critical infrastructure

Results 26 - 50 of 200Sort Results By: Published Date | Title | Company Name
Published By: Emerson Network Power     Published Date: Mar 02, 2011
A new perspective on managing the critical infrastructure gaps is emerging. Read on for more.
Tags : 
emerson network power, avocent, data center, infrastructure management
    
Emerson Network Power
Published By: Red Hat     Published Date: Jan 01, 2013
IDC profiles a range of customers successfully employing Red Hat Enterprise Linux for a full spectrum of workload types, including high-end applications previously hosted on non-x86 servers.
Tags : 
linux, business-critical workloads, workload data, ecosystem, application software, development, deployment software, infrastructure software
    
Red Hat
Published By: Entrust Datacard     Published Date: May 10, 2017
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively.
Tags : 
certificate management, digital business, pki, datacard, certificate management
    
Entrust Datacard
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
The need to bridge the gap between traditional IT services and cloud application delivery is vital.   This HPE Pointnext blueprint guide examines the critical global business services and IT technology best practices for enabling cloud-native applications—from DevOps practices to underlying infrastructure. The blueprint helps IT teams accelerate the development and delivery of cloud-native applications.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Learn why many organizations are leveraging forward-looking best practices from the experts at HPE Pointnext to help them transition to an ITaaS structure. This guide examines the critical business and technology practices enabling ITaaS, from using flexible IT partner resources, ITIL features, operations service practices, to funding infrastructure as a service.
Tags : 
    
Hewlett Packard Enterprise
Published By: Riverbed     Published Date: Jul 17, 2013
Enterprises are rapidly adopting virtualization for dynamic service delivery and service management agility. IT challenges already exist in virtual environments and will only be exacerbated with the higher adoption of virtualization. The ability to proactively monitor traffic within these environments is critical for enabling predictable and reliable delivery of applications and for troubleshooting diverse IT infrastructures. Read this white paper to learn more.
Tags : 
traffic, virtualization, it infrastructures
    
Riverbed
Published By: Schneider Electric     Published Date: Oct 17, 2016
In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
    
Schneider Electric
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Quality of service (QoS) is a critical enabling technology for enterprises and service providers wanting to deliver consistent primary storage performance to business-critical applications in a multi-tenant or enterprise infrastructure. The type of applications that require primary storage services typically demand greater levels of performance than what is readily available from traditional storage infrastructures today. However, simply providing raw performance is often not the only objective in these use cases. For a broad range of business-critical applications, consistent and predictable performance are the more important metrics. Unfortunately, neither is easily achievable within traditional storage arrays.
Tags : 
storage management, performance management, best practices, application integration, technology, business intelligence
    
SolidFire_NetApp
Published By: Dell Server     Published Date: Aug 07, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization. Forward-thinking IT organizations are developing new infrastructure strategies to better support high-value analytics workloads with Dell EMC PowerEdge Servers powered by Intel® Xeon® Platinum processor.
Tags : 
    
Dell Server
Published By: Butler Technologies     Published Date: Jul 03, 2018
Industry standards have been established to ensure performance, consistency, and interoperability between network equipment vendors. However, the consistent implementation and operation of these standards become even more critical as speeds and bandwidth increase. At the fiber infrastructure level, this also means more testing may be needed beyond the basic fiber end-face inspection certification and Tier 1 testing. This white paper explores Tier 2 optical time domain reflectometer (OTDR) testing and examines its relationship to Tier 1 testing and how inspection plays into both. This paper defines Tier 2 testing and explains when it is needed. It also addresses the OTDR complexity argument.
Tags : 
    
Butler Technologies
Published By: Pure Storage     Published Date: Jul 03, 2019
Splunk® has become a mission critical application. Thousands of organizations are gaining insight from their machine data and transaction logs using Splunk, and many more are planning to deploy Splunk. No matter what stage you’re in, having guidelines to follow can help improve the Splunk experience. Since a mission critical data application deserves a mission critical data platform, Pure Storage® built the solution on the Pure FlashStack™ converged infrastructure solution. FlashStack is a joint offering from Cisco® and Pure Storage. This paper is intended to provide a framework for designing and sizing a high-performance, scalable, and resilient Splunk platform. Pure Storage is a leading all-flash array provider focused on reducing storage complexity while improving Splunk performance, resiliency, and efficiency. To assure that your Splunk platform is sized appropriately, Pure Storage tested Splunk Enterprise on Pure’s FlashStack platform. The top takeaways from these efforts are tha
Tags : 
    
Pure Storage
Published By: Dell PC Lifecycle     Published Date: Mar 07, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: May 15, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
    
Dell PC Lifecycle
Published By: Pure Storage     Published Date: Apr 10, 2019
Splunk® has become a mission critical application. Thousands of organizations are gaining insight from their machine data and transaction logs using Splunk, and many more are planning to deploy Splunk. No matter what stage you’re in, having guidelines to follow can help improve the Splunk experience. Since a mission critical data application deserves a mission critical data platform, Pure Storage® built the solution on the Pure FlashStack™ converged infrastructure solution. FlashStack is a joint offering from Cisco® and Pure Storage. This paper is intended to provide a framework for designing and sizing a high-performance, scalable, and resilient Splunk platform. Pure Storage is a leading all-flash array provider focused on reducing storage complexity while improving Splunk performance, resiliency, and efficiency.
Tags : 
    
Pure Storage
Published By: Dell EMC     Published Date: Nov 06, 2015
A Vblock from VCE isn’t just a sum of its parts—it’s a new way of implementing and supporting missioncritical infrastructure.
Tags : 
emc, vce, enterprise, strategy, vblock, infrastructure
    
Dell EMC
Published By: Dyn     Published Date: Oct 04, 2016
Distributed Denial of Service (DDoS) attacks increased by over 100% YoY. With nearly a quarter of the attacks aimed at the DNS layer and close to 80% not identified until they reach the DNS layer, it is no secret you should evaluate your Manage DNS provider critically as your first line defense in DDoS mitigation. Download this eBook to best equip your business against impending DDoS attacks including: • Common types of DDoS attacks and which layers of your infrastructure are most at risk • How to geographically isolate attacks and mitigate latency • How to get the best before, during and after attack protection
Tags : 
ddos, dns, cdn, attacks
    
Dyn
Published By: IBM     Published Date: Jun 13, 2018
Today’s workloads are dynamic and power-hungry. Cloud requirements for mission-critical workloads often change overnight – causing IT priorities to shift, deadlines to tighten, and budgets to shrink. Seconds matter, especially when it comes to the bottom line. And bottom lines take brutal hits when companies haven’t properly established a powerful and flexible infrastructure.
Tags : 
    
IBM
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Since a decade the market has seen an outburst of data. With Managing and Securing Data is Crucial. With 3.8 Billion mobile users and 24 Zetta bytes of data created, and 100% attacks that target username and password credentials, managing and securing data has become a crucial and the most critical aspect for almost every Business. Oracle’s SPARC M7 processor, with Oracle’s Software in Silicon technology, is the industry’s most advanced multi thread, multi-core processor with unique capabilities for information security. It sets the foundation for mission-critical cloud based server infrastructure with unprecedented levels of security, efficiency, and performance.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : 
cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall
    
F5 Networks Inc
Published By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDC’s Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: • Why having a modern healthcare infrastructure is so important • The major challenges IoT brings to healthcare networks • How IEC 80001 is impacting compliance • Trends that confront a network IT professional in healthcare • Risks Healthcare IT must eli
Tags : 
healthcare, iot, iec 800001, extreme networks, healthcare it
    
Extreme Networks
Published By: Brother     Published Date: Mar 08, 2018
Documents are an integral component to the successful operation of an organization. Whether in hardcopy or digital form, they enable the communication, transaction, and recording of business-critical information. To ensure documents are used effectively, organizations are encouraged to continually evaluate and improve surrounding workflows. This may involve automating elements of document creation, securing the transfer and storage of information, and/or simplifying the retrieval of records and the data contained within. These types of enhancements can save time, money, and frustration. This white paper will discuss top trends and requirements in the optimization of document-related business processes as well as general technology infrastructures for document management. It will also address how some office technology vendors have reacted to these trends to guide their design and development of products, solutions, and services.
Tags : 
documents, workflows, business process, document management
    
Brother
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Oracle     Published Date: Jan 20, 2017
"Many large enterprises struggle to decide which workloads and systems should be deployed in the public cloud versus on premise. With a strong on-premises platform in place, organizations benefit from increased reliability, speed, and security. On the other hand, by leveraging the public cloud, they gain increased flexibility and recovery capabilities. So, what goes best where? Jim Rapoza, Senior Research Analysts at Aberdeen Group and Chuck Hollis, Senior VP at Oracle, will provide guidance aimed at helping organizations choose the right platforms for their critical workloads. They will analyze how Best-in-Class enterprises effectively integrate on-premises solutions and the public cloud, and recommend steps that businesses can take to become IT infrastructure leaders."
Tags : 
    
Oracle
Published By: Hewlett Packard Enterprise     Published Date: Oct 11, 2017
In a world without definable, defensible perimeters, how do you protect critical data and assets in your small or midsize business? Well, you start by deploying infrastructure components that are designed with security baked in at every level, from the core to the cloud and everywhere in between.
Tags : 
    
Hewlett Packard Enterprise
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure. Opportunity Multiple elements factor into how effectively an enterprise can embrace automation and advance the maturity of their transformation. However, security tools are central to enabling a structured and measured approach to managing critical access risks at each stage of the maturity model journey. With the right privileged access platform and set of tools, enterprises can progressively automate and scale access management to align risk
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Resource Library