security infrastructure

Results 351 - 375 of 426Sort Results By: Published Date | Title | Company Name

Optimizing your Data Center

Published By: CDW Vmware     Published Date: Aug 02, 2012
As Tarkett Inc. continued to enjoy years of growth they realized their data center was in dire need of an update. It was strewn across eight locations with aging equipment and limited backup power. Tarkett turned to CDW to update and optimize their data center without affecting day-to-day business.
Tags : 
tarkett, case, study, optimizing, data, center, growth, backup
    
CDW Vmware

The Benefits of Private Clouds

Published By: CDW Vmware     Published Date: Aug 02, 2012
There's a reason why the buzz around cloud computing never seems to die down. Concrete results are replacing the initial hype. Many organizations are taking advantage of private clouds which come with the accessibility of a public cloud and the security of a local server.
Tags : 
data, center, private, cloud, benefits, computing, security, local
    
CDW Vmware

Outgrowing the public cloud-the SaaS Provider case for colocation, with benefits

Published By: Equinix     Published Date: Jul 31, 2012
Learn how the company reduced costs, achieved LAN-speed latency with AWS, increased application performance, and improved customer experience. The added ability to expand to locations not served by public cloud provided added strategic advantage.
Tags : 
equinix, security, colo, lan, speed, latency, badgeville, public
    
Equinix

9 Ways ISVs Need to Meet Customers' Cloud Expectations

Published By: Equinix     Published Date: Jul 31, 2012
This GigaOM Pro paper explores what functions to consider when selecting and working with hosting providers as it relates to the entire value chain of function and performance. Get your complimentary 6-page report now.
Tags : 
gigaom, pro, enterprise, cloud, equinox, availability, security, platforms
    
Equinix

Quest Workspace Desktop Authority

Published By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority ®-part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : 
desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security
    
Dell Software

Leveraging Security Risk Intelligence: The Strategic Value of Measuring Real Risk

Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing
    
Rapid7

Minimizing Cost of Managing Microsoft Endpoints

Published By: Promisec     Published Date: Mar 20, 2012
One of the greatest challenges to enforcing IT security and compliance lies at the endpoints, especially within Microsoft infrastructures. Learn how agentless technology has become mandatory in seeing, analyzing, and fixing Windows endpoint issues.
Tags : 
endpoint, endpoint management, endpoint control, compliance, it compliance, security, security compliance, agentless
    
Promisec

Is Your Infrastructure "Mobile Ready"?

Published By: Dell     Published Date: Mar 02, 2012
Small and medium businesses are increasingly challenged to provide comprehensive security for their mobile infrastructures without sacrificing the productivity it was designed for in the first place. Although no two situations are ever the same, the objective is always the same: protect the data that is so important to your business.
Tags : 
dell, infrastructure, data management, data systems, mobile data systems, it managers, technology, technical support
    
Dell

Security Essentials for Mobile Devices: 10 Tips for Your Company Policy

Published By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : 
mobile devices, smart phones, cybercrime, mobile, policy, cisco, transition, communication
    
Cisco

When "Good Enough" Is Not Good Enough

Published By: Cisco     Published Date: Jan 20, 2012
In this whitepaper, Cisco provides recommendations on a building strategic network to address business needs for today and tomorrow.
Tags : 
ipv6, cisco, transition, communication, migration, security, performance, version 6
    
Cisco

Enterprise Information Management Security Options

Published By: Brainloop     Published Date: Jan 04, 2012
How can IT provide a way for users to share documents without putting the company at risk? This white paper explores collaboration solutions using your current content management, ERP and security infrastructure, as well as a few new ones that might not be on your radar.
Tags : 
brainloop, technology, security, security solutions, infrastructure, access control, security management, security policies
    
Brainloop

Enterprise Cloud Performance Demystified

Published By: Internap     Published Date: Dec 29, 2011
Performance plays a vital role in the success of your online applications and web-based content - whether you are processing millions of transactions, delivering business-critical software or servicing a massive gaming community. Research shows that even one second of delay on a typical website can result in 7% fewer customer conversions. For many businesses, that means lost revenue and damage to their brand. As cloud is becoming an increasingly viable infrastructure choice for enterprise applications, it is essential to select a high-performance cloud service that will support the best possible experience for your end users. Determining the right cloud solution for your needs also necessitates thorough analysis of the level of security, control, customization and support your business requires. In this webcast, thought leaders from Gartner and Internap outline the performance factors that affect your cloud decision-making process and discuss how to optimize your IT Infrastructure to create satisfied end users.
Tags : 
enterprise cloud, cloud computing, technology, cloud solution, application integration, enterprise software
    
Internap

Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions

Published By: NetIQ     Published Date: Dec 08, 2011
"Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions" presented by Garve Hays:
Tags : 
security, breach, management, security management, event, infrastructure, threat, threat detection
    
NetIQ

Security Policy: Five Keys to User Compliance

Published By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management, access control, identity management, internet security
    
Brainloop

Enterprise Information Management Security Options

Published By: Brainloop     Published Date: Nov 09, 2011
This paper advocates that for any document sharing application to genuinely add value, it must augment or complement the organization's existing document security infrastructure.
Tags : 
brainloop, enterprise, information management, security options, technology, business, access control, authentication
    
Brainloop

Shortcut Guide to Business Security Measures Using SSL

Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign
    
VeriSign Authentication Services, now a part of Symantec Corp.

Security & Trust: The Backbone of Doing Business over the Internet

Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : 
security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.

Why You Need to Think Mobile

Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report to find out how technology professionals rate factors like security, integration with existing infrastructure, ease of use, etc.
Tags : 
dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless
    
Dell Mobility

Federal Roadmap to Your Cloud

Published By: VMware     Published Date: Sep 13, 2011
Federal datacenters, which house an enormous wealth of legacy assets, are the primary targets for agencies evaluating different cloud computing approaches. When agencies begin their journey to the cloud with virtualization-an IT transformation starting point that preserves existing investments-they realize significant agility, cost and security benefits. Federal IT leaders are deploying VMware cloud infrastructure solutions to meet these new directives.
Tags : 
vsphere, vmware, storage, vsa, cluster service, technology, storage, clustering
    
VMware

A Practical Approach to Authentication in an Evolving Enterprise Environment

Published By: Entrust Datacard     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : 
digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure
    
Entrust Datacard

IT'S ALL ABOUT SECURITY: THINGS TO KNOW BEFORE YOU OPEN THE DOORS TO SMARTPHONES

Published By: SAP     Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
Tags : 
sap, security, smartphones, tablets, productivity, mobility, security configuration, security enforcement
    
SAP

Building Your Backup and Disaster Recovery Plan

Published By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011
Protecting data is becoming more and more important and new technologies are making backup and recovery strategies more viable to smaller businesses. Now is the time to create an effective BDR plan or review one already in place - before disaster strikes.
Tags : 
storagecraft, recovery, backup, cloud, strategies, smb, protection, security
    
StorageCraft® Technology Corporation

Data Protection and Backup: Questions to Consider When Creating Your Disaster Recovery Plan

Published By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011
When it comes to data protection and recovery, many businesses are not as safe as they believe. Read on to find out what you should consider when creating your backup and disaster recovery plan.
Tags : 
storagecraft, recovery, backup, cloud, strategies, smb, protection, security
    
StorageCraft® Technology Corporation

Intel Premier IT Professionals Virtual Event: IT Therapy Creating Beautiful Relationships

Published By: Intel     Published Date: Jun 10, 2011
Join Intel IT leaders and participating companies HP, Lenovo, Absolute Software, Citrix, and Symantec for a morning packed with the latest technology, expert advice and demos.
Tags : 
business technology, intel, cloud, data, client security, desktop virtualization, kvm, encryption
    
Intel

Addressing Security Challenges in your Virtual Desktop Infrastructure

Published By: TrendMicro     Published Date: May 09, 2011
Download this paper to learn how the right endpoint security for virtual desktops will help your enterprise achieve cost and efficiency advantages from virtual desktops.
Tags : 
trendmicro, endpoint security, virtual desktop infrastructure, vdi, infrastructure, internet security, security management, desktop management
    
TrendMicro
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.