secure data platform

Results 1 - 25 of 50Sort Results By: Published Date | Title | Company Name

2018 Gartner Magic Quadrant for Full Life Cycle API Management

Published By: Google Apigee     Published Date: Jun 08, 2018
A must-read for IT professionals that provides a comprehensive analysis of the API management marketplace and evaluates 22 vendors across 15 essential criteria. APIs are the de-facto standard for building and connecting modern applications. But securely delivering, managing and analyzing APIs, data and services, both inside and outside an organization, is complex. And it’s getting even more challenging as enterprise IT environments grow dependent on combinations of public, private and hybrid cloud infrastructures. Choosing the right APIs can be critical to a platform’s success. Likewise, full lifecycle API management can be a key ingredient in running a successful API-based program. Tools like Gartner’s Magic Quadrant for Full Life Cycle API Management help enterprises evaluate these platforms so they can find the right one to fit their strategy and planning. Apigee is pleased to offer you a complimentary copy of the Gartner report. Access in-depth evaluations of API managemen
Tags : 
    
Google Apigee

Boost your Mobile ROI with Powerful Cognitive Insights from IBM MaaS360

Published By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : 
it staff, applications, business data, data security, it managers, endpoint data, device, platforms
    
IBM

Bridging to the cloud: The right database can make the difference

Published By: IBM     Published Date: Jul 06, 2017
In the era of always-on business, enterprises need reliable, secure and consistently fast access at all times. Overlay that with the reality of how organizations combine on-premises systems with cloud-based solutions, and it’s clear that a robust, agile and flexible database platform is mandatory.
Tags : 
reliability, security, consistency, database, platform, access
    
IBM

Bridging to the Cloud: The Right Database Makes the Difference

Published By: IBM     Published Date: Oct 01, 2016
In the era of always-on business, enterprises need reliable, secure and consistently fast access at all times. Overlay that with the reality of how organizations combine on-premises systems with cloud-based solutions, and it’s clear that a robust, agile and flexible database platform is mandatory.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
IBM

Citrix Workspace on Google Cloud Platform

Published By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
Citrix and Google are collaborating to bring the best, most secure way to deliver virtual apps and desktops from Google Cloud. The Citrix Workspace solutions traditionally installed on data center servers—including Citrix Virtual Apps and Desktops, Citrix Networking, and Citrix Content Collaboration (formerly known as Citrix ShareFile)—are now enabled on Google Cloud Platform services. Citrix enables customers to choose the workload deployment option that best aligns with their enterprise cloud strategy and offers a variety of ways to securely deploy Citrix solutions to meet unique application needs. Whether deployed on-premises, cloud-hosted, as a Citrix Workspace service, or with a service provider—customers choose how much and which components of app workloads to manage and when and where to securely deploy business apps, data, and desktops.
Tags : 
    
Cisco and NVIDIA Corporation

Cloud and Data Center Security: Secure Virtual, Cloud, Physical, and Hybrid Environments Easily

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security, networking, it management
    
CDW-Trend Micro

Cloud Native Monitoring at Entrust Datacard with Splunk

Published By: AWS     Published Date: Nov 15, 2018
"To provide trusted identities and secure transactions to your customers, you want a flexible, scalable monitoring solution that offers a unified view on the Amazon Web Services (AWS) cloud. Learn how Entrust Datacard can help your organization quickly identify, resolve, and prevent issues by using a cloud-native platform to deliver seamless customer experiences every time. Watch our on-demand webinar and gain valuable insights into: • How to use a DevOps approach to monitoring • The best practices to scale your monitoring solutions • How Entrust Datacard monitors trace, syslog and metric data from sources like Amazon CloudWatch, Application Load Balancer, and Amazon Aurora"
Tags : 
    
AWS

Comparing Security Across The Three Main Cloud Providers

Published By: CloudHealth by VMware     Published Date: Aug 26, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware

Comparing Security Across The Three Main Cloud Providers

Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware

Considerations for Building a Healthcare Sector Private Optical Network.

Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena

Don’t Settle for AirWatch: Choose the Leader in Mobile Security Innovation

Published By: MobileIron     Published Date: Mar 21, 2017
Over the past few years, organizations have used a variety of tools and technologies to enable basic mobile device management (MDM) and essential apps like email and calendar. But those capabilities are inadequate for companies that want to move beyond the basics and transform their business processes by securely moving apps and data to the cloud. For AirWatch customers, this means they should start evaluating leading enterprise mobility management (EMM) platforms like MobileIron in order to achieve their mobile transformation goals. Our platform is 100% focused on building today’s modern enterprise architecture, which is quickly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services.
Tags : 
    
MobileIron

Emperor II Brochure

Published By: IBM     Published Date: Jun 29, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
IBM

Emperor II Brochure

Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
Group M_IBM Q418

Emperor II Brochure

Published By: Group M_IBM Q119     Published Date: Dec 18, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
Group M_IBM Q119

Finding the Path to Security in the Big Data Landscape

Published By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : 
security, big data, ibm, data protection
    
IBM

Forrester Wave: DMP

Published By: Adobe     Published Date: Nov 09, 2017
Robust Data Management Platforms drive intimate customer experiences. You know the importance of identifying your best customer segments and treating them right. You also know that takes a ton of work. But it’s work that we can help you accomplish with our integrated and secure Data Management Platform (DMP). By using Adobe Audience Manager, our DMP offering, you'll aggregate data from all your sources to better understand your current customer segments, while we also help you identify new audiences to target. The new Forrester Wave™: Data Management Platforms, Q2 2017 says “Adobe was a DMP Forrester Wave leader in 2013 and 2015, and continues to set the pace in this Forrester Wave.” See where we receive the highest scores and why we are named a Leader in this report.
Tags : 
    
Adobe

Front and Center

Published By: Equinix     Published Date: May 28, 2015
This paper illustrates different perspectives on building a secure and flexible data center platform that sustains growth and innovation and delivers a serious competitive advantage.
Tags : 
data center, strategic business advantage, hybrid, technology, it demands, data center platform, equinix, equinix solutions
    
Equinix

How to prevent identity fraud with location intelligence

Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies

HP Haven: Capitalize on Big Data in financial services

Published By: HP     Published Date: Jan 20, 2015
Understanding the data you have and put it to effective use is now more crucial than ever. The key differentiator between the leaders and laggards in financial services today is how skillfully they turn data into useful information and fuel success.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP

HP Haven: Cash in on Big Data -- How HP Haven transforms retail marketing and operations

Published By: HP     Published Date: Jan 20, 2015
Armed with their opinions and social media accounts, your customers have the kind of clout to influence your brand that last century’s ad men only dreamed about. Learn how your organization can securely capture, analyze, and act upon 100 percent of the data available to you.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP

HP Haven: Data driven government -- HP Haven turns Big Data into efficient and effective government

Published By: HP     Published Date: Jan 20, 2015
Today's data landscape brings enormous opportunity to organizations to derive insights from all their data. Learn how government departments, agencies, public healthcare providers, and educational institutions can harness the value of Big Data today.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP

HP Haven: Harvest your Big Data -- Transforming CSPs’ Big Data to knowledge and revenue

Published By: HP     Published Date: Jan 20, 2015
Big Data is an opportunity for CSPs to create the intelligence for operating networks more efficiently, to analyze the success of the services that telcos are offering, and to create a better personal experience for their customers. Learn how to leverage the Big Data opportunity.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP

HP Haven: See the big picture in Big Data

Published By: HP     Published Date: Jan 20, 2015
HP HAVEn is the industry’s first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data and need a trusted partner to help them. HP HAVEn has two primary components: a platform and an ecosystem. Together, the platform and the ecosystem provide the capability to handle 100 percent of your enterprise data—structured, unstructured, and semi-structured—and securely derive actionable intelligence from that data in real-time.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP

HP Haven: See the big picture in Big Data - Know your customers better with targeted merchandise

Published By: HP     Published Date: Jan 20, 2015
There are many new ways Big Data analytics can significantly boost marketing and promotional efforts through real-time and historical analysis of online data, such as clickstream or purchase transactions. Unstructured data based on social media—even photos and video—offers enormous potential when analyzed with the right tools.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP

HP Haven: See the big picture in Big Data -- Create 100% better products

Published By: HP     Published Date: Jan 26, 2015
Knowing how customers use the products and services you provide helps you improve what you offer, which helps you retain more customers, and attract new ones. This vital knowledge requires the analysis of traditional business data, machine data, and human information.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.