suse

Results 1 - 25 of 51Sort Results By: Published Date | Title | Company Name

Enhance the Availability & Performance of SAP HANA Apps

Published By: AWS     Published Date: Oct 30, 2018
Enhance the Availability & Performance of SAP HANA Apps Abstract: SAP HANA delivers powerful analytics capabilities that can help you improve business performance and drive digital transformation. You can more easily build reliable and performant SAP HANA-powered landscapes with SUSE Linux Enterprise Server for SAP Applications and Amazon Web Services (AWS). That’s because SUSE can help you achieve near zero downtime and sustain high-performance levels, while AWS delivers a broad and deep set of cloud services that are certified to fulfill the compute, memory, and storage requirements of SAP HANA.
Tags : 
availability, performance, sap, hana, apps
    
AWS

Accelerate And Modernize Container Application Delivery With SUSE

Published By: AWS     Published Date: Jun 04, 2019
Description Organizations are shifting to containers for its many benefits, including increased developer productivity and an improved, modernized environment for customized applications. While Kubernetes helps organizations get the most out of those benefits, it is complex by nature and can be difficult to manage on your own. Developers need a solution that drives productivity without needing to worry about managing infrastructure. SUSE Cloud Application Platform on Amazon Web Services (AWS) provides a lean and fast platform to accelerate containerized application delivery. By leveraging a managed Kubernetes environment, SUSE makes it easier for DevOps teams to deliver applications, accelerate innovation, and improve IT responsiveness.
Tags : 
    
AWS

Privileged Access Threat Report 2019

Published By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they can’t rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely they’ve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrust’s annual Privileged Acces
Tags : 
    
BeyondTrust

How to Kill Agility: Nine Metrics Mistakes

Published By: CA Technologies     Published Date: Nov 02, 2016
Effective metrics and measurements are critical to running a high performance business. Properly applied, they lead you to better insights, better decisions and better business outcomes. They provide feedback to spark improvement and create learning opportunities. They help you identify the right outcomes that drive you toward your business goals. Unfortunately, many businesses misuse these powerful tools in ways that actively destroy the agility they seek to create. In this paper, we highlight nine mistakes organizations make involving agile measurement at enterprise scale—and how to do it right.
Tags : 
    
CA Technologies

Enterprise Data Security: The Basics Of User Behavior Analytics

Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies

Enterprise Data Security: The Basics of User Behavior Analytics

Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies

Are You GDPR Ready? Get the Vanson Bourne Readiness Survey Results Right Here

Published By: CA Technologies     Published Date: Sep 13, 2017
"GDPR, the General Data Protection Regulation has just been signed into law and enacts new rules and stiff penalties for any company who misuses or loses European Union (EU) citizens’ personal data. This sweeping legislation has expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across development and testing environments. Test data management, the process of obtaining and distributing test data for development teams, takes on greater urgency as the GDPR deadline looms. Solid test data management practices will be key to overcoming compliance roadblocks and avoiding huge fines associated with GDPR. Utilizing new ways in which test data can be generated, distributed and managed will be pivotal role to meeting this regulation. In this webcast, Vanson Bourne and CA will present the results of their highly anticipated GDPR readiness survey of 200 corporations in North American and the UK. Join us to learn more about: •Th
Tags : 
    
CA Technologies

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies

Enterprise Data Security: The Basics of User Behavior Analytics

Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies

CA Threat Analytics for PAM

Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
    
CA Technologies EMEA

How Your Trusty Office Printer Can Put Your Legal Files At Risk

Published By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices… It’s hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America

CEO Disconnect is Weakening Cybersecurity

Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation

The Forrester New Wave™: Enterprise Container Platform Software Suites, Q4 2018

Published By: Docker     Published Date: Feb 21, 2019
Why Read This Report In Forrester’s evaluation of the emerging market for enterprise container platform (ECP) software suites, we identified the eight most significant providers in the category — Docker, IBM, Mesosphere, Pivotal, Platform9, Rancher Labs, Red Hat, and SUSE — and evaluated them. This report details our findings about how well each vendor scored against 10 criteria and where they stand in relation to each other. Enterprise architects can use this review to select the right partner for their enterprise container platform needs.
Tags : 
migrate applications, containerization, application development, digital transformation, microservices, modernization, cloud computing, hybrid cloud, application security
    
Docker

Avoid the 3 Data Hazards of Enterprise Risk

Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Complexity, globalization and digitalization are just some of the elements at play in the risk landscape—and data is becoming a core part of understanding and navigating risk. How do modern finance leaders view, navigate and manage enterprise risk with data? Dun & Bradstreet surveyed global finance leaders across industries and business types. Here are the top trends that emerged from the study: 1. The Enterprise Risk & Strategy Disconnect—Finance leaders are using data and managing risk programs, but over 65% of finance leaders say there’s missing link between risk and strategy. 2. The Risks of the Use and Misuse of Data—Up to 50% of the data used to manage modern risk is disconnected. Only 15% of leaders are confident about the quality of their data. 3. Risky Relationships—Only 20% of finance leaders say the data they use to manage risk is fully integrated and shared. Download the study to learn how finance leaders are approaching data and enterprise risk management
Tags : 
    
Dun & Bradstreet

Protecting Backup Media with AES Encryption

Published By: EMC     Published Date: Nov 06, 2006
Offsite media can be lost or stolen while in transit, exposing sensitive information to potential misuse. By using AES encryption on backup data, a business can feel confident that sensitive customer information will remain safe and secure, even if the backups tapes are lost of stolen.
Tags : 
disaster plan, encryption, disk backup, tape backup, offsite storage, offsite, off-site, backup data, data backup, aes encryption, data protection, emc, emc insignia, storage, backup and recovery
    
EMC

Optimize Retail Operations and Lower Costs by Enhancing Your Use of IT

Published By: IBM     Published Date: Feb 08, 2008
Point of service is the key to every retail operation. But with e-mail marketing, in-store/self-service kiosks and more, the definition of point of service is changing. These changes create a unique opportunity to utilize advanced technologies to improve the customer experience. The IBM Retail Environment for SUSE LINUX (IRES) is designed to help retailers do just this -- while generating higher profits.
Tags : 
pos, point of service, tco, marketing, customer experience, increase sales, profitability, retail, cost control, ibm, marketing automation, sales automation, customer experience management, spend management
    
IBM

Unix, Linux Uptime and Reliability Increase; Patch Management Woes Plague Windows

Published By: IBM     Published Date: Jun 02, 2009
Linux reliability has come of age. Several major Linux distributions including Novell SUSE, Red Hat Enterprise Linux and Ubuntu scored high in reliability, improved over 2006 uptime statistics and achieved near parity with Unix distributions. Security incidents plagued Windows Server 2003, which saw uptime decrease by roughly 10% during last year. Corporations must continue to adhere to best practices in configuration, management and security to ensure optimal server operating system and application reliability.
Tags : 
reliability, uptime, performance, management, service-level agreement, sla, compliance, linux, unix, ibm, red hat enterprise linux, rhel, ubuntu, debian, real-time resources, smbs, small and medium businesses, operating system, total cost of ownership, tco
    
IBM

SUSE Linux Enterprise Server on the IBM PureFlex System

Published By: IBM     Published Date: Jan 09, 2014
The SUSE Enterprise Linux Server, now on the IBM PureFlex System, provides an open, reliable and secure IT environment with faster deployment, better business agility, lower power consumption, better hardware utilization and lower total cost of ownership.
Tags : 
suse enterprise, linux, ibm, enterprise, pureflex system, linux enterprise, open virtualization, mission critical, security, storage, data management, business technology, virtualization, cloud computing, infrastructure
    
IBM

Bon-Ton Stores: Maximizing Peak Capacity; Minimizing Stack Costs

Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail
    
IBM

Bon-Ton Stores: Maximizing Peak Capacity; Minimizing Stack Costs

Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail, application performance management, business analytics, business intelligence, customer experience management
    
IBM

Taking Linux and the Open Community to New Heights

Published By: IBM     Published Date: Jul 07, 2016
Listen to videos with WIRED Editor Jim Daily and technology experts from The Linux Foundation, Canonical/Ubuntu, SUSE, The Met Office and IBM as they discuss how the latest hybrid cloud infrastructure technology and the best of Linux and open source can yield business innovation and growth.
Tags : 
ibm, linux, ibm linuxone, open source, open solutions, enterprise applications
    
IBM

Building an Enterprise Linux Solution: SUSE & Power Systems

Published By: IBM     Published Date: Jul 07, 2016
With SUSE Linux Enterprise Server on IBM Power Systems, you gain the benefits of the latest generation of Enterprise Linux OS with the power and reliability of IBM hardware. This combination provides the performance and flexibility to run the most demanding business-critical workloads.
Tags : 
ibm, ibm power systems, suse, suse linux enterprise server, linux, ibm hardware, open source, knowledge management
    
IBM

SUSE Enterprise Linux Server and IBM Power Systems: Making the Leap to Open Source

Published By: IBM     Published Date: Jul 07, 2016
Open-source is becoming an increasingly critical component being leveraged by agile enterprises. The capital investment required to develop next generation business solutions demands that components be built and targeted to the platform best suited for the task. Understanding the tools available for you or your developers to gain efficiencies to build solutions once, and deploy on a choice of scalable and reliable platforms is of paramount importance.
Tags : 
ibm suse, suse enterprise linux server, linux, ibm power systems, open source, agile, knowledge management
    
IBM
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.