icr

Results 351 - 375 of 1723Sort Results By: Published Date | Title | Company Name
Published By: CloudHealth by VMware     Published Date: Aug 26, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if youre working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if youre working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: Cloudroute     Published Date: Jun 01, 2016
Most companies are have decided they need the business agility and the cost savings that come when moving to the cloud with nearly 90 percent of businesses having adopted the cloud in some capacity. But with the bewildering amount of contradictory opinions and information floating around on the Internet, not many understand exactly what that means or what it entails. Companies considering Microsoft Office 365 as their first step in moving applications to hosted solutions face similar inconsistencies, making it difficult to separate fact from fiction. For example, some businesses incorrectly believe Office 365 is simply a version of Office accessed by a browser. Astonishing right!
Tags : 
    
Cloudroute
Published By: Cohesity     Published Date: Oct 02, 2018
Public cloud expansion will continue to see double digit growth over the next five years according to IDC. Making the public cloud interoperable with on-premises solutions needs to be part of your hybrid cloud strategy for secondary data workloads. Legacy solutions, however werent architected with the cloud in mind. They require use of cloud gateways and dont scale well in the cloud. Cohesity integrates with Amazon Web Services, Microsoft Azure, and Google Cloud Platform to extend your on-premises data protection solution to these public cloud services. Our built-in cloud capabilities give you flexibility to use the cloud for multiple use cases. Download the solution brief for more details.
Tags : 
solution, brief, enterprise, grade, capabilities, public, cloud, data
    
Cohesity
Published By: Cohesity     Published Date: Aug 09, 2019
In a context of mass data fragmentation on-premises and in the cloud, organizations now struggle with the compounded complexities brought about by modern workloads such as containers, NoSQL/NewSQL databases, and SaaS applications. These new workloads are turning traditional backup and recovery approaches on their headin particular, in Microsoft Office 365 deployments for which new backup, recovery, and data management schemas must be deployed.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Aug 09, 2019
IT organizations everywhere are undergoing significant transformation to keep pace with the needs of their businesses. Theyre tasked with consolidating data centers and migrating both workloads and data to the cloud. The transition has been easier for some than others. As hybrid architectures increasingly become the norm, how are enterprises gaining complete visibility, simplifying management, and making use of all of their databoth on-premises and in the cloud? Five enterprises explain how theyve replaced multiple products that created legacy data silos with Cohesity a single, hyperconverged softwaredefined platform with native Microsoft Azure integration for simplified secondary data and applications. For them, Cohesity and Azure together boost IT agility while lowering costs, solving critical secondary data challenges from long-term retention, storage tiering, test/dev, disaster recovery and cloud-native backup in a proven hybrid cloud architecture.
Tags : 
    
Cohesity
Published By: CommonTime     Published Date: Apr 02, 2008
Many companies that have already invested in IBM Lotus Domino/Notes for their business communications now look to achieve the business benefits that are delivered by mobility solutions. To address this challenge, CommonTime has partnered with Microsoft® to combine key elements our best-of-breed Lotus Domino/Notes mobility solution for Windows Mobile devices with Microsoft’s System Center Mobile Device Manager 2008 (MDM).
Tags : 
wireless device management, mobile device management, mobile workers, asset management, commontime, wireless, mobile computing, wireless hardware
    
CommonTime
Published By: Concentric     Published Date: Mar 27, 2009
Email, calendaring, collaboration, and mobility solutions are moving from corporate data centers to service provider networks. Service providers can realize far greater economies of scale than most businesses and deliver higher levels of service to more users at a lower cost; in fact, the fewer the users, the higher cost for each. Concentric Hosted Exchange is a fast, reliable and affordable solution for email, calendaring, collaboration, and mobility based on Microsoft® Exchange Server 2007 Service Pack 1 (SP1) and Microsoft Outlook® 2007. Concentric Hosted Exchange provides all of the benefits of Microsoft Exchange and Outlook 2007 without the up-front infrastructure costs or ongoing overhead.
Tags : 
concentric, hosted exchanged, email, calendaring, collaboration, mobility, corporate data centers, service provider networks
    
Concentric
Published By: Concentric     Published Date: Mar 27, 2009
Email has become something of a critical utility, much like the electricity that powers our offices: it must be available 24 hours a day, it must provide reliable performance, and its cost must be reasonable. However, unlike electrical systems (at least from the user’s perspective), email systems require significant amounts of labor to manage well. Email systems must periodically be upgraded. New hardware must be introduced as organizations migrate to new systems. Security must be maintained and upgraded to protect the system from intrusions. Additional hardware must be deployed to protect against outages that could seriously harm user productivity. Plus, unexpected events, such as spam storms or natural disasters can drive up costs substantially in ways that were not anticipated.
Tags : 
concentric, email options, critical utility, killer app, small and mid-sized businesses, smbs, on-premise email solution, on-premise email costs
    
Concentric
Published By: CoreSite     Published Date: May 29, 2019
This research report shows the statistics behind U.S. based Media and Entertainment organizations adoption of data storage and compute solutions. Touching on the latest trends and specifically researched for the IT departments to see how their peers and competitors are investing to reach future business and technology goals.
Tags : 
colocation, interconnection, scalable, solutions, data, data store, data storage, compute
    
CoreSite
Published By: Coupa     Published Date: Dec 14, 2018
Visibility remains a huge challenge for CFOs in todays dynamic and ever-evolving business environment. A study of more than 500 CFOs and senior finance executives conducted by the Economist Intelligence Unit (EIU) and commissioned by Coupa, reveals that more than 60 percent of CFOs lack complete visibility into the transactions within their organization. Sound familiar? Read the report to learn how CFOs are responding in a rapidly evolving world where new technologies, uncertainty, and emerging threats abound. The report also includes five qualitative interviews with the CFOs from Ally Financial, Driftwood Acquisitions and Development, Hays, Micron Technologies, and Zendesk.
Tags : 
    
Coupa
Published By: Curalate     Published Date: Jan 09, 2017
How to build relationships with Instagram stars, bloggers and social experts to gain audience and drive engagement. Download now!
Tags : 
instagram, social media, brand ambassador, micro-influencer
    
Curalate
Published By: Cyren     Published Date: Oct 17, 2018
An Osterman Research Survey Report
Tags : 
office 365, it security, cybersecurity, web security, phishing, microsoft office
    
Cyren
Published By: Cyren     Published Date: Oct 17, 2018
An Osterman Research Survey Report
Tags : 
office 365, it security, cybersecurity, web security, phishing, microsoft office
    
Cyren
Published By: DataDirect Technologies     Published Date: Mar 17, 2009
Connecting to a database requires a number of independent layers. The application needs to incorporate software that establishes the connection and calls to the database. A database connectivity layer needs to be in place to help manage security, communications, and data flow with the database. The database has a set of interfaces that help translate the client requests into actions within the database engine. And with the advent of .NET, the costs of managed versus non-managed code must also be considered.
Tags : 
.net, data direct, microsoft .net architecture, scaling, effective architectural design, virtual machine, intermediate language, component object model
    
DataDirect Technologies
Published By: Datadog     Published Date: Feb 10, 2016
With thousands of companies using Datadog to track their infrastructure, we can see software trends emerging in real time. Today we're excited to share what we can see about true Docker adoptionno hype, just the facts.
Tags : 
datadog, docker, software trend, information technology, data management, kubernetes, container, microservices
    
Datadog
Published By: DataMotion     Published Date: Oct 20, 2008
Almost every task one performs at work includes the exchange of information in one form or another and much of that is exchanged via email and its attachments. Yet too many enterprises view e-mail as a mature technology that simply accomplishes a rather mundane but necessary task, taking e-mail for granted. They rarely seek to leverage it beyond its most fundamental function. However, the messaging services that form the basis of e-mail are far more valuable than the e-mail itself, and can be used innovative ways to save time and money in our every day tasks. Download to learn more.
Tags : 
certifiedmail, datamotion, microsoft exchange, security, e-mail security, maintenance, email security, security management
    
DataMotion
Published By: DataStax     Published Date: Nov 02, 2018
In this eBook, well take a look at why DataStax and Azure combine to make the ideal hybrid operational cloud database for the modern application needs of many of our large enterprise customers. The eBook explains how digital disruptors like Microsoft, Komatsu, and IHS Markit are leveraging the DSE+Azure hybrid cloud database to build game-changing applications built for the Right-Now Economy.
Tags : 
    
DataStax
Published By: Datastax     Published Date: Mar 06, 2018
Digital disruptors are giving customers the information they want, when, where, and how they want it, resulting in a fundamental shift in customer expectations and how enterprises deliver value. Enterprises are in a race to set themselves apart from the competition and meet soaring customer demands, resulting in the rise of modern applications. Whether its for purchasing clothes, groceries, or software, companies and customers alike expect these applications to perform at a certain standard all the time.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Jun 26, 2018
In this eBook, well take a look at why DataStax and Azure combine to make the ideal hybrid operational cloud database for the modern application needs of many of our large enterprise customers. The eBook explains how digital disruptors like Microsoft, Komatsu, and IHS Markit are leveraging the DSE+Azure hybrid cloud database to build game-changing applications built for the Right-Now Economy.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Jul 02, 2018
In this eBook, well take a look at why DataStax and Azure combine to make the ideal hybrid operational cloud database for the modern application needs of many of our large enterprise customers. The eBook explains how digital disruptors like Microsoft, Komatsu, and IHS Markit are leveraging the DSE+Azure hybrid cloud database to build game-changing applications built for the Right-Now Economy.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
In this eBook, well take a look at why DataStax and Azure combine to make the ideal hybrid operational cloud database for the modern application needs of many of our large enterprise customers. The eBook explains how digital disruptors like Microsoft, Komatsu, and IHS Markit are leveraging the DSE+Azure hybrid cloud database to build game-changing applications built for the Right-Now Economy.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 27, 2018
In this eBook, well take a look at why DataStax and Azure combine to make the ideal hybrid operational cloud database for the modern application needs of many of our large enterprise customers. The eBook explains how digital disruptors like Microsoft, Komatsu, and IHS Markit are leveraging the DSE+Azure hybrid cloud database to build game-changing applications built for the Right-Now Economy.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 28, 2018
In this eBook, well take a look at why DataStax and Azure combine to make the ideal hybrid operational cloud database for the modern application needs of many of our large enterprise customers. The eBook explains how digital disruptors like Microsoft, Komatsu, and IHS Markit are leveraging the DSE+Azure hybrid cloud database to build game-changing applications built for the Right-Now Economy.
Tags : 
    
Datastax
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.