hybrid it

Results 1 - 25 of 513Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
To better understand how companies are finding the unique, hybrid cloud architectures that best meet their needs, we interviewed executives at companies that had reduced or changed their use of managed or cloud IaaS or that chose to avoid the public cloud in the first place. These companies include retail, social media, healthcare, financial services, and public sector companies. Some of these companies were born in the cloud while others transitioned from traditional IT infrastructures. Company sizes ranged from 300 employees to more than 300,000.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, iaas
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
This book helps you understand both sides of the hybrid IT equation and how HPE can help your organization transform its IT operations and save time and money in the process. I delve into the worlds of security, economics, and operations to show you new ways to support your business workloads.
Tags : 
hpe synergy, api, infrastructure, hybrid it, workloads, code
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
Midsized firms operate in the same hypercompetitive, digital environment as large enterprisesbut with fewer technical and budget resources to draw from. Thats why it is essential for IT leaders to leverage best-practice processes and models that can help them support strategic business goals such as agility, innovation, speed-tomarket, and always-on business operations. A hybrid IT implementation can provide the infrastructure flexibility to support the next generation of high-performance, data-intensive applications. A hybrid foundation can also facilitate new, collaborative processes that bring together IT and business stakeholders.
Tags : 
digital environment, hyper competitive, business goals, hybrid it, technology, hpe
    
Hewlett Packard Enterprise
Published By: Google     Published Date: Jan 08, 2018
Cloud platforms are rewriting the way that companies work, serving as a vital foundation for digital transformation. Companies should brace for challenges that will need to be met as they transition from in-house systems to hybrid-cloud, multi-cloud, and public-cloud environments. Learn how an open-source strategy and consistent governance will help your company use multi-clouds to compete in the digital world. Download the Harvard Business Review Analytic Services report and find out more.
Tags : 
multi-cloud, cloud services, cloud tools, digital transformation
    
Google
Published By: Cisco     Published Date: Dec 27, 2017
Today all businesses battle with unprecedented competitive pressures. In order to succeedor even survive they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. The very factors driving digital transformation in businesses are also pressuring IT organizations to transform. Customer expectations have increased. Companies live and die by the applications they provide to their customers and employees. A smartphone is the modern bank branch. The palm of your hand is replacing traditional brick-and-mortar stores. Access without delay or interruption, 24/7, is the new normal. If they cant get what they want, when they want it, customers go elsewhere.
Tags : 
    
Cisco
Published By: Carbonite     Published Date: Jan 04, 2018
Backup alone is not enough anymore. Businesses today must put a range of recoverability options in place. Thats why it is encouraging to see Carbonite, a data protection company with cloud and hybrid offerings, making fresh moves to help organizations evolve beyond legacy backup. Years ago, Carbonite pioneered cloud backup for endpoint devices. Then it expanded, buying EVault in 2015 and DoubleTake in 2017. Just as Carbonite has long been at the forefront of offering what people need from cloud-based data backup, it now appears to be just as intent on providing what IT organizations needhybrid data protection media and mechanisms.
Tags : 
    
Carbonite
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Das Management privilegierter Anwender war schon immer eine wichtige Aufgabe. Jetzt, wo sie immer mehr werden, wird es zu einer noch wichtigeren und komplexeren Herausforderung.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Das Privileged Access Management umfasst Funktionen fr Kontrolle, Monitoring und Auditing, mit denen die Risiken im Zusammenhang mit privilegierten Anwendern, Accounts und Anmeldeinformationen gemindert werden sollen. In den letzten Jahren hat sich herausgestellt, dass diese Aufgabe fr Unternehmen aller Arten hohe Prioritt hat. Diesem Anstieg an Interesse und Aufmerksamkeit liegen mehrere Faktoren zugrunde:
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Diebstahl und Missbrauch sensibler administrativer Anmeldeinformationen verursachen Sicherheitsverletzungen und Betriebsunterbrechungen. CAPrivileged Access Manager verbessert die IT-Security, Unternehmenseffizienz und Compliance durch den Schutz privilegierter Anmeldeinformationen und Ressourcen sowie durch die effiziente berwachung, Kontrolle und Verwaltung der Aktivitten privilegierter Anwender.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
CA Privileged Access Manager amliore la scurit IT, lefficacit oprationnelle et la conformit avec la rglementation en protgeant les informations didentification forts privilges, en dfendant les ressources forts privilges et en supervisant, contrlant et grant de faon efficace les activits forts privilges.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Le prsent rapport fournit un schma directeur permettant de dterminer les cots directs, indirects et cachs du dploiement dune telle solution au fil du temps.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: Lookout     Published Date: Aug 30, 2017
The modern organization has recognized the need to embrace mobile devices in the workplace. Some have fully implemented a bring-your-own-device (BYOD) program, while some have adopted a hybrid model of corporateowned and personally-enabled (COPE) devices. Many companies then choose to deploy an Enterprise Mobility Management (EMM) or Mobile Device Management (MDM) solution to enable some control of the mobile devices that access corporate data. For companies at this stage of mobility, security is the next critical layer. As Gartner states, It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used."
Tags : 
enterprise mobility management, mobile device management, mobile security, mobile security solutions, mobile threats
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
As the threat landscape continues to evolve, you need a practical and robust way to protect privileged access in your enterprise. Analytics that detect new threats and automatically mitigate them are a great way to achieve this. By following these four key steps as you build a PAM threat analytics solution, youll be able to establish a more comprehensive and effective approach for addressing internal and external security threats.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: Fiserv     Published Date: Nov 09, 2017
Financial institutions seeking to attract new customers and revenue channels are expanding into digital services, real-time payments and global transactions. However, with every new service, criminals are developing innovative ways to infiltrate financial systems, and older technologies that mitigate fraud no longer work as effectively. So how can financial institutions respond to this growing threat? Fortunately, more advanced technologies hold great potential for real-time financial crime mitigation. Learn about five current and emerging technologies that could impact money laundering and fraud mitigation, including artificial intelligence/machine learning, blockchain, biometrics, predictive analytics (hybrid model) and APIs. Read the latest Fiserv white paper: Five Tech Trends That Can Transform How Financial Institutions Detect and Prevent Financial Crime.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report
    
Fiserv
Published By: Red Hat     Published Date: Dec 15, 2017
Red Hat commissioned Forrester Consulting to evaluate cloud migration strategies of organizations by surveying 272 respondents and doing 4 interviews with cloud migrators at enterprises all over the world. Private cloud is still very much in the mix for enterprises actively migrating existing workloads to the public cloud. Read this paper to learn about their migration methods weighing criteria like cost and performance optimization, flexibility, speed, and methods for mitigating disruption.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Dec 15, 2017
Choosing how to build an open hybrid cloud is perhaps the most strategic decision IT leaders will make this decade. Its a choice that will determine their organization's competitiveness, flexibility, and IT economics for the next ten years. That's because, if done right, a cloud delivers strategic advantages to the business by redirecting resources from lights-on to innovation. But only an open hybrid cloud delivers on the full strategic business value and promise of cloud computing.
Tags : 
    
Red Hat
Published By: HPE APAC     Published Date: Jun 16, 2017
In this report, well look at some of the challenges that smaller organisations face in building and managing IT, along with how some businesses are leveraging a hybrid cloud and on-premise approach, gaining some significant benefits through this approach.
Tags : 
    
HPE APAC
Published By: HPE APAC     Published Date: Jun 20, 2017
What do HPEs Flexible Capacity and a kitten-penguin have in common? Theyre both hybrids, but only one is available for your IT infrastructure. Flexible Capacity lets you have it allthe scalability of the cloud and the control of on-premise infrastructure. Watch this video to find out more.
Tags : 
cloud, hybrid cloud, flexibility, infrastructure
    
HPE APAC
Published By: HPE Intel     Published Date: Mar 15, 2016
Are you asking the right questions about your data center? Would you like your IT infrastructure to be faster and more agile? Would you like to improve your cost structure? Do you plan to adopt a hybrid IT infrastructure and become a service provider for your business? To adapt to and compete in our ultra-connected, data-driven, and digital world, you need to effectively plan, build, integrate, and manage your facilities, platforms, and systems to efficiently align your infrastructure resources.
Tags : 
    
HPE Intel
Published By: HPE Intel     Published Date: Mar 15, 2016
As more enterprises adopt technologies such as cloud, mobile, and analytics to help achieve strategic competitive advantage, CIOs and IT managers must support business-critical processes at a very high level across the enterprise. At the same time, IT organizations must manage complex hybrid IT infrastructures that include both cloud and on-premises technologies from multiple vendors and support providers. IDC believes that to tackle these challenges, IT organizations should look to support providers for comprehensive offerings to help optimize IT operations and improve the efficiency of IT service delivery. In addition, IDC recommends that IT organizations looking to manage rapid change in todays IT landscape consider support providers with a record of innovative support services and a focus on advanced technology in support delivery.
Tags : 
    
HPE Intel
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
The increasing demands of application and database workloads, growing numbers of virtual machines, and more powerful processors are driving demand for ever-faster storage systems. Increasingly, IT organizations are turning to solid-state storage to meet these demands, with hybrid and all-flash arrays taking the place of traditional disk storage for high performance workloads. Download this white paper to learn how you can get the most from your storage environment.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
Youre likely fast-tracking hybrid cloud to increase agility and reduce cost. But its a challenge to define the right mix of private cloud, public cloud, and traditional IT that best drives your enterprise strategy. HPE has the right hybrid cloud expertise, technologies, and partners to get you there faster.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.