private

Results 326 - 350 of 778Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: Feb 26, 2015
SteelHead SaaS offers up to 30x better application performance for cloud services and SaaS applications deployed in enterprises. The solution combines the best of WAN optimization with the best of Internet optimization to provide a seamless transition for users between private and public clouds. Customers experience application acceleration immediately, without requiring any configuration changes to the user or service provider environments.
Tags : 
sas, optimization, private clouds, public clouds, saas applications, business management
    
Riverbed
Published By: Riverbed     Published Date: Feb 26, 2015
How can IT achieve the flexibility and agility it needs to offer multiple types of applications in multiple locations? Just as enterprises take advantage of applications hosted in multiple locations (i.e., public clouds, private clouds, or SaaS applications), they take advantage of different networks for different reasons (i.e. performance, backup, remote access). These could be MPLS links, ATM links, traditional Internet connections, or VPN lines. Enterprises, in effect, are already building hybrid networks, and those combined with the elements of hybrid clouds create the hybrid enterprise.
Tags : 
private clouds, public clouds, saas applications, vpn lines, hybrid clouds, hybrid enterprise, application performance management, business intelligence, cloud computing, infrastructure
    
Riverbed
Published By: Riverbed     Published Date: Apr 24, 2015
Riverbed Technology has been addressing performance issues on private and cloud enterprise networks with Steelhead wide-area network (WAN) optimization. Since 2012, Riverbed has applied its technology to Office 365 and Salesforce with Riverbed® Steelhead® Cloud Accelerator. Steelhead Cloud Accelerator combines WAN and Internet optimization to ensure bandwidth reductions and a superior user experience.
Tags : 
microsoft office 365, riverbed technology, wide area network optimization, salesforce, cloud, networking, software development, it management, wireless
    
Riverbed
Published By: Riverbed     Published Date: Jul 21, 2015
IT organizations have been evolving their WAN connectivity strategies to align with new IT cost, resilience, and performance objectives. Hybrid WAN is a growing trend with many organizations and enterprises, enabling them to augment traditional private leased lines or MPLS-based WAN circuits with secured public Internet services to achieve their goals. Riverbed takes a holistic, application-centric approach to solving the challenges of hybrid architectures. Read how SteelHead's hybrid architecture simplifies the laborious aspect of operating in a hybrid WAN environment.
Tags : 
hybrid enterprise, app performance, wan connectivity, hybrid wan, application-centric, it management
    
Riverbed
Published By: Riverbed     Published Date: Jul 22, 2015
As enterprise computing has evolved, businesses have been shifting to a “hybrid enterprise” where core applications and data can be located in private data centers and public clouds. The growth of hybrid cloud deployments accelerated the transition to hybrid wide-area networks (WANs). Private networks, such as MPLS, are being joined by Internet connections that offer a choice in delivery channels—costly, but predictable, networks for mission-critical loads and cheaper public networks for bulk loads such as data backups.
Tags : 
hybrid enterprise, private data centers, public clouds, wans, data backups, it management
    
Riverbed
Published By: F5 Networks Inc     Published Date: May 03, 2017
Global adoption of the cloud is accelerating at a dizzying rate each year with businesses of all sizes realizing the cost-saving, flexibility, and scalability benefits of migrating and running applications in the cloud. In a 2016 survey*, F5 found that 67 percent of the respondents identified themselves as “Cloud First,” and three cloud models—private, public, and SaaS—dominated the top five IT strategic trends. As pressure to move applications to cloud and hybrid environments intensifies, IT teams must grapple with sometimes significant migration challenges. Though each migration is different, there are several common considerations to keep in mind to help you on your own cloud journey. This guide provides a blueprint to help you think through many of the long-term impacts of your migration options and establish a strong foundation for your cloud migration strategy. The end result should be a migration strategy that leaves you in a position to support your technology as your business
Tags : 
cloud, cloud computing, hybrid environment
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: May 03, 2017
Building out a dedicated infrastructure with the agility, scalability, and effciency of a public cloud—while enjoying increased levels of control and security—can help enterprises boost agility and improve operational ef?ciency. However, while most private cloud networking services provide basic load balancing functionality, they lack important application delivery features, putting the performance, availability, and security of applications at risk. As private clouds increasingly host mission-critical production applications, advanced application delivery services for layers 4 through 7 are becoming essential. End-to-end integration, orchestration, and automation of the needed application delivery networking and security services are also critical to improve application time-to-market and operational ef?ciency.
Tags : 
cloud, cloud security, efficiency, security, public cloud
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
With the cloud transforming application development and deployment—enabling organizations to improve flexibility, automate processes, and decrease time to market—some big questions remain. One of the most important issues an organization must address is how it can best employ the smarter tools and limitless scale that the cloud offers. One way that enterprises take advantage of the benefits of the cloud is by deploying their own private cloud, which is a computing model that fosters agility while allowing organizations to maintain control of their infrastructure, while better securing their applications and their data.
Tags : 
    
F5 Networks Inc
Published By: HP     Published Date: Jul 29, 2008
The data residing on your storage systems and media, data-at-rest, presents serious security concerns. Regulations and various mandates around the world are putting the burden on companies and government entities to protect the private information they store. Increasingly, companies are being required to publicly disclose breaches that put individuals private data at risk, be it a customer, employee, shareholder, partner, or other stakeholder.
Tags : 
data security, database security, securing data, customer data, consumer data, pci, cardholder data, mission critical, storage management, compliance, data protection, pci compliance
    
HP
Published By: HP     Published Date: Sep 06, 2011
This white paper will guide executives on how to simplify the process through the HP's CloudSystem Matrix, so download now.
Tags : 
storage, cloud computing, utility, converged infrastructure, private cloud, blade servers, data center design and management, green computing
    
HP
Published By: HP     Published Date: Sep 06, 2011
This Illuminata Spotlight discusses HP CloudSystem Matrix and its use as an out-of-the-box platform for private clouds suited to enterprise IT.
Tags : 
private cloud, hybrid, itsm, storage, blade servers, storage management, service management, cloud computing
    
HP
Published By: Entrust Datacard     Published Date: May 15, 2014
The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015. Existing certificates containing non-FQDN names will be revoked by all public CAs by October 1, 2016. Entrust provides a straightforward option that allows the continued use of non-registered names by deploying cost-effective Entrust Private SSL Certificates.
Tags : 
entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud, networking, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015.
Tags : 
ssl certifications, fqdn, non-registered names
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes.
Tags : 
defending, enterprise, data security, protection, private identity, information transactions, trust, authentication, identity assurance, security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, network security, wireless security
    
Entrust Datacard
Published By: Appian     Published Date: Sep 15, 2010
This report examines the implementation of technology from Appian within Pinnacle People, a private provider of welfare-to-work services to the UK Government.
Tags : 
appian, bpm implementation, business process management, pinnacle people, business management, business process automation
    
Appian
Published By: PC Mall     Published Date: Jun 22, 2011
In this IBM white paper, the term cloud computing is defined, along with the distinguishing advantages and disadvantages of different types of cloud deployments.
Tags : 
cloud services, saas, public cloud, private cloud, hybrid cloud, pc mall, ibm, cloud computing, infrastructure
    
PC Mall
Published By: PC Mall     Published Date: Jun 22, 2011
This Cisco white paper addresses the power of the cloud, Cisco's vision for the cloud and provides valuable customer use cases.
Tags : 
cloud services, software as a service, private clouds, public clouds, hybrid clouds, cisco, pc mall, infrastructure, virtualization, cloud computing
    
PC Mall
Published By: PC Mall     Published Date: Jun 22, 2011
This white paper from Microsoft discusses the underlying economics driving the transition from mainframe to client/servers. The economics of the cloud, by using in-depth modeling, is also reviewed to better understand the long-term IT landscape.
Tags : 
cloud computing, virtualized datacenter, network security, private cloud, public cloud, application security, internet security, intrusion prevention, security management, virtualization, infrastructure
    
PC Mall
Published By: Layered Tech, Inc.     Published Date: Dec 16, 2010
Layered Tech's engineers created a customized package of virtual private data centers (VPDCs), managed services and disaster recovery solutions that support KANA's clients, large and small. Layered Tech tailored the architecture to meet the highest enterprise security requirements, as well as ensuring that each KANA client can deploy applications that scale to ongoing volume fluctuations.
Tags : 
layered tech, kana, virtual private data center, enterprise security, vpdc, disaster recovery, customer interaction, grid computing, servers, customer relationship management, colocation and web hosting
    
Layered Tech, Inc.
Published By: Red Hat     Published Date: May 17, 2012
Virtualization is typically the foundation for and path to the cloud, but by itself can result in virtual machine sprawl and new silos. Red Hat CloudForms, can be used to automate an IT infrastructure, but it's important to set policies up-front.
Tags : 
cloud, cloud computing, private, public, hybrid, risks, benefits, infrastructure, iaas, private infrastructure, red hat, infrastructure-as-a-service, virtualization, open source, networking
    
Red Hat
Published By: Red Hat     Published Date: May 17, 2012
This paper, the first in a series of 4, offers practical advice for cutting through the clutter and getting started with a private or hybrid cloud strategy that successfully builds on your current data center.
Tags : 
networking, virtualization, cloud computing, infrastructure
    
Red Hat
Published By: Red Hat     Published Date: May 17, 2012
By working with users, IT can make an organization's use of public and hybrid clouds a useful complement to in-house IT rather than a renegade operation that increases an organization's risks and costs.
Tags : 
networking, virtualization, cloud computing, infrastructure
    
Red Hat
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.