enterprise it cloud

Results 51 - 75 of 720Sort Results By: Published Date | Title | Company Name
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
    
Fortinet EMEA
Published By: Oracle     Published Date: Oct 28, 2019
The workplace is being reimagined. There’s a new focus on the human and that’s given rise to organisations reimagining themselves as social enterprises. The growth of hybrid jobs and super jobs presents HR leaders with fresh challenges. New ways have to be found of identifying talent from within and outside an organisation. A recent Deloitte report highlights the need for collaboration across the business and a bold plan that embraces new technology. Our webinar discusses that report, the actions for HR leaders and why cloud is the place to start. Discover why cloud can open up new approaches in your search for talent.
Tags : 
    
Oracle
Published By: CA Technologies     Published Date: Dec 27, 2011
The study finds that enterprises are active in the cloud, and their virtualization efforts are contributing to broader "cloud thinking." As a result, the cloud is coming of age within large organizations and aligning IT decision makers and implementers around a cloud computing platform.
Tags : 
technology, cloud, cloud computing, ca technologies, data management, data center
    
CA Technologies
Published By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Published By: Dell     Published Date: May 04, 2015
To run a truly efficient private cloud, the enterprise must have clear visibility into operations, applications, and costs, no matter how heterogeneous the underlying virtualized environment. Read on to learn how to build the ties that bind the private cloud infrastructure to what the business needs.
Tags : 
    
Dell
Published By: HP     Published Date: Dec 05, 2014
This assessment is composed of a core set of comparative questions, and the option to be assessed in any of three key areas: computing economics, service delivery and business performance. After a half-decade of cost cutting and shrinking IT budgets, the compute infrastructure that powers the enterprise now is typically inefficient, slow and not optimized for business outcomes. It is better suited to the economic realities of 2010 rather than the rigors of the application workloads, delivery models & business expectations of today driven by cloud, mobility, security and big data megatrends. As a result, there is a significant gap between what businesses expect from technology and what IT can deliver.
Tags : 
server, performance, efficiency, application, infrastructure, information technology, mobility, cloud, storage, data, speed, software
    
HP
Published By: HP     Published Date: Dec 05, 2014
An IDG Connect survey of 300 enterprise organization decision makers involved in hardware investment decisions reveals the challenges and opportunities that lay between the old style of IT characterized by cost-cutting and infrastructure silos, with the new style of IT driven by the technology trends of Mobility, Cloud and Big Data. These trends have created a significant increase in business expectations that will press IT organizations to rethink their economics, service delivery and business performance. This paper highlights voice-of-the-IT-buyer research results for insight on the challenges and opportunities for IT organizations to drive innovation, transformation and improved delivery against business expectations.
Tags : 
server, performance, efficiency, application, infrastructure, information technology, mobility, cloud, storage, data, speed, software
    
HP
Published By: HPE     Published Date: Feb 11, 2015
An IDG Connect survey of 300 enterprise organization decision makers involved in hardware investment decisions reveals the challenges and opportunities that lay between the old style of IT characterized by cost-cutting and infrastructure silos, with the new style of IT driven by the technology trends of Mobility, Cloud and Big Data. These trends have created a significant increase in business expectations that will press IT organizations to rethink their economics, service delivery and business performance. This paper highlights voice-of-the-IT-buyer research results for insight on the challenges and opportunities for IT organizations to drive innovation, transformation and improved delivery against business expectations. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
    
HPE
Published By: HPE     Published Date: Feb 11, 2015
This assessment is composed of a core set of comparative questions, and the option to be assessed in any of three key areas: computing economics, service delivery and business performance. After a half-decade of cost cutting and shrinking IT budgets, the compute infrastructure that powers the enterprise now is typically inefficient, slow and not optimized for business outcomes. It is better suited to the economic realities of 2010 rather than the rigors of the application workloads, delivery models & business expectations of today driven by cloud, mobility, security and big data megatrends. As a result, there is a significant gap between what businesses expect from technology and what IT can deliver.
Tags : 
    
HPE
Published By: Dell EMC     Published Date: Aug 17, 2017
The migration from a traditional enterprise IT infrastructure architecture with separate servers, separate traditional SAN, and separate hyperscale public cloud to an integrated hyperconverged architecture including Server SAN and an integrated hybrid cloud is a profound change. Wikibon explores the premise that the migration is justified, and the optimum hybrid cloud strategy is to use the same architecture and software for both the on-premises True Private Cloud and the public cloud services. Wikibon uses the term “True Hybrid Cloud” to describe this approach.
Tags : 
hyper-converged infrastructure, hci, it infrastructure, vmware environment, it performance
    
Dell EMC
Published By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
    
Akamai Technologies
Published By: Amazon Web Services     Published Date: Jul 25, 2018
IDC’s research has shown the movement of most IT workloads to the cloud in the coming years. Yet, with all the talk about enterprises moving to the cloud, some of them still wonder if such a move is really cost effective and what business benefits may result. While the answers to such questions vary from workload to workload, one area attracting particular attention is that of the data warehouse. Many enterprises have substantial investments in data warehousing, with an ongoing cost to managing that resource in terms of software licensing, maintenance fees, operational costs, and hardware. Can it make sense to move to a cloud-based alternative? What are the costs and benefits? How soon can such a move pay itself off? Download now to find out more.
Tags : 
    
Amazon Web Services
Published By: Red Hat Government     Published Date: Jul 21, 2011
The Red Hat Cloud Quickstart consulting engagement leverages Red Hat's Cloud Foundations Reference Architecture Edition One to speed up assessing the viability of a cloud environment for your enterprise, and, if chosen, it can demonstrate a tangible implementation of a private cloud for testing purposes.
Tags : 
cloud quickstart, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Adobe     Published Date: Nov 25, 2013
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer? Please download to learn more.
Tags : 
it management environment, document integration, document security, mobile, mobile apps, personal devices, define data, mobile workforce, enterprise networks, sensitive documents, productivity ecosystem, lockdown, document solutions, cloud, cloud-based, hybrid it, enterprise mobility
    
Adobe
Published By: Adobe     Published Date: Nov 25, 2013
For the past several years, the nature of enterprise productivity has been forever changed by the new breed of mobile devices. Personal smartphones and tablets are everywhere. Gone are the days when every enterprise gave its employees a security-focused BlackBerry. Cloud-based productivity apps can be downloaded in seconds. Compared to even a few years ago, enterprises are operating in a new world. Please download whitepaper to learn more.
Tags : 
mobile devices, compatibility, cloud-based, enterprise, enterprise productivity, productivity apps, security-focused, smartphones tablets, growing mobile workforce, document productivity, content management, hybrid model
    
Adobe
Published By: Red Hat     Published Date: Jan 06, 2014
Interested in leveraging automation technologies and a cloud architecture to make developers more productive? Learn how PaaS can benefit your organization to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies. Begin charting your path to PaaS with OpenShift Enterprise.
Tags : 
enterprise, paas, openshift, openshift online, red hat, openstack, open-source architect, infrastructure-as-a-service, cloud computing
    
Red Hat
Published By: Red Hat     Published Date: Jan 06, 2014
Growing business demand for new applications has put a strain on IT organizations leading to the need for an effective PaaS to accelerate app development processes. Explore PaaS market trends, benefits and an in-depth look at OpenShift Enterprise by Red Hat in this IDC Technology Spotlight.
Tags : 
enterprise, paas, openshift, openshift online, red hat, openstack, open-source architect, infrastructure-as-a-service, cloud computing
    
Red Hat
Published By: Red Hat     Published Date: Jan 06, 2014
Looking to PaaS to accelerate application service delivery by automating and streamlining application development, deployment and scaling? PaaS offers many benefits and choosing the right PaaS is key to getting those benefits, so make sure you have considered everything. Get the PaaS Executive Checklist to learn PaaS key considerations.
Tags : 
enterprise, paas, openshift, openshift online, red hat, openstack, open-source architect, infrastructure-as-a-service, cloud computing
    
Red Hat
Published By: Red Hat     Published Date: Jan 06, 2014
Struggling to keep up with increasing application demand? Platform as a Service (PaaS) can streamline application development processes and make resource management easy with auto-scaling and consistent integration. Learn how OpenShift Enterprise can help architects standardize development processes, while letting developers focus on their code.
Tags : 
enterprise, paas, openshift, openshift online, red hat, openstack, open-source architect, infrastructure-as-a-service, cloud computing
    
Red Hat
Published By: Red Hat     Published Date: Jan 08, 2014
This overview includes key benefits and a summary of Red Hat Enterprise Linux and Red Hat Enterprise Virtualization, with a limited time promotional offering that will save you up to 26% while enabling increased performance, scalability and security.
Tags : 
red hat, rhel, rhev, enterprise linux, enterprise virtualization, virtualization, servers, scalability, security, cloud, virtulization platform
    
Red Hat
Published By: Red Hat     Published Date: Jan 09, 2014
A large enterprise data warehouse company used Red Hat® CloudForms to create a private cloud that includes automated provisioning and self-service for developers and testers. This let them build, test, and release new product versions faster. Find out how in this case study.
Tags : 
red hat, cloudforms, data, data warehouse, enterprise cloud, cloud management, productivity, private cloud, service delivery, lifecycle management
    
Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library