critical infrastructure

Results 1 - 25 of 200Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 10, 2012
It is clear that we live in a land of the survival of the fittest. This same scenario is certainly not news to the CIO of any enterprise data center, especially in the data center with a mission-critical infrastructure.
Tags : 
it infrastructure, data, servers, unix, ibm
    
IBM
Published By: IBM     Published Date: Jan 09, 2014
As vendors abandon the UNIX market, IBM continues its commitment to AIX and POWER7 components on Power Systems. And with its recent architectural upgrades, it’s even redefining performance. Read the Clipper Group white paper and see how POWER7’s faster processors accelerate the delivery of applications and services, and improve the utilization of resources.
Tags : 
power7 system, ibm, power7 servers, mission-critical, data center, it infrastructure, architecture, bladecenter
    
IBM
Published By: Wheelhouse Enterprises     Published Date: Jul 02, 2010
Phone systems are a critical part of any business infrastructure. While phone system buyers read the buyers guides, research the different brands, and create elaborate RFPs, there is no substitute for learning from other phone system buyers' mistakes. Here is a list of 10 regrettable mistakes businesses have made when buying a phone systems.
Tags : 
wheelhouse, voip, business phone, sip, ecommerce, business infrastructure, communication, telephony
    
Wheelhouse Enterprises
Published By: Wheelhouse Technologies     Published Date: Mar 23, 2012
Phone systems are a critical part of any business infrastructure. Here is a list of 10 regrettable mistakes businesses have made when buying a phone system.
Tags : 
phone system, wheelhouse, wheelhouse, technologies, yachts, fleets, workboats, marine
    
Wheelhouse Technologies
Published By: Genesys     Published Date: Jul 13, 2018
With artificial intelligence (AI) gaining ground, the right contact center infrastructure (CCI) can be the critical business differentiator for long-term flexibility and scalability. Gartner Research looked at three use cases to evaluate CCI vendors, and Genesys received the highest use case scores (4.16 out of 5) for Customer Engagement Center in Gartner Critical Capabilities.
Tags : 
gartner, contact center, artificial intelligence, infrastructure, crm system
    
Genesys
Published By: Genesys     Published Date: Aug 07, 2018
Our deep integration with CRM systems and support for digital channels enables a single view of the customer that is essential for an organization’s success.
Tags : 
gartner, contact center, artificial intelligence, infrastructure, crm system
    
Genesys
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"Customers in the midst of digital transformation look first to the public cloud when seeking dramatic simplification, cost, utilization and flexibility advantages for their new application workloads. But using public cloud comes with its own challenges. It’s not always possible or practical for enterprises to retire their traditional, on-premises enterprise system still running the company’s most mission- critical workloads. Hybrid IT – a balanced combination of traditional infrastructure, private cloud and public cloud – is the answer. But a true hybrid IT deployment must go well beyond the current generation of hybrid cloud systems, where the on-premises and off-premises worlds have largely remained siloed and still have to be independently managed. This paper seeks to answer how to bring those siloes together by identifying eight essentials that must be met to achieve the ideal hybrid IT implementation."
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC     Published Date: Nov 02, 2015
Today’s IT environment is more complex than ever. The applications that have become critical to business operations require greater processing power, memory, and storage. This guide prepares decision-makers to choose servers that meet their current needs, while building a flexible, reliable, scalable infrastructure to handle future requirements.
Tags : 
    
Dell EMC
Published By: VMware, Inc     Published Date: Oct 28, 2014
For organizations with disaster recovery services in place, the challenge often lies in supporting the ongoing maintenance and re-evaluating the initial investment versus newer offerings as their environment continues to expand, or leases expire. Fortunately, the landscape of disaster recovery solutions is shifting to accommodate changing IT needs. VMware vCloud® Air™ Disaster Recovery provides simple, affordable, automated processes for replicating and recovering critical applications and data — at a fraction of the cost of duplicating infrastructure or maintaining additional data centers. Organizations can afford to scale their efforts as needed, with flexible terms and resource options.
Tags : 
cloud, disaster recovery, infrastructure, automated processes, replication
    
VMware, Inc
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
The bar for success is rising in higher education.  University leaders and IT administrators are aware of the compelling benefits of digital transformation overall—and artificial intelligence (AI) in particular. AI can amplify human capabilities by using machine learning, or deep learning, to convert the fast-growing and plentiful sources of data about all aspects of a university into actionable insights that drive better decisions. But when planning a transformational strategy, these leaders must prioritize operational continuity. It’s critical to protect the everyday activities of learning, research, and administration that rely on the IT infrastructure to consistently deliver data to its applications.
Tags : 
    
Hewlett Packard Enterprise
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Since a decade the market has seen an outburst of data. With Managing and Securing Data is Crucial. With 3.8 Billion mobile users and 24 Zetta bytes of data created, and 100% attacks that target username and password credentials, managing and securing data has become a crucial and the most critical aspect for almost every Business. Oracle’s SPARC M7 processor, with Oracle’s Software in Silicon technology, is the industry’s most advanced multi thread, multi-core processor with unique capabilities for information security. It sets the foundation for mission-critical cloud based server infrastructure with unprecedented levels of security, efficiency, and performance.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This technical white paper outlines the mission critical reference configuration that is part of the HP Virtual System family.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure
    
HP - Intel® Xeon® processors
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This white paper outlines and explains the core components and benefits of the HP VirtualSystem solution.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure
    
HP - Intel® Xeon® processors
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
NERC enforces comprehensive reliability standards for planning and operating the collective bulk power system, including the Critical Infrastructure Protection (CIP) Cyber Security Standards.
Tags : 
tripwire, nerc compliance, it security, automation, cip, cyber security, reliability standard, log
    
Tripwire, Inc
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
McAfee
Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet
    
Intel Security
Published By: Entrust Datacard     Published Date: May 15, 2014
Complying with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection Standards
Tags : 
entrust, nerc, cyber attacks, non compliance
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
This white paper explores those guidelines and looks into which specific critical infrastructure solutions are required to avoid non-compliance.
Tags : 
solution, infrastructure protection, avoid non-compliance, cyberattack
    
Entrust Datacard
Published By: VMware     Published Date: Jun 04, 2019
"In an era where speed and performance are critical, moving to a software-centric approach in every area of the data center is the only way to get ahead in today's digital economy. A modern, software-defined infrastructure, enables organizations to leverage prior investments, extend existing IT knowledge and minimize disruption along the way. VMware and Intel provide IT organizations a path to digital transformation, delivering consistent infrastructure and consistent operations across data centers and public clouds to accelerate application speed and agility for business innovation and growth."
Tags : 
    
VMware
Published By: Skytap     Published Date: Aug 23, 2017
The majority of Fortune 500 companies, along with many other enterprises, currently run business critical applications on AIX on IBM Power Systems. For these businesses, incorporating AIX workloads into an enterprise cloud strategy can present significant challenges, most notably the lack of support for these workloads from typical cloud infrastructure providers. Skytap Cloud is the only public cloud that offers support for AIX workloads alongside applications running on x86 architectures. This guide details the considerations involved and best practices for migrating your AIX workloads to Skytap Cloud.
Tags : 
    
Skytap
Published By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
Published By: NetApp     Published Date: Dec 08, 2014
This white paper focuses on the increasing importance of high availability as enterprises continue to build out a 3rd Platform–based computing infrastructure. As more mission-critical applications requiring extremely high availability are deployed on virtual infrastructure, enterprises must respond using the right storage solutions. The document identifies critical features in the storage infrastructure necessary to meet these requirements for availability and explores how one vendor, NetApp, meets them with its EF-Series AFA solutions portfolio.
Tags : 
all-flash, enterprise storage, platform-based, ef-series, afa solutions
    
NetApp
Published By: NetApp     Published Date: Dec 09, 2014
This white paper focuses on the increasing importance of high availability as enterprises continue to build out a 3rd Platform–based computing infrastructure. As more mission-critical applications requiring extremely high availability are deployed on virtual infrastructure, enterprises must respond using the right storage solutions. The document identifies critical features in the storage infrastructure necessary to meet these requirements for availability and explores how one vendor, NetApp, meets them with its EF-Series AFA solutions portfolio.
Tags : 
all-flash, enterprise storage, platform-based, ef-series, afa solutions
    
NetApp
Published By: Dell PC Lifecycle     Published Date: Mar 07, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
    
Dell PC Lifecycle
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search Resource Library