critical infrastructure

Results 101 - 125 of 198Sort Results By: Published Date | Title | Company Name
Published By: Solidcore     Published Date: Jan 07, 2008
Identifying critical change control failure points in your infrastructure can help reduce the threat of costly downtime, potential security breaches, and compliance weaknesses. Read this paper for guidelines on how to identify and categorize systems that have characteristics which heighten risk.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, change management, configuration management, solidcore, fortrex, infrastructure, risk management
    
Solidcore
Published By: VMware Dell     Published Date: Jun 05, 2008
Energy consumption is a critical issue for IT organizations today. VMware virtualization gives you the power to right-size your IT infrastructure through server consolidation and dynamic load balancing across a pool of physical servers. Your IT organization can dramatically increase server utilization and reduce energy costs with VMware solutions.
Tags : 
green, environmental, green it, green computing, environmental, energy, servers, server, infrastructure, vmware, virtualization
    
VMware Dell
Published By: Genesys     Published Date: Jul 13, 2018
With artificial intelligence (AI) gaining ground, the right contact center infrastructure (CCI) can be the critical business differentiator for long-term flexibility and scalability. Gartner Research looked at three use cases to evaluate CCI vendors, and Genesys received the highest use case scores (4.16 out of 5) for Customer Engagement Center in Gartner Critical Capabilities.
Tags : 
gartner, contact center, artificial intelligence, infrastructure, crm system
    
Genesys
Published By: Genesys     Published Date: Aug 07, 2018
Our deep integration with CRM systems and support for digital channels enables a single view of the customer that is essential for an organization’s success.
Tags : 
gartner, contact center, artificial intelligence, infrastructure, crm system
    
Genesys
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Focus on Value. “The benefits of agile are multidimensional. But the most important change is that it focuses the entire organization on meaningful delivery to the customer. Instead of relying on indirect metrics describing degrees of our software’s quality and progress ... we ask, ‘What percent of critical functionality is included in this release?’ This emphasis on customerperceived value impacts our entire project life cycle pretty significantly.” Vice President of Infrastructure Management BMC Software.
Tags : 
    
CA Technologies EMEA
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Cloud computing and the "bring your own device" (BYOD) trend will impact the design of future datacenters and their supporting networks. To attain the kind of business agility that companies now demand, network infrastructure needs to provide the flexibility required by cloud application workloads and the changing traffic patterns fostered by BYOD. To make networks more agile, new approaches to network implementation need to be enabled. As these trends continue, application delivery controllers (ADCs) will be critical elements in the new network infrastructure. This Technology Spotlight examines these trends and the role that F5 Networks' integrated scalable platform plays in this strategic market.
Tags : 
f5 networks, idc, cloud, cloud computing, bring your own device, byod, datacenter, network, network infrastructure, infrastructure, application workload, application delivery, application delivery controllers, adc, platform
    
F5 Networks Inc
Published By: Riverbed     Published Date: Mar 23, 2015
Your branch offices are a critical point of productivity and revenue yet come with a tremendous amount of overhead and risk. Branch converged infrastructure combines storage, and networking, and computer.
Tags : 
    
Riverbed
Published By: Indegy     Published Date: Jul 29, 2019
Today’s sophisticated Operations Technology (OT) environments have a large attack surface with numerous attack vectors. Without complete coverage, the likelihood of getting attacked is not a matter of ‘if’; it’s a matter of ‘when’. Security for OT has gained significant attention due to a confluence of events.
Tags : 
    
Indegy
Published By: Entrust Datacard     Published Date: May 15, 2014
Complying with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection Standards
Tags : 
entrust, nerc, cyber attacks, non compliance
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
This white paper explores those guidelines and looks into which specific critical infrastructure solutions are required to avoid non-compliance.
Tags : 
solution, infrastructure protection, avoid non-compliance, cyberattack
    
Entrust Datacard
Published By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained.
Tags : 
hp data center, data center, optimization, business strategy, hot spots, mission critical loads”, the it infrastructure, the availability, it architecture, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
To accommodate increasingly dense technology environments, increasingly critical business applications, and increasingly stringent service level demands, data centers are typically engineered to deliver the highest-affordable availability levels facility-wide. Within this monolithic design approach, the same levels of mechanical, electrical, and IT infrastructure are installed to support systems and applications regardless of their criticality or business risk if unplanned downtime occurs. Typically, high redundancy designs are deployed in order to provide for all eventualities. The result, in many instances, is to unnecessarily drive up both upfront construction or retro-fitting costs and ongoing operating expenses.
Tags : 
hp data center, hybrid data center, dense technology environments, hybrid data center, critical business applications, it infrastructure, high redundancy designs, pods, right sizes, computer networks and subsystems, uninterruptible power supplies, ups, telecommunications equipment, data center dilemma, total cost of ownership, tco, always-on applications, redundant mep, multi-tiered (pod), monolithic tier
    
HP Data Center
Published By: VMware     Published Date: Feb 26, 2009
VMware Virtual Infrastructure and CA Recovery Management (CA ARCserve Backup and CA Xosoft products) team up to deliver higher availability and risk-resistance for business-critical information and applications, while lowering management and operational costs and complexity.
Tags : 
vmware, it infrastructure, virtual infrastructure, ca recovery management, business critical information, business continuity, disaster recovery, high availability, operational costs, virtual infrastructure, multi-processor support, virtual machines, disk-to-disk-to-tape, multiple operating systems, value-enhancing services
    
VMware
Published By: CDW     Published Date: Nov 12, 2012
This critical eSeminar examines the key issues that may impact your plans and process for moving to a more converged infrastructure.
Tags : 
converged infrastructure, convergence, it infrastructure, data centers, data center convergence
    
CDW
Published By: Siemens     Published Date: Jun 06, 2014
This white paper examines some of the critical success factors for a sustainable population health management program and how the CareXcell™ solution can provide the IT infrastructure needed to address new value-based care requirements.
Tags : 
siemens, hie, clinical workflows, care coordination, reduce costs, streamline communication, healthcare
    
Siemens
Published By: Symantec Corporation     Published Date: Aug 28, 2013
SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. For example, they protect remote communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL certificates to protect confidential information. In addition, SSL certificates are used to secure server-to-server communications for applications and data exchange. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services.
Tags : 
ssl certificates, communication, webmail, technical support, technology, data
    
Symantec Corporation
Published By: Nimble Storage     Published Date: Oct 28, 2013
Collaboration and email applications such as Microsoft SQL Server, Exchange, and SharePoint are critical for business productivity. But care needs to be taken in selecting the right infrastructure for hosting these applications. Download this technical overview and learn how VMware, Cisco, and Nimble Storage have developed a pre-validated reference architecture that delivers industry-leading performance, data protection, and management simplicity.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage, high-performance storage, storage efficiency, storage management, storage for vdi, storage for virtualized servers, storage for private cloud, storage for vmware, storage for oracle, storage for microsoft, storage for exchange, storage for sharepoint
    
Nimble Storage
Published By: Aruba Networks     Published Date: Nov 15, 2013
The content for this excerpt was taken directly from the IDC MarketScape: Worldwide Enterprise WLAN 2013-2014 Vendor Analysis by Rohit Mehra (Doc # 231686). All or parts of the following sections are included in this excerpt: IDC Opinion, In This Study, Situation Overview, Future Outlook, Essential Guidance, and Synopsis.
Tags : 
idc, marketscape, enterprise wlan, vendor analysis, brod, wireless lan, increase mobility, mission-critical mobility applications, cloud services, alternative architects, traffic flow, enterprise communications, unified communications, service providers, wlan infrastructure, wlan market
    
Aruba Networks
Published By: CenturyLink     Published Date: Jan 02, 2015
Discover how IEX achieved maximum growth with minimal time and capital expense.
Tags : 
capital expense, time-to-market, fair-access platform, market structure, mission-critical infrastructure
    
CenturyLink
Published By: Genesys     Published Date: Apr 07, 2017
Contact center infrastructure (CCI) evaluation is a technically complex process. This challenge is further complicated by the different requirements for omnichannel, high availability and integration as part of a customer engagement center (CEC). Get this report now to learn: - 9 critical capabilities for evaluating contact center infrastructure - 3 use cases that reflect most decisions organizations need to make when looking at CCI – multichannel compact suite, high volume call center and customer engagement center - Which vendor scores the highest in 3 use cases across 9 capabilities
Tags : 
genesys, contact center infrastructure, cci, contact center engagement, cec
    
Genesys
Published By: Skytap     Published Date: Aug 23, 2017
The majority of Fortune 500 companies, along with many other enterprises, currently run business critical applications on AIX on IBM Power Systems. For these businesses, incorporating AIX workloads into an enterprise cloud strategy can present significant challenges, most notably the lack of support for these workloads from typical cloud infrastructure providers. Skytap Cloud is the only public cloud that offers support for AIX workloads alongside applications running on x86 architectures. This guide details the considerations involved and best practices for migrating your AIX workloads to Skytap Cloud.
Tags : 
    
Skytap
Published By: Apstra     Published Date: Feb 21, 2019
IT organizations are facing new challenges as a result of digital transformation, widespread cloud and SaaS adoption, mobile proliferation and pervasive IoT deployments. They must build and operate their internal data centers to deliver high availability for mission critical applications, rapidly onboard new applications and scale capacity on demand – all within the mandate to be cost competitive with infrastructure as a service providers (IaaS) like AWS and Azure. They are architecting and building new Intent-Based Data Centers to deliver private cloud services to their internal and external customers.
Tags : 
saas, data center automation
    
Apstra
Published By: Oracle     Published Date: Apr 05, 2016
With cybercrime and security breaches sharply on the rise, protecting valuable information from cyberattacks is an ongoing challenge for companies. In this increasingly insecure world, your critical information deserves the best protection, making the database and surrounding infrastructure the best line of defense. Protect your data better through evolving your approach to data security. Learn about three key steps to reinvent the security of your surrounding infrastructure to create an information fortress by protecting your valuable data at its source.
Tags : 
information management, security, best practices, information secuirty
    
Oracle
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Time has become a critical capability in being able to extract the business value enterprises want from their data and computing infrastructure, as well as to protect the business value that has already been created. In multiple areas of cyber security, time is currently working in favor of the attackers — and time is the strategic advantage that the defenders need to regain. In this report, Aberdeen Group provides four illustrative examples of how recapturing an advantage of time can help defenders to reduce their risk, in the fundamental categories of data protection, threat detection and incident response, data center / cloud security, and endpoint security.
Tags : 
cyber, security, defenders, business value, infrastructure, data, business, protection
    
McAfee EMEA
Published By: Comcast Business     Published Date: Mar 24, 2015
Trends such as big data and BYOD have made the network more critical than ever. Research shows the pain points IT departments are experiencing with network infrastructure - and the investments they're making to improve capacity, scalability, and flexibility. Download this white paper to learn more about network trends.
Tags : 
network, big data, byod, it department, network infrastructure, scalability, capacity
    
Comcast Business
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Resource Library