it architecture

Results 101 - 125 of 892Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC
Published By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
    
Akamai Technologies
Published By: Department for International Trade     Published Date: Feb 09, 2018
The UK is recognised around the world for its unique character and the strength of its creative industries. Were renowned for great storytellers, from Shakespeare to Dickens, Orwell to J.K Rowling; for our world-famous musicians, from Coldplay to Queen, The Beatles to Adele; for our fantastic actors; our striking modern architecture; our leadership in fashion and design, matched by high quality craftsmanship; our witty and effective advertising, genre-defining publishing; and our globally important digital games industry.
Tags : 
creativity, industries, investments, marketplace
    
Department for International Trade
Published By: IFS     Published Date: Aug 11, 2011
ERP software is often criticized for being complex and difficult to use. Learn how to evaluate ERP software for usability.
Tags : 
ifs, usability, erp selection criteria, enterprise resource planning, enterprise application selection, modern soa-based architecture, enterprise application search, web-type navigation, enterprise software, system management software
    
IFS
Published By: IFS     Published Date: Jun 25, 2014
The wrong ERP can actually diminish agility. Learn to select ERP with service oriented architecture (SOA) to increase enterprise agility.
Tags : 
ifs, erp. soa, agility, enterprise software, application architecture, it management, enterprise applications
    
IFS
Published By: Infor     Published Date: Aug 04, 2011
AB World Foods has a highly complex supply chain, driven in part by the nature of its globally sourced and distributed products as well as by the demands of growth and acquisition. With Infor SCM Demand Planning, the company cut costs while also improving service levels.
Tags : 
infor, ab world food, scm, enterprise business software, customer relationship management, enterprise asset management, enterprise resource planning, financial management, human capital management, product lifecycle, supplier relationship, supply chain management, business-specific inventory, transportation logistics, warehouse software, service oriented architecture, enterprise software, product lifecycle management, data warehousing
    
Infor
Published By: Infor     Published Date: Aug 04, 2011
Find out what characteristics you should take into account when selecting Sales and Operations Technology and how Infor10 Sales & Operations Planning respond to those needs today.
Tags : 
infor, aberdeen, s&op, infor10, sales and operations, sales & operations, scm, enterprise business software, customer relationship management, enterprise asset management, enterprise resource planning, financial management, human capital management, product lifecycle, supplier relationship, supply chain management, business-specific inventory, transportation logistics, warehouse software, service oriented architecture
    
Infor
Published By: Infor     Published Date: Aug 04, 2011
Find out why manufacturers and distributors are rethinking warehouse management and why these best-in-class performers are investing in advanced warehouse management solutions to strengthen their competitive market positions.
Tags : 
infor, scm, enterprise business software, warehouse, warehouse management, costs, customer relationship management, enterprise asset management, enterprise resource planning, financial management, human capital management, product lifecycle, supplier relationship, supply chain management, business-specific inventory, transportation logistics, warehouse software, service oriented architecture, enterprise software, product lifecycle management
    
Infor
Published By: Pega     Published Date: Jun 21, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases.
Tags : 
    
Pega
Published By: Silver Peak     Published Date: Sep 26, 2016
In this eGuide, Network World and Computerworld explore the trends in software-defined networks and offer in-depth advice on addressing the key limitations of todays VPNs. See how software-defined WANs could help your company maximize its investments in the cloud and address todays hyper-connected, cloud-based environments demanding greater agility and efficiency.
Tags : 
sd-wan, networking, it management, network architecture, silver peak
    
Silver Peak
Published By: Silver Peak     Published Date: Sep 26, 2016
As enterprise IT considers ways to improve WAN functionality and service levels while lowering costs, the interest in SD-WANs has dramatically increased. But not all SD-WANs are created equal. As new applications emerge, whether hosted on premise or in the cloud, demands on WAN throughput, efficiency, and reliability increase. Performance-driven SD-WANs significantly improve application performance and Quality of Service (QoS) making it even easier for enterprises to justify adopting SD-WAN solutions.
Tags : 
sd-wan, networking, it management, network architecture, silver peak
    
Silver Peak
Published By: Silver Peak     Published Date: Feb 06, 2017
As enterprise IT considers ways to improve WAN functionality and service levels while lowering costs, the interest in SD-WANs has dramatically increased. But not all SD-WANs are created equal. As new applications emerge, whether hosted on premise or in the cloud, demands on WAN throughput, efficiency, and reliability increase. Performance-driven SD-WANs significantly improve application performance and Quality of Service (QoS) making it even easier for enterprises to justify adopting SD-WAN solutions.
Tags : 
sd-wan, networking, it management, network architecture, silver peak
    
Silver Peak
Published By: Cisco     Published Date: Mar 17, 2017
This paper considers how IT must meet the challenge of devising a datacenter strategy that transforms the datacenter for a multicloud world.
Tags : 
digital transformation, hybrid cloud, data centers, infrastructure, architecture, operations, cloud applications
    
Cisco
Published By: Cisco     Published Date: Mar 17, 2017
Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe. Read on to find out how Cisco's Architecture can enable Digital Transformation.
Tags : 
digital transformation, architecture, business processes, best practices, customer engagement, employee engagement
    
Cisco
Published By: Cisco     Published Date: Mar 21, 2017
Learn 5 ways Cisco Digital Network Architecture helps bridge the gap between technology strategy and business strategy so you can grow at the speed of digital.
Tags : 
digital transformation, digital network architecture, dna, operations, innovation, technology strategy, business strategy, simplicity
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
Digital transformation isnt a technology or a product. Rather, its a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe. Read on to find out how Cisco's Architecture can enable Digital Transformation.
Tags : 
digital transformation, architecture, business processes, best practices, customer engagement, employee engagement
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeedor even survivethey must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
Cisco
Published By: NetApp     Published Date: Dec 05, 2016
This architectural comparison provides an overview of EMCs XtremIO architecture as it compares to SolidFires series of all-flash arrays.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Dec 05, 2016
This architectural comparison includes general information about the Pure Storage architecture as it compares to SolidFire.
Tags : 
    
NetApp
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, its not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology, data management, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, its not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid, access control, application security, email security, internet security, network security appliance, security management, security policies, vulnerability management
    
Blue Coat Systems
Published By: Red Hat     Published Date: Dec 09, 2013
Businesses are tapping into the innovative potential of their companies with Red Hat Enterprise Linux. Standardize your enterprise platform across multiple hardware architectures, hypervisors and cloud providers to help IT meet the needs of your business.
Tags : 
red hat, data, mobile, cloud, it congestion, deliver flexibility, business expectations, disparate hardware, data management, best practices, business activity monitoring, business management, business process management, it spending
    
Red Hat
Published By: Red Hat     Published Date: May 01, 2013
A recent IDG Quick Poll reveals that enterprise decision makers understand OpenStack can help them build open-source systems. However, the challenges of deploying OpenStack make the Red Hat portfolio of open and hybrid technologies critical to getting up and running.
Tags : 
red hat, openstack, open-source architect, infrastructure-as-a-service, cloud computing, standard hardware, deployment, cloud providers, public clouds, virtual architecture, hybrid cloud portfolio, infrastructure, best practices, business activity monitoring
    
Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.