it platforms

Results 626 - 650 of 662Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 09, 2014
Consolidating data center servers through virtualization is integral to successful IT systems design. Read the white paper and see how IBM PowerVM on POWER7 offers higher ratios of server virtualization than VMware on comparable Intel x86 platforms. This enables superior performance, greater operational savings and improved efficiency.
Tags : 
ibm power7 systems, virtualization, powervm, vsphere, powervm technology, virtualization performance, intel xeon, hp proliant
    
IBM
Published By: Dell Software     Published Date: Apr 29, 2015
Read this Gartner report and learn how to align your business and technical requirements as well as your strategic considerations with platforms that support cloud integration. Plus, gain insights into the decision framework that can help you determine the best solution for your organization’s needs.
Tags : 
cloud service integration, business and technical requirements, strategic considerations, decision framework, integration platforms
    
Dell Software
Published By: Castlight Health     Published Date: Aug 02, 2016
In this report by Forrester Research, find out what 120 executives in the US with influence and decision-making responsibility regarding healthcare management do to manage costs and increase employee engagement.
Tags : 
    
Castlight Health
Published By: Adobe     Published Date: Aug 14, 2014
Adobe received the highest score for current digital experience (DX) delivery offerings in The Forrester Wave™: Digital Experience Delivery Platforms, Q3 2014 report. And, we’re continuing to innovate. Since the evaluation, we’ve launched several new capabilities that include richer support for mobile apps, increased usability through visual workflows, and a master marketing profile. Read the report to see why Adobe was named a Strong Performer and to learn more about: -The DX challenges that companies face and how they’re addressing them -The array of tools and technologies available in digital experience delivery platforms -The journey to unified, cross-channel digital experiences “Strategically, Adobe differentiates with its vision of the connective tissue between its tools, and its aim for single customer profile.” – Forrester Research, Inc.
Tags : 
digital experience, delivery platforms, mobile apps, software vendors
    
Adobe
Published By: Adobe     Published Date: Sep 23, 2019
Adobe is a leader in personalization engines, according to Gartner. Why Should the Target Audience Care? Finding the right personalisation engine can have a dramatic impact on an organisation’s ability to provide quality, personalised experiences to their clientele. Gartner is a prestigious and respected organisation. Marketers and IT can rely on them to help make make crucial decisions about the best providers to use. Supporting Concepts Gartner conducted an extensive, multi-criteria evaluation of personalisation engines. They researched, analyzed, and scored the most significant ones, in order to help businesses make the right choice of provider. KEY POINTS PROVIDED AS GUIDELINES Adobe is a Leader. Many of Adobe's products include personalization features. However, Adobe Target offers a stand-alone personalization engine for segmentation, optimization and recommendations, and can be integrated with third-party platforms for marketing or digital commerce personalization. M
Tags : 
    
Adobe
Published By: IBM     Published Date: Apr 06, 2015
Far from being out of date, mainframes are used around the world to build robust, trusted clouds. Increasingly, organizations are turning to cloud computing to improve their IT responsiveness and to reduce costs. And for enterprise workloads, which require highly reliable and secure platforms to meet demanding service levels, many companies are building their clouds using a mainframe.
Tags : 
ibm, cloud computing, cost reduction, next generation mainframe
    
IBM
Published By: VMware AirWatch     Published Date: Dec 13, 2016
As enterprises embrace adoption of Microsoft Office 365 to drive productivity by using the latest mobile applications and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how VMware AirWatch® Enterprise Mobility Management (EMM) easily integrates with both Office 365 and VMware Identity Manager to optimize user experience and ensure data is secure across all devices and platforms. An AirWatch expert will give an in-depth demonstration of the advantages of deploying Office 365 with AirWatch by VMware, as well as conduct a Q&A session.
Tags : 
    
VMware AirWatch
Published By: IBM     Published Date: Oct 06, 2015
This Edison Group study provides an overview of three of the market leading MADPs -- IBM, SAP and Koney -- and discusses how they compared them using a real-world use case.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Many internal control programs are still undergoing major modifications due to increased PCAOB requirements, adoption of the 2013 COSO Framework, and board focus on risk and compliance processes. Organizations are using several technology approaches to manage the process—some with more success than others. Read this white paper to learn why organizations need to utilize the tools that optimize collaboration and focus on productivity, the pros and cons of desktop-based spreadsheets and GRC platforms, and the merits of taking a fresh approach to technology to manage internal control processes.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
As the focus on internal controls moves into its second decade, it'd be easy to assume that most organizations have mastered their processes. However, with the adoption of the 2013 COSO Framework, increased requirements from the PCAOB, and board focus on risk and compliance processes, many internal control programs are undergoing major modifications in numerous areas. Read this e-book to find out how and why companies have made the move to different platforms, including why companies need to focus on utilizing the most productive tools, several technology approaches used by organizations, and the merits of taking a fresh approach to technology to manage internal control processes.
Tags : 
best practices, technology, risk management, compliance, business management
    
IBM
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS
Published By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
    
CA Technologies
Published By: IBM     Published Date: Apr 18, 2017
There are myriad software products, from complete CRM platforms that offer analytics to standalone or add-on software products that focus solely on analytics. There are analytics apps that can be added to your existing CRM platform. Or there’s the option to outsource analytics to a growing number of service providers. “The technologies are changing rapidly. There are a zillion startups offering either new tools or technologies, so it is kind of hard to navigate,”Mike Gualtieri, an analystfor Forrester Research Inc. in Cambridge, Mass., said in a recent webcast on analytics. “There isn’t just one platform that you’re going to need. There’s a whole ecosystem of platforms.” Having the right people on staff who know how to use the technology is equally important, analysts say. Analytics aren’t just for statisticians anymore—they’re used by sales, marketing and customer service teams in daily decision making.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Published By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : 
security, big data, ibm, data protection
    
IBM
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime of server migration have locked many IT teams into platforms that are no longer ideal. Migrations are often delayed or avoided—whether it’s moving data to the cloud or back on premises, or upgrading the hardware of the database software. This results in lost opportunities, unnecessary costs, and a lack of agility that today’s IT teams can no longer afford. Carbonite Move Powered by DoubleTake quickly and easily migrates physical, virtual, and cloud workloads over any distance with minimal risk and near-zero downtime. Using efficient real-time, byte-level replication technology, Carbonite Move creates a replica of the data, application, database, or entire server being migrated and keeps it in sync with the production system. The migrated data can be validated without disrupting business operations, and downtime is limited to the seconds or minutes required for cutover to the new server.
Tags : 
carbonite, doubletake, risk mitigation
    
Carbonite
Published By: Sitecore     Published Date: Jun 14, 2017
The Gartner Magic Quadrant for WCM assesses leading solutions and delivers valuable insights for those looking to optimize digital marketing platforms for a better customer experience. The 2015 report evaluates 19 vendors for their Ability to Execute as well as their Completeness of Vision. This year, Sitecore® leapt vertically to the top position for its Ability to Execute among the vendors evaluated and has been in the Leaders quadrant for six consecutive years. Learn more by downloading your copy of the 2015 Gartner Magic Quadrant for WCM now.
Tags : 
profiling, flexible deployment, marketing systems, commerce, email marketing, testing, analytics, omnichannel experience marketing
    
Sitecore
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: OnBase by Hyland     Published Date: May 16, 2017
To make informed decisions and serve customers, your employees need the right tools and access to key information, in the right context. But, when business-critical information is scattered across multiple off-the-shelf and custom-coded applications, your workers are less efficient and your customers’ experiences suffer. When it comes to your enterprise application strategy, are you thinking beyond build-versus-buy? Download this Forrester Consulting thought leadership paper to learn how Low-code rapid application development platforms offer a faster, easier alternative that empowers your IT organization, your employees and your customers.
Tags : 
forrester consulting, hyland, application development platforms, rapid app development platform, it sprawl, it solutions
    
OnBase by Hyland
Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
Supporting multiple internal clients and all of their requirements for testing and production networks in more than 1,000 cities around the world—these are the unrelenting challenges for the 12 brands that comprise eBay Classifieds Group. Activating new platforms and features can take a lot of time; with the Juniper solution, turnaround time has been reduced to a few hours—sometimes less—which helps eBay Classifieds turn innovation into a real competitive advantage every single day.
Tags : 
ebay classifieds, web services, internal clients, contrail networking, cloud platform, sdn, business platforms, laas
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
The impact of cloud computing and software-defined networking (SDN), including network virtualization, has convinced large enterprises and customers building private, public, and hybrid cloud networks to consider new approaches to help them meet their current and future data center switching needs. Data center switching platforms are constantly evolving, delivering increasingly better performance while simplifying network operations.
Tags : 
scaling, memory, asic platforms, broadcom, tomahawk platforms, juniper networks, multivector scaling, memory architecture
    
Juniper Networks
Published By: Group M_IBM Q1'18     Published Date: Jan 04, 2018
IBM® InfoSphere® Big Match for Hadoop helps you analyze massive volumes of structured and unstructured customer data to gain deeper customer insights. It can enable fast, efficient linking of data from multiple sources to provide complete and accurate customer information—without the risks of moving data from source to source. The solution supports platforms running Apache Hadoop such as IBM Open Platform, IBM BigInsights, Hortonworks and Cloudera.
Tags : 
hadoop, infosphere, data, customer insights
    
Group M_IBM Q1'18
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search Resource Library