appliance

Results 1 - 25 of 386Sort Results By: Published Date | Title | Company Name

The Cost of Using the Public Cloud

Published By: Dell EMC     Published Date: Apr 18, 2017
In this report we’ll explore comparing the cost of an on-site hyperconverged solution with a comparable set up in the cloud. The on-site infrastructure is a Dell EMC VxRailTM hyperconverged appliance cluster and the cloud solution is Amazon Web Services (AWS).
Tags : 
cost, cloud, hyperconverged, hyperconverged infrastructure, aws, amazon web services, dell emc
    
Dell EMC

"Assessing Deduplication 2.0, HP's Second-Generation StoreOnce Deduplication Appliance"

Published By: Intel Corp.     Published Date: Aug 08, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.
Tags : 
assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance, efficiency, data, storage, backup, storage, it management, data management, bandwidth management, grid computing, infrastructure, internetworking hardware, server hardware
    
Intel Corp.

10 MINUTE GUIDE: SAM and The Software Catalog

Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management, collaboration
    
CDW

10 questions to ask before you buy an anti-spam solution

Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Tags : 
watchguard technologies, anti spam, security, tco, xcs, anti-phishing, data loss prevention, encryption, email security appliances, anti spyware, anti virus, email security, phishing, data protection
    
WatchGuard Technologies

2015 Gartner Magic Quadrant for Intrusion Prevention Systems (IPS)

Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM Security as a leader in providing Intrusion Prevention Systems (IPS) appliances in the newly published Gartner Magic Quadrant for IPS technology.
Tags : 
ibm, security, network protection, ibm security network protection, intrusion prevention systems, ips, gartner, networking, enterprise applications, business technology
    
IBM

30 minutes to a more secure enterprise

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA

30 minutes to a more secure enterprise

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
security, opendns, cisco
    
Cisco Umbrella EMEA

5 Fallstricke, die Sie bei Ihrer Datensicherungsstrategie vermeiden sollten

Published By: Veritas     Published Date: Oct 03, 2016
Dieses Whitepaper fasst zusammen, warum Backup- und Wiederherstellungslösungen dringend modernisiert werden müssen und beschreibt wichtige Anforderungen an mögliche Lösungen sowie den einzigartigen Funktionsumfang der Veritas NetBackup™-Appliances für eine einfache, vollständige und kostengünstige Lösung.
Tags : 
    
Veritas

5 pièges à éviter dans votre stratégie de protection des données

Published By: Veritas     Published Date: Oct 03, 2016
Contenu du livre blanc : les tendances qui ont fait de la modernisation de la sauvegarde et récupération une priorité urgente ; examen des besoins clés qui conduisent à envisager des offres de solutions ; récapitulation des fonctionnalités exclusives qui permettent aux appliances Veritas NetBackup™ de constituer une solution simple, complète et rentable.
Tags : 
    
Veritas

5 Reasons to Choose a Converged Appliance Designed for Remote Offices

Published By: Dell EMC     Published Date: May 12, 2016
A remote or branch office is very different from a traditional data center. It needs converged appliances that offer manageability, performance, flexibility, and a unique form factor.
Tags : 
    
Dell EMC

5 Reasons to Switch from Custom Code to Appliances for Integration Projects

Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had just two choices for their integration needs, complex and expensive platforms like EAI or write custom code. Learn about the "hidden costs" of custom code and discover five reasons why companies are switching to Integration Appliances that use a simple “configuration, not coding” approach to integration.
Tags : 
integration, enterprise application integration, eai, application integration, castiron, cast iron, enterprise applications, business integration, data integration
    
Cast Iron Systems

5 Simple Solutions for Developing a Collaborative Endpoint Security

Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs, endpoint security, end point security, security hardware, kace, security, internet security, security management, data quality, desktop management
    
KACE

5 Trends That Will Impact Your IT Planning in 2012

Published By: Dell     Published Date: Jul 30, 2012
This Executive Brief is one of five installments in this series that will examine trends you need to include in your IT planning in 2012.
Tags : 
disaster recovery, integrated management, service mangement, cloud computing, deskto virtualization, multivendor solutions, virtual appliances, virtualization, it planning, it strategy, windows 7, dell, dpack, vcenter, vmware, networking, service management, business technology, data center
    
Dell

6 Ways to Make Your Security Stack Work Harder

Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
The average company uses more than 50 security vendors. Firewalls, Web proxies, SIEM, Appliances & Third-party intelligence. The list goes on — and sometimes you still find your stack coming up short when it comes to securing users anywhere they access the internet. Strengthening your security stack doesn’t mean a massive overhaul or a loss of customization and control. Check out these 6 ways to amplify and extend your stack with cloud security from Cisco Umbrella.
Tags : 
    
Cisco Umbrella EMEA

6 Ways to Make Your Security Stack Work Harder

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
    
Cisco Umbrella EMEA

7 Critical Considerations for Choosing a Cloud Security Provider

Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies

7 Sieben wichtige Überlegungen bei der Wahl eines Cloudsicherheitsanbieters

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Cloud ist ein Servernetzwerk, das Daten, Software und Services umfasst. Auf Clouddienste wird für gewöhnlich über das Internet, und nicht lokal in einem Rechenzentrum, zugegriffen. Wenn es um Cybersicherheit geht, verlassen sich immer mehr Unternehmen auf die Cloud. Die zwei Hauptgründe: 1. Aufgrund der sich ständig ändernden Bedrohungslandschaft wird immer mehr Umfang, Genauigkeit, Erfahrung und kollektive Intelligenz benötigt. Diese Anforderungen können die meisten Unternehmen intern nicht erfüllen. 2. Lokale Appliances und Unternehmensrechenzentren haben prinzipiell ihre Grenzen, wenn es um Abwehrmechanismen gegen DDoS- (Distributed Denial of Service) und Webangriffe geht.
Tags : 
    
Akamai Technologies

A competitive review of SOA Appliances

Published By: IBM     Published Date: May 22, 2013
SOA appliances have matured considerably over the last few years. As they have established themselves more firmly in the SOA landscape, vendors have developed a better understanding of requirements, resulting in a level of commonality in some of the key underlying functions such as providing a secure gateway for accessing SOA services.
Tags : 
soa, ibm, soa appliances, software, requirements, quality assurance, service oriented architecture
    
IBM

A Great Use Of The Cloud

Published By: Teradata     Published Date: May 02, 2017
A Great Use of the Cloud: Recent trends in information management see companies shifting their focus to, or entertaining a notion for the first time of a cloud-based solution. In the past, the only clear choice for most organizations has been on-premises data—oftentimes using an appliance-based platform. However, the costs of scale are gnawing away at the notion that this remains the best approach for all or some of a company’s analytical needs. This paper, written by McKnight Consulting analysts William McKnight and Jake Dolezal, describes two organizations with mature enterprise data warehouse capabilities, that have pivoted components of their architecture to accommodate the cloud.
Tags : 
data projects, data volume, business data, cloud security, data storage, data management, cloud privacy, encryption, security integration
    
Teradata

A New Age of Messaging for the Connected Hybrid Enterprise

Published By: IBM     Published Date: Dec 15, 2016
Join this webcast to learn how IBM messaging solutions, like the IBM MQ Appliance and IBM Message Hub, can help your business make the most of all its opportunities, in the cloud and on-premise, and anywhere in between.
Tags : 
ibm, middleware, ibm mq appliance, ibm message hub, enterprise applications
    
IBM

Achieving Configuration Compliance in a Regulatory Framework

Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency, secure computing, securecomputing, vulnerability management
    
Secure Computing

Achieving the Promise of VDI with Hyper-Converged Appliances From VCE

Published By: EMC Converged Platforms     Published Date: Feb 17, 2016
This solution brief describes how VxRail Appliances are the easiest, fastest, most affordable way to implement a VDI infrastructure.
Tags : 
vce, vdi, hyper converged appliances, solution brief, vdi infrastructure, networking, security, it management, enterprise applications
    
EMC Converged Platforms

Anti-Spam Solutions - Jan 09: Comparative Testing: Appliances, Software and Hosted Service Solutions

Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
West Coast Labs performed a comparison test on a range of email solutions (appliances, software, and hosted service solutions) to measure their relative spam detection rates over a series of at least 100,000 genuine spam emails using West Coast Labs real-time spam feed.
Tags : 
saas, trend, trend micro, websense, barracuda, anti-spam, antispam, spam filter service, spam filter for exchange, hosted antispam, managed antispam, enterprise anti-spam, mcafee, ironport, fortinet, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS

Aplicación de recuperación con pérdida nula de datos (Zero Data Loss Recovery Appliance) de Oracle

Published By: Oracle     Published Date: Mar 09, 2017
En este estudio, IDC trata el tema de las dificultades inherentes asociadas a los planes tradicionales de copia de seguridad de los datos y la dinámica cambiante de las estrategias de protección de datos.
Tags : 
    
Oracle

Appliances vs. Agents for XML Web Services Security

Published By: Reactivity     Published Date: Aug 21, 2009
Security is one of the main issues when deploying Web services in the enterprise. This white paper discusses the advantages of an appliance over an agent-oriented architecture for Web services security, how cross platform interoperation is immediate with a hardened appliance, and why web services security is different from web server security.
Tags : 
network architecture, quality assurance, xml, web service management, web service, web service security, web services security, security appliance, security hardware, appliance, reactivity, software development
    
Reactivity
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.