data infrastructure

Results 1 - 25 of 1051Sort Results By: Published Date | Title | Company Name
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
Ransomware is not going away. This makes it imperative for businesses across all industries to adopt a data management strategy of multi-layered security, easy automation, and quick recovery. To learn more about Rubrik and how it can ?t into your ransomware protection strategy while simplifying data protection across your entire datacenter, visit www.rubrik.com. As the leading next-generation data protection solution, Rubrik deploys as a plug-and-play appliance in less than an hour and has been adopted across all verticals and organization sizes including Fortune 50 companies.
Tags : 
data, backup, recovery, backups, solution, security, encryption, cyber, privacy, infrastructure
    
Rubrik EMEA
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
Backup and recovery needs a radical rethink. When today’s incumbent solutions were designed over a decade ago, IT environments were exploding, heterogeneity was increasing, and backup was the protection of last resort. The goal was to provide a low cost insurance policy for data, and to support this increasingly complex multi-tier, heterogeneous environment. The answer was to patch together backup and recovery solutions under a common vendor management framework and to minimize costs by moving data across the infrastructure or media.
Tags : 
data, backup, recovery, virtualization, solutions, cloud, architectures
    
Rubrik EMEA
Published By: Dell EMC     Published Date: May 09, 2019
.As midmarket companies pursue business growth, they must deliver differentiated products and experiences without compromising business or customer data. Crucial to this is having the most up-to date IT infrastructure to support the scale and complexity of a changing application landscape. Midmarket businesses (MBs) must modernize their data centers refreshing server infrastructure and automating their IT management processes. Those that do will propel business innovation and deliver superior customer experiences with secure, fast, and reliable business technology. Download this paper, commissioned by Dell, to learn more.
Tags : 
    
Dell EMC
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 13, 2019
IT organizations are no longer just a business support function and cost center—they are expected to drive business as part of the core corporate strategy. Adding to this, IT landscapes continue to increase in complexity, complicating management and innovation. Digital transformation helps IT adapt to these changes. Building a hybrid or multi-cloud IT environment can help you transform successfully. An effective cloud environment can provide: • Improved infrastructure management and flexibility • More time for IT to focus on strategic projects rather than manage data centers. • Better IT cost management In fact, 49% of companies cite “modernized IT infrastructure and technologies with increased agility, flexibility, manageability, and security” as a digital initiative on their long-term roadmap. To learn more, download this eBook!
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Schneider Electric     Published Date: May 31, 2019
Colocation facilities are rapidly designing and building new facilities in order to capitalize on market opportunity. Getting the facility up and running is the first challenge. The second? Recruiting, training, and retaining qualified data center staff. In this webinar, co-hosted by Tony DeSpirito, VP & General Manager Data Center Operations at Schneider Electric, & Brian Gisi, Infrastructure Management & Services Manager at IBM, to access field-tested methods & strategies that can help you: 1. Overcome the worldwide shortage of experienced data center professionals 2. Understand how out-tasking data center operations can benefit you & your clients 3. Identify key characteristics of a strong data center operations partner
Tags : 
data center, business growth, schneider electric
    
Schneider Electric
Published By: Gigamon     Published Date: Jun 10, 2019
Explosive data growth and network complexity hindering your ability to deliver results? We get it: the more complex the application infrastructure, the harder it is to ensure apps are functioning optimally. Read our new eBook, “Driving Digital Transformation with Application Intelligence,” to learn how to provide insight into applications across complex infrastructure. Discover previously hard-to-get information about bottlenecks, suspicious data, and user experience.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Download “How to Strengthen Security While Optimizing Network Performance” to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability.  NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by downloading this new research now.
Tags : 
    
Gigamon
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
As the foundation for most critical business decisions, today's data environments are not just a vital piece of IT infrastructure, but key component of corporate strategy.
Tags : 
    
Group M_IBM Q2'19
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: DataCore     Published Date: Apr 23, 2019
In our developing digital economy, IT is a strategic asset. By effectively leveraging data, businesses become more operationally efficient, create more differentiated customer experiences, and develop new products and business models. However, unlocking those benefits requires a higher degree of execution by IT. Simply keeping pace with demand is no longer good enough; IT needs to help drive the business’s digital pursuits. The increased pressure on IT has amplified complexity, as well—66% of IT decision makers surveyed by ESG say IT is more complex than it was just two years ago.1 Demands being placed on IT are scaling relentlessly, and the tools IT teams use are in a constant state of evolution. Integrating and optimizing those new infrastructure technologies while managing existing investments is a perpetual burden. IT organizations, therefore, have two choices: either increase their personnel and budgets enough to survive the evolution with just traditional tools, or redirect those
Tags : 
software defined storage, hyperconverged, storage consolidation, storage management, data migration, storage migration
    
DataCore
Published By: DataCore     Published Date: Jun 06, 2019
More than 54% of companies have experienced a downtime event that lasted more than 8 hours – one full work day – in the past 5 years. And the risk of major disruptions to business continuity practices looms ever larger – primarily due to the troubling dependencies on the location, topology and suppliers of data storage. Download this infographic and see how you can preserve proven Business Continuity practices despite inevitable changes to your data storage infrastructure.
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure
    
DataCore
Published By: DataCore     Published Date: Jun 06, 2019
With so many moving pieces involved in business continuity and disaster recovery planning, anticipating the downstream impact of new SAN arrays, hyperconverged systems, and disaster recovery site relocation is increasingly more difficult. Learn how DataCore™ SDS services help you adapt your safeguards accordingly in the face of these common initiatives and business challenges: - Storage Array Replacement - Mergers and Acquisitions - Cloud Replication - Hyperconverged Infrastructure - Multi-Site Metro Cluster
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure, cloud, hyperconverged
    
DataCore
Published By: DataCore     Published Date: Jun 06, 2019
Nothing in Business Continuity circles ranks higher in importance than risk reduction. Yet the risk of major disruptions to business continuity practices looms ever larger today, mostly due to the troubling dependencies on the location, topology and suppliers of data storage. Get insights on how to avoid spending time and money reinventing BC/DR plans every time your storage infrastructure changes.
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure
    
DataCore
Published By: ASG Software Solutions     Published Date: Jun 09, 2009
Improved business productivity often requires more efficient IT and more efficient IT cannot be achieved without a better understanding of the way business services are run and delivered. Configuration Management Databases (CMDBs) have emerged as a central component for Information Technology Infrastructure Library (ITIL) and business service management (BSM).
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: Upsite Technologies     Published Date: Sep 18, 2013
The average computer room today has cooling capacity that is nearly four times the IT heat load. Using data from 45 sites reviewed by Upsite Technologies, this white paper will show how you can calculate, benchmark, interpret, and benefit from a simple and practical metric called the Cooling Capacity Factor (CCF). Calculating the CCF is the quickest and easiest way to determine cooling infrastructure utilization and potential gains to be realized by AFM improvements.
Tags : 
ccf, upsite technologies, cooling capacity factor, energy costs, cooling, metrics, practical, benchmark
    
Upsite Technologies
Published By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : 
absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp, ponemon, it security, sensitive data
    
APC by Schneider Electric
Published By: Ricoh     Published Date: Oct 02, 2018
Your business is changing. As a finance leader, you know that accounting is a labour-intensive, costly process where systems often don’t allow for expedient exception handling and many days are fraught with difficulty in matching invoices to other databases for reconciliation. Like most companies, you know where you want to go but may not have infrastructure or internal expertise to handle electronic fund transfers, credit card payments or cheque processing— all the pieces required to make your vision for an efficient, integrated operation a reality.
Tags : 
    
Ricoh
Published By: Cisco     Published Date: Dec 20, 2018
Edison has followed the development and use of Cisco’s Application Centric Infrastructure (ACI) over the past five years. Cisco ACI delivers an intent-based networking framework to enable agility in the datacenter. It captures higher-level business and user intent in the form of a policy and translates this intent into the network constructs necessary to dynamically provision the network, security, and infrastructure services.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: QTS     Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia and Australia.
Tags : 
data centers, infrastructure, value added technology services, data security, data center, colocation, cloud needs
    
QTS
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Accelerate Digital Transformation. Make data center infrastructure cloud-ready. Optimize storage across clouds and data centers.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
The bar for success is rising in higher education.  University leaders and IT administrators are aware of the compelling benefits of digital transformation overall—and artificial intelligence (AI) in particular. AI can amplify human capabilities by using machine learning, or deep learning, to convert the fast-growing and plentiful sources of data about all aspects of a university into actionable insights that drive better decisions. But when planning a transformational strategy, these leaders must prioritize operational continuity. It’s critical to protect the everyday activities of learning, research, and administration that rely on the IT infrastructure to consistently deliver data to its applications.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Powerful IT doesn’t have to be complicated. Hyperconvergence puts your entire virtualized infrastructure and advanced data services into one integrated powerhouse. Deploy HCI on an intelligent fabric that can scale with your business and you can hyperconverge the entire IT stack. This guide will help you: Understand the basic tenets of hyperconvergence and the software-defined data center; Solve for common virtualization roadblocks; Identify 3 things modern organizations want from IT; Apply 7 hyperconverged tactics to your existing infrastructure now.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library