cloud as service

Results 276 - 300 of 903Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Nov 12, 2014
With cloud computing usage growing rapidly, the role of I&O must expand to ensure the most effective and efficient use of cloud offerings. These eight steps teach I&O professionals how to act as internal cloud service brokers and facilitate a successful transition to hybrid IT.
Tags : 
hybrid it, cloud enabler, internal cloud service, transition, efficiency
    
NetApp
Published By: Red Hat     Published Date: Mar 11, 2016
When your cloud performs better, so does your business. IT is being challenged to react faster to growing customer demands. So to meet the requirements of their end users, IT organizations are increasingly turning to Infrastructure-as-a-Service (IaaS) private clouds for their ability to swiftly deploy and scale IT infrastructure. But not just any OpenStack® cloud stands up to the demands of a production-scale environment or can meet your performance, scalability, and security standards. Red Hat® Enterprise Linux® OpenStack Platform does, and will help you gain a competitive advantage.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Mar 11, 2016
Innovative and agile IT, as both a strategy and a means of delivering new applications, requires a fundamental shift in processes, applications, and infrastructure. This web book sheds light on the cloud infrastructure and tools required to support agile IT methods and applications and demonstrates why open source technology is the best way to achieve the full benefits of this new, rapid mode of IT service delivery.
Tags : 
    
Red Hat
Published By: Delphix     Published Date: Mar 24, 2015
Cloud deployments are becoming essential to all businesses, but face several challenges: cost, compliance, and agility. Delphix Data as a Service is a scalable and flexible deployment platform enabling organizations to achieve compliance and data management agility, while lowering costs.
Tags : 
    
Delphix
Published By: Delphix     Published Date: May 28, 2015
In a world of privacy regulation, intellectual property theft, and cybercrime, only a masking solution can secure vital data and enable outsourcing, third party analysis, and cloud deployments. Delphix delivers rapid deployment of masked data in minutes, service-based masking of production systems, and the ability to ship masked data across sites, to third parties, and into the cloud, with minimal network footprint.
Tags : 
    
Delphix
Published By: Equinix     Published Date: Oct 27, 2014
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-in—having only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability.
Tags : 
data center, enterprise, cloud, experience, hybrid, performance, strategy, interconnectivity, network, drive, evolution, landscape, server, mobile, technology, globalization, stem, hyperdigitization, consumer
    
Equinix
Published By: CenturyLink     Published Date: Jan 02, 2015
The market for cloud compute infrastructure as a service (a virtual data center of compute, storage and network resources delivered as a service) is still maturing and rapidly evolving. Strategic providers must therefore be chosen carefully.
Tags : 
gartner, magic quadrant, compute infrastructure, storage resources, network resources, strategic providers
    
CenturyLink
Published By: NetApp     Published Date: Jun 01, 2017
The implications of getting your next generation data center strategy wrong can be fatal for a cloud and hosting business. The Fueled by NetApp Consulting team has seen a trend with service providers testing the waters with many different go-to-market strategies due to these high stakes.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: ServiceNow     Published Date: May 21, 2015
Leading technology research firm, IDC, reports customers using ServiceNow’s suite of cloud-based service management solutions are seeing substantial savings and business value for both their IT and business operations. Download this report to learn how ServiceNow is making employees more productive and IT & business processes more efficient by: • Reducing fragmentations of IT and business environments • Automating repeatable processes • Improving service delivery
Tags : 
service management, roi, idc, business operations
    
ServiceNow
Published By: ServiceNow     Published Date: May 21, 2015
Insurance Giant Allstate Corporation, like many companies, found it persistently challenging to maximize the value of the IT services it delivers to employees and customers. So they turned to ServiceNow’s cloud-based IT Service Management(ITSM) solution. Since deployment in 2013, Allstate has levered ServiceNow to: • Improve IT state productivity levels in incident and change management operations • Improve how incident –related data flows through the organization and, ultimately influencing decision making for the better of the business Download this case study to learn more about how ServiceNow transformed Allstate’s IT services.
Tags : 
cloud-based, allstate, servicenow, management solutions
    
ServiceNow
Published By: ServiceNow     Published Date: May 21, 2015
The day-to-day benefits of cloud-based service automation are well-documented. But what can be harder to ascertain is the quantitative benefits, the money saved, and the impact on the company’s bottom line. IDC and Equinix teamed up to crystallize the benefits of true economic benefits of ServiceNow’s IT service automation. Download this report to learn: • The average annual benefits of Service now over five years • The actual time to payback of the ServiceNow investment • The true ROI of ServiceNow
Tags : 
cloud-based, automation, data center, equnix, itsm
    
ServiceNow
Published By: ServiceNow     Published Date: Jul 09, 2015
Leading technology research firm, IDC, reports customers using ServiceNow’s suite of cloud-based service management solutions are seeing substantial savings and business value for both their IT and business operations.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Jul 09, 2015
The day-to-day benefits of cloud-based service automation are well-documented. But what can be harder to ascertain is the quantitative benefits, the money saved, and the impact on the company’s bottom line. IDC and Equinix teamed up to crystallize the benefits of true economic benefits of ServiceNow’s IT service automation.
Tags : 
    
ServiceNow
Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: MobileIron     Published Date: Nov 07, 2018
In recent years, the market for mobile and cloud technologies has completely shifted the behavior of enterprise users. People can now work anywhere, on any device, to access business apps and data from mobile apps and cloud services. Static, perimeter-based security can no longer keep up with all of the endpoints, users, apps, and data that travel far beyond the corporate firewall. Relying on old security approaches like password-only access control is no longer enough to secure this vast mobile-cloud infrastructure — especially since stolen user credentials were the top cause of data breaches in 2017.
Tags : 
    
MobileIron
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. Mimecast’s proven portfolio of cloud-based, security and cyber resilience services for email can be a vital component of any organisation’s Notifiable Data Breaches compliance strategy
Tags : 
    
Mimecast
Published By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
cloud computing, cloud applications, best practices, applications, access management
    
Okta
Published By: Okta     Published Date: Jul 25, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: SAP     Published Date: Jul 18, 2016
The broad shift from on-premises to cloud deployments has begun, and spending on cloud business analytics will grow five times faster than similar on-premises solutions. Read the white paper to learn some of drivers and the roadblocks of cloud-based business analytics solution deployments, and the offerings from SAP in this market.
Tags : 
    
SAP
Published By: NetSuite     Published Date: Feb 17, 2016
The examples that follow illustrate some of the actual challenges that legacy ERP solutions cannot meet. The examples are placed within 5 broad categories of benefits that NetSuite OneWorld customers realised after deploying the cloud-based solution. 1. Standardising business processes and data 2. Omnichannel on a common platform 3. Multiple brands on a common platform 4. Rapid and easy global expansion 5. Managing multicurrency, international business
Tags : 
cloud-based erp, netsuite, software as a service, saas, netsuite oneworld, legacy erp, standardization, omnichannel, multicurrency, small business, finance
    
NetSuite
Published By: AWS     Published Date: Nov 07, 2018
As more enterprises are moving some, if not all of their data and applications to the cloud – cost effectiveness, network performance and security are top of mind. AT&T NetBond for Cloud provides a dynamic, private connect to Amazon Web Services (AWS). Its enhanced infrastructure makes it easier to securely connect applications, platforms, and services. With AT&T NetBond for Cloud, customers are getting a single, end-to-end solution from one provider that allows them to maintain a hybrid environment, meaning that can utilize their current investments in their on-premises infrastructure and strategy. Download this eBook to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands in real-time - How to take advantag
Tags : 
    
AWS
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Resource Library