infrastructure management

Results 451 - 475 of 687Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and severity of cyberattacks continue to grow with no end in sight, cybersecurity teams are implementing new tools and processes to combat these emerging threats. However, the oneoverriding requirement for meeting this challenge is improved speed. Whether its speed of detection, speed of remediation or other processes that now need to be completed faster, the ability to do things quickly is key to effective cybersecurity. The reason why speed is essential is simple: As the dwell time for malware increases, the lateral spread of an attack broadens, the number of potentially breached files expands, and the difficulty in remediating the threat increases. And the stealthy nature of many of the newer threats makes finding them faster?before they become harder to detect?a critical focus in reducing the impact of an intrusion. These requirements make it essential that security operations centers (SOCs) can complete their activities far more quickly, both now and moving forwa
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
The Security Operations Center (SOC) is the first line of defense against cyber attacks. They are charged with defending the business against the many new and more virulent attacks that occur all day, every day. And the pressure on the SOC is increasing. Their work is more important, as the cost of data breaches are now substantial. The Ponemon Institutes 2017 Cost of Data Breach Study says the average cost of an incursion is $3.62 million. The study also says larger breaches are occurring, with the average breach impacting more than 24,000 records. And with new regulations such as the EUs General Data Protection Requirement (GDPR) putting stiff financial penalties on breaches of personal data, the cost of a breach can have material impact on the financial results of the firm. This trend toward increasingly onerous statutory demands will continue, as the U.S. is now considering the Data Privacy Act, which will bring more scrutiny and accompanying penalties for breaches involving
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
Cybercrime has rapidly evolved, and not for the better. What began in the 1990s as innocent pranks designed to uncover holes in Windows servers and other platforms soon led to hacker Kevin Mitnick causing millions of dollars in malicious damages, landing him in prison for half a decade and raising the awareness of cybersecurity enough to jump-start a multimillion-dollar antivirus industry. Then came the script kiddies, unskilled hackers who used malicious code written by others to wreak havoc, often just for bragging rights. If only that were still the case.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: Kaseya     Published Date: Mar 01, 2010
This fact-filled white paper presents the top ten IT management pain points and the solutions for making your life easier.
Tags : 
kaseya, it system management, pain points, infrastructure, automation framework, management software, virtualization, storage virtualization
    
Kaseya
Published By: Kaseya     Published Date: Jun 11, 2010
FREE Event: Learn about the benefits of the NHS Infrastructure Maturity Model* (NIMM) and IT Automation.
Tags : 
kaseya, nhs infrastructure maturity model, nimm, it automation platform, system management
    
Kaseya
Published By: Kaseya     Published Date: Feb 16, 2011
From dealing with rogue "IT hobbyists" to nave bosses, Kaseya presents common IT systems management pain points in the education industry and our solutions.
Tags : 
kaseya, education it systems management, pain points, it infrastructure management, computing, infrastructure, business management, itil
    
Kaseya
Published By: Kaseya     Published Date: Mar 12, 2015
To get the most out of their computer automation initiatives, financial institutions must take a step back, assess their current IT environments, adjust as needed and make important decisions regarding the future of their IT infrastructures.
Tags : 
financial institutions, it automation, it environments, it infrastructure, maintenance, network compliance, network security, software management
    
Kaseya
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : 
kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud
    
Kaspersky Lab
Published By: LANDesk     Published Date: Jan 12, 2009
The purpose of this paper is to present a method for reducing risk and increasing IT contribution during uncertain times and to assist readers with measuring the value and building a business case for IT Service Management (ITSM).
Tags : 
avocent, itsm, it service management, itil, it infrastructure library, green it, business management, maturity model
    
LANDesk
Published By: LANDesk     Published Date: Apr 06, 2009
Implementing the ITIL set of guidelines to aid the implementation of a lifecycle framework for IT Service Management is now a major priority for a growing number of organizations, but remains a task where external help is often of critical importance.
Tags : 
itil, avocent, landesk, lifecycle, configuration management database, cmdb, it infrastructure library, kpi
    
LANDesk
Published By: LANDesk     Published Date: Aug 26, 2009
Service management solutions have the potential to return very significant hard-currency ROI. Successful implementations dramatically improve decision accuracy, enhance productivity, increase operating efficiency and reduce operational risk by providing comprehensive context for a wide range of management decisions.
Tags : 
avocent, itsm, it service management, itil, integration, sla, it infrastructure library, green it
    
LANDesk
Published By: Landis + Gyr     Published Date: May 30, 2017
Learn how five asset management strategies have evolved to unlock real-time data. Today, many utilities are developing transformative, data-driven asset management strategies that build on their advanced metering infrastructure (AMI) investments. The results? Improved reliability, customer satisfaction, efficiency, and long-term planning. In this white paper, we examine the relationship between asset management and technology: How technology advances have driven the evolution of asset management 5 asset management strategies built on real-time data How you can prepare for a distribution-centric world
Tags : 
asset management, analytics, data, ami, landis
    
Landis + Gyr
Published By: Lenovo     Published Date: Jul 07, 2015
"Lenovo XClarity is a new centralized systems management solution that helps administrators deliver infrastructure faster. This solution integrates easily into Lenovo System x M5 and X6 rack servers and the Lenovo Flex System all powered by Intel Xeon processors providing automated discovery, monitoring, firmware updates, configuration management, and bare metal deployment of operating systems and hypervisors across multiple systems. Lenovo XClarity provides automated resource management with agentless, software virtual appliance architecture. It features an intuitive graphical user interface. Download now to find out more about Lenovo XClarity! Sponsored by Lenovo and Intel"
Tags : 
lenovo, xclarity, server value, system management, automated discovery, configuration management, software development, it management
    
Lenovo
Published By: Lenovo     Published Date: Jul 07, 2015
Lenovo Flex System powered by Intel Xeon processors is the newest blade infrastructure design with the attributes that support soft ware-defi ned infrastructure and virtualization better than any competitor. It delivers key benefits better than any competitor: Reduces capital and operational costs with consistent hardware/software deployment and the ability to simply scale workloads with the highest VM capacity and performance. Increases agility with simplified rapid deployment and ongoing management to add, change, or move workloads with their associated resources. Improves efficiency and increases space, power, and cooling with the leading compute, storage, and network density. Download Now! Sponsored by Lenovo and Intel"
Tags : 
lenovo, flex system, network density, operational costs, software deployment, software development, it management, knowledge management
    
Lenovo
Published By: Lenovo - APAC     Published Date: Feb 01, 2019
Hyperconverged Infrastructure eBook Guide for the Enterprise Abstract. Business expectations and demands on the data center are increasing and the impact on todays data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that theyre always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Feb 01, 2019
Hyperconverged Infrastructure eBook Guide for the Enterprise Abstract. Business expectations and demands on the data center are increasing and the impact on todays data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that theyre always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Feb 01, 2019
Business expectations and demands on the data center are increasing and the impact on todays data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that theyre always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand how HCI can Provide the resilience, scalability and performance to
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo and Intel     Published Date: Oct 14, 2016
Nutanix + Lenovo = Hyperconverged Leaders This white paper from IDC provides a key resource for detailing the use cases for Hyperconverged, offering an overview of the landscape and a deep-dive into the use case for Nutanix + Lenovo as a leader in the marketplace. Get the whitepaper and start building your business case for Hyperconverged
Tags : 
hyperconverged infrastructure, data organization, data management, datacenter, database development, data warehousing
    
Lenovo and Intel
Published By: Logicalis     Published Date: Jul 02, 2014
This was a live discussion that took place on May 15th, 2014. Our experts discussed what should be top-of-mind as you seek a Cloud or Infrastructure as a Service (IaaS) provider.
Tags : 
logicalis, iaas, infrastructure-as-a-service, iaas market, it management, infrastructure management, infrastructure
    
Logicalis
Published By: Logicalis     Published Date: Aug 29, 2014
Download this whitepaper to learn 4 way your healthcare organization can benefit from a healthcare access solution.
Tags : 
logicalis, healthcare access solution, healthcare it, hit, virtual desktop infrastructure, single sign on, byod, managed services
    
Logicalis
Published By: Logicalis     Published Date: Sep 22, 2014
Watch this live dicussion between Eric Brooks, Logicalis Solution Architect, and 20-year technology industry veteran, Jeff Raylea, to learn more insight on the topic.
Tags : 
cisco, logicalis, iaas, infrastructure-as-a-service, iaas market, it management, infrastructure management, cloud computing
    
Logicalis
Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Heres what you need to know about memory-based attacksand how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
Lumension
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This webcast will cover the best practices & benefits of virtualization & consolidation strategies.
Tags : 
virtualization and consolidation, mainline information systems, server, storage virtualization, tco, roi, security, servers
    
Mainline Information Systems
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.