefits before they are on the road. • Give my customers enhanced levels of customization: Vehicle personalization transforms a product purchase to a multi-dimensional experience. • Streamline my product development processes: Innovation increases product diversity while reducing development time and costs. • Keep me up to speed with new mobility solutions: Organizations must be open to change in imagining how to go from point A to B. • Prepare me for the shift to Mobility as a Service: MaaS is already affecting transportation and pressuring margins for conventional car manufacturers. I invite you to download your targeted industry analysis and uncover the expectations to tak
Tags : 
    
Dassault Systèmes

Multi-Path I/O - End to End High Availability and Performance

Published By: Dell Storage     Published Date: Jan 16, 2009
Most storage devices support multiple SAN connections for performance and reliability, but in many configurations servers use only a single storage connection. This creates a single point of failure and potential performance bottleneck for I/O. Multipath Input/Output (MPIO) is server software that extends redundancy to the entire I/O pathway in a SAN, delivering fault tolerance, high availability, and better performance.
Tags : 
dell, san connections, storage area networks, configuration servers, mpio, multipath input/output, storage, iscsi
    
Dell Storage

Self-Tuning Disk Drives Eliminate Performance Bottlenecks and Heighten ROI

Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
The size of today’s hard drives boggles the mind. Coupled with this surge in disk capacity is an explosion in file sizes. And multi-MB PowerPoints, MP3s and PDFs litter the hard drive. The problem is that drive I/O speed has not kept up the pace. As a result, it has developed into a serious bottleneck in system performance.
Tags : 
defrag, defragment, defragmentation, pc performance, disk performance, system performance, pc maintenance, diskeeper
    
Diskeeper Corporation

Maximize the Savings of Call Center Multi-Sourcing (While Protecting Service Levels)

Published By: Echopass     Published Date: Sep 07, 2007
Not all companies that have adopted multi-sourcing have realized the expected levels of savings.  A single over-arching problem is often the cause when multi-sourcing delivers disappointing results in service and/or savings.
Tags : 
multi-sourcing, call center outsourcing, remote agents, disaster prevention, ip call center, ip contact center, contact center solutions, contact center software
    
Echopass

Entrust IdentityGuard Cloud Services Smart Credentials: Multiuse Smartcards, USB Tokens & Mobile

Published By: Entrust Datacard     Published Date: Jul 21, 2014
One of the most secure and simple-to-use methods for strong authentication is achieved via multipurpose smartcards. Unfortunately, many smartcard solutions require too many point products, are complex and place a heavy burden on IT.
Tags : 
identity guard, cloud service, smart credentials, authentication, multipurpose, technology, usb token, mobile
    
Entrust Datacard

Accelerate Cloud App Adoption without Compromising Security

Published By: Forcepoint     Published Date: Jul 30, 2019
How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint

Accelerate Cloud App Adoption without Compromising Security

Published By: Forcepoint     Published Date: Oct 03, 2019
Accelerate Cloud App Adoption without Compromising Security How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint

The Pragmatic Path to Achieving NAC Results: Essential Implementation, Process and Control

Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data
    
ForeScout

eBook: 7 Steps for Delivering Next-Generation Digital Customer Service

Published By: Genesys     Published Date: Feb 27, 2018
Modern contact centers support a variety of digital channels—email, chat, co-browsing, social, video—over multiple digital touchpoints (web or mobile devices). What they lack is the ability to link interactions in a step-by-step journey to provide a personal, contextual experience for each customer. Download this eBook. Learn how you can: • Design a successful digital customer engagement strategy • Provide agents with a 360-degree view of the customer across all digital channels and voice • Deliver omnichannel experiences that are personalized, context-based, and low-effort
Tags : 
digital customer service, contact center, digital channel, ebook
    
Genesys

Gartner MQ for CPQ

Published By: Google - SAP     Published Date: Nov 01, 2019
"SAP has been ranked a leader in the latest Gartner Magic Quadrant for Configure, Price and Quote Application Suites (Nov 2018). According to Gartner, SAP is a Leader due to its comprehensive, integrated quote-to-cash suite, which includes lead generation, lead management, sales performance management and contract life cycle management. CallidusCloud was acquired by SAP in April 2018 and is now offered as a component of SAP Sales Cloud. SAP’s CPQ capabilities are built on .NET and offered as a multitenant SaaS solution. Key Quotes & Commentary: CRM solution integration: SAP CPQ integrates with Salesforce Sales Cloud, Microsoft Dynamics 365, SAP Hybris Sales Cloud, Netsuite and SugarCRM. This is a key point as it calms any potential fears customers might have about the openness of SAP’s Sales Cloud. Multichannel support: SAP CPQ supports direct sales, resellers and customer self-service channels with a comprehensive set of features. AI/Machine Learning. Product recommendation
Tags : 
    
Google - SAP

Gartner MQ for CPQ

Published By: Google - SAP     Published Date: Nov 13, 2019
Configure, price and quote (CPQ) application suites enable sales organizations to streamline and optimize the creation of quotes and orders for complex, configurable products or services. CPQ application suites exist within a larger ecosystem enabling the quote-to-cash business process. Leading CPQ solutions support the: Selection of products Configuration of products Pricing of products Creation and negotiation of quotes Capture of orders across multiple channels of customer interaction Most CPQ solutions support multiple channels. Those channels include direct sales, the contact center, points of sale, resellers and customer self-service. Gartner clients consistently request cloud solutions when evaluating CPQ vendors and their offerings. Consequently, the CPQ vendors included in this Magic Quadrant all offer cloud-deployed solutions that provide out-of-the-box support for sales force automation integration, product selection, configuration of options, pricing and proposal generation
Tags : 
    
Google - SAP

Grow Your IoT Security Business by Investing in Real-Time Discovery, Visibility and Control

Published By: Great Bay Software     Published Date: Jan 04, 2018
By 2020 Gartner estimates the proliferation of IoT with a market installed base of 20.4 billion endpoint devices, comprised of both "smart" and "dumb" devices, each leveraging multiple communication types. As each of these devices can become a target entry point for hackers, endpoint and network visibility is a top concern for CISOs responsible for security and risk management.
Tags : 
iot, iot security, iot endpoint security, gartner
    
Great Bay Software

IBM Sterling Secure File Transfer Guided Demo

Published By: Group M_IBM Q4'19     Published Date: Oct 25, 2019
IBM Sterling Secure File Transfer Demo - simplify and scale your file transfers Companies of all sizes in every industry are extremely reliant on file transfer as an essential infrastructure to power business. In fact, 55% of all systems integration is still done through file transfer.? IBM Sterling Secure File Transfer is a battle-tested platform that secures and simplifies scalable file-based transactions. In a single offering, you can: • Automate inbound and outbound file transfer across multiple protocols so you can partner with anyone, anywhere. • Handle your most demanding workloads with reliable, point-to-point file transfers. • Gain full end-to-end visibility and governance to help you meet your service level agreements. • Protect your brand reputation and comply with tightening regulations.
Tags : 
    
Group M_IBM Q4'19

Optimize on-demand delivery routes with real-time, predictive and historical data

Published By: HERE Technologies     Published Date: Mar 06, 2019
On-demand companies rely on fast, accurate and robust mapping and location technologies to provide their users with a superior experience. Find out how real-time, predictive and historical traffic data can be applied to traffic-enabled routing algorithms to influence route calculations and automatically plot multiple routes with waypoints sequencing. Discover how HERE can help you communicate updated ETAs and provide an optimized experience to your drivers and customers.
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.