it architecture

Results 876 - 892 of 892Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Jun 22, 2017
Junipers security solutions seamlessly extend across private and public cloud architectures without compromising security, flexibility, and manageability. With midrange, high-performance, space-efficient, next-generation firewalls, smarter and faster centralized management, and highly evolved security intelligence and automation tools, Juniper Networks allows you to secure your network, keep operational costs down, and easily migrate to a hybrid cloud architecture. For more information about Junipers security solutions, please visit us at www.juniper.net/us/en/products-services/security and contact your Juniper Networks representative.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologiesincluding both public and private clouds. Youll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you wont be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : 
intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
    
Juniper Networks
Published By: VMware     Published Date: Sep 13, 2017
Download this infographic to learn how VMware Workspace ONE helps more organizations compete in the mobile cloud era by providing productivity-enhancing capabilities that are simply better. Tailored to uniquely provide both end-user mobility and IT control, VMware mobile-cloud architecture addresses the needs of todays organizations more effectively than Citrix.
Tags : 
vmware, workspace one, mobile
    
VMware
Published By: Gigamon     Published Date: Oct 19, 2017
Read Gartners research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organizations exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon
Published By: Cisco EMEA     Published Date: May 15, 2018
Miercom stata incaricata da Cisco Systems di configurare, far funzionare e quindi valutare in modo indipendente le infrastrutture di rete per campus wireless e cablate di Cisco Systems e Huawei Technologies. I prodotti di ciascun fornitore sono stati configurati e implementati rigorosamente secondo i progetti consigliati dai fornitori e utilizzando il loro rispettivo software per la gestione, il controllo, la configurazione e il monitoraggio della rete in tutto il campus.
Tags : 
    
Cisco EMEA
Published By: Group M_IBM Q1'18     Published Date: Dec 19, 2017
There can be no doubt that the architecture for analytics has evolved over its 25-30 year history. Many recent innovations have had significant impacts on this architecture since the simple concept of a single repository of data called a data warehouse.
Tags : 
    
Group M_IBM Q1'18
Published By: Group M_IBM Q418     Published Date: Oct 26, 2018
Over the past few years, business leaders have been the primary drivers of technology change, including making decisions to adopt new applications in the cloud, mandate a cloud-first strategy, offer new capabilities with an API-first strategy, and provide new applications to end users on mobile first. There are significant benefits to these cloud decisions because they decrease time to value, lower costs, and make it easier for organizations to experiment and innovate. But there are consequences as well, chiefly in the complexity of learning how to integrate applications and exchange data across a decentralized architecture that is largely driven by autonomous development decisions. This IDC White Paper answers the following questions about the need for hybrid integration: How are changes in business strategy and technology adoption requiring changes in how organizations approach integration? What are the major events that trigger integration adaptation? How are the roles involve
Tags : 
    
Group M_IBM Q418
Published By: Workday France     Published Date: Sep 19, 2018
Read this whitepaper from CIO.com to understand why cloud architecture holds the most promise for todays organisations and to gain valuable tips for evaluating cloud solutions.
Tags : 
    
Workday France
Published By: Dell Server     Published Date: Aug 08, 2018
PowerEdge servers protect your customers and business with integrated security Analysts say attacks on firmware are becoming a greater threat to systems, making a cyber-resilient server architecture essential to the modern data center. Dell EMC PowerEdge servers, powered by Intel Xeon Scalable processors, deliver comprehensive management tools and robust layers of security to protect hardware and firmware throughout the server lifecycle.
Tags : 
    
Dell Server
Published By: DigiCert     Published Date: Jun 19, 2018
Your website is your most important digital asset and so protecting it is as important as ensuring positive cash flow, paying staff salaries and keeping the lights on in the head office. Despite the threats and the importance of website security, IT department organization, goals and technology their website security architecture is often unfit for the purpose. With correct planning and strong execution, CIOs and CISOs can create a problem-solving, self-aware, agile organization that is better protected against fast-changing threats. This white paper explores the challenges they face and suggests a roadmap for change.
Tags : 
    
DigiCert
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations. The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users. This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.
Tags : 
    
Ruckus Wireless
Published By: Workday Italy     Published Date: Sep 19, 2018
Read this whitepaper from CIO.com to understand why cloud architecture holds the most promise for todays organisations and to gain valuable tips for evaluating cloud solutions.
Tags : 
    
Workday Italy
Published By: Workday Netherlands     Published Date: Sep 19, 2018
Read this whitepaper from CIO.com to understand why cloud architecture holds the most promise for todays organisations and to gain valuable tips for evaluating cloud solutions.
Tags : 
    
Workday Netherlands
Published By: Workday Spain     Published Date: Sep 19, 2018
Read this whitepaper from CIO.com to understand why cloud architecture holds the most promise for todays organisations and to gain valuable tips for evaluating cloud solutions.
Tags : 
    
Workday Spain
Published By: Attunity     Published Date: Nov 15, 2018
Change data capture (CDC) technology can modernize your data and analytics environment with scalable, efficient and real-time data replication that does not impact production systems. To realize these benefits, enterprises need to understand how this critical technology works, why its needed, and what their Fortune 500 peers have learned from their CDC implementations. This book serves as a practical guide for enterprise architects, data managers and CIOs as they enable modern data lake, streaming and cloud architectures with CDC. Read this book to understand: ? The rise of data lake, streaming and cloud platforms ? How CDC works and enables these architectures ? Case studies of leading-edge enterprises ? Planning and implementation approaches
Tags : 
    
Attunity
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
As enterprises undergo digital transformation, storage infrastructure modernization is a key focus. With new storage technologies and architectures available, CIOs have more opportunity than ever to match storage platforms with workload requirements and consolidate workloads where appropriate. This white paper focuses on evolving storage requirements in the midrange market, as enterprises look to improve efficiencies in how they handle enterprise workloads. It also discusses key midrange enterprise storage capabilities CIOs should consider as they modernize infrastructure.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
It is now apparent that three specific technology advancementsnon-volatile memory express (NVMe), NVMe over fabrics (NVMe-oF), and storage-class memory (SCM)are transformative and will end up guiding the future of high-end data storage. Each of those technologies reduce I/O latency significantly. However, organizations working to transform their data centers shouldnt regard performance as the only end goal. Great performance is important because it increases an arrays ability to handle any workload intelligently, scale to meet unpredictable demand, and operate cost efficiently. The Dell EMC PowerMax powered by Intel Xeon processor is an impressive example of this type of modern storage architecture. It has been designed deliberately to maximize the speed of NVMe and by extension, offer transformational efficiency benefits and business value.
Tags : 
    
Dell EMC Storage
Start   Previous    22 23 24 25 26 27 28 29 30 31 32 33 34 35 36     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.