adaptable

Results 1 - 25 of 48Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Sep 10, 2019
Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential. This paper will: • Briefly cover security research challenges in today’s threat landscape • Explain why DNS resolution data is a rich resource for security research • Describe how Akamai teams use DNS data and data science to create better threat intelligence • Discuss improvements in threat coverage, accuracy, and responsiveness to today’s agile threats
Tags : 
    
Akamai Technologies
Published By: Backupify     Published Date: Jul 15, 2013
Data that once lived in basements and backrooms is being moved to cloud-based servers and SaaS applications. Historically, data backup has always been a key component of any IT strategy – whether it was stored on floppy disks, duplicate servers, or in custom built applications. With this shift to the cloud, backup shouldn’t be taken out of the strategy; rather, it should be re-thought to be more adaptable and cost-effective –the same reason you moved to the cloud in the first place.
Tags : 
cloud, backup, saas, it strategy
    
Backupify
Published By: CDW     Published Date: Aug 04, 2016
Podcast Series by Hewlett Packard Enterprises and CDW CDW hosted a discussion among several data center experts. Listen to the discussion as these experts address a number of important questions such as: - What is a modern data center infrastructure? - How do IT leaders establish an infrastructure that is fast, agile, flexible and adaptable? - What will the data center of the future look like?
Tags : 
best practices, podcast, enterprise, data center, technology, infrastructure, business analytics, business management
    
CDW
Published By: Cisco     Published Date: Sep 15, 2015
Cisco Systems, with 75,000 employees and annual revenue of close to $50 billion, is a major multinational supplier of networking solutions. In addition to supplying networking solutions that businesses use to run their own datacenters, Cisco is constantly seeking to simplify and optimize its own IT infrastructure to make it more adaptable and innovative and to better provide itself with a competitive advantage.
Tags : 
applications, systems integration, cloud, development, network architecture, network management, network performance, network performance management
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Hyperconvergence has been receiving a tremendous amount of attention because it represents the next step in the evolution of IT resource delivery. This technology takes the idea of integrating compute, storage and networking that started with converged systems design and has improved on those architectures by adding deeper levels of abstraction and automation. Hyperconverged infrastructure (HCI) vendors promise simplified operation and the ability to quickly and easily expand capacity by deploying and launching additional modules; simplicity has been the key selling point for the HCI pioneers. As HCI ventures even deeper into the enterprise and cloud environments, the architectures will need to become more efficient, agile and adaptable to help IT professionals shoulder the burden of rapidly growing data sets and workloads. This report discusses the benefits of HCI and the enhancements that must be made to expand HCI deeper into the mainstream enterprise datacenter.
Tags : 
    
Cisco
Published By: Cisco Spark     Published Date: Feb 08, 2017
Emerging trends and disruptions that will impact the way businesses communicate and work in the future. The goal, in essence, is to reaffirm the need to invest in a comprehensive suite that is secure, adaptable and easy-to-use for everyone.
Tags : 
    
Cisco Spark
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 and both Oracle and BEA have collaborated on delivering market-leading Application Delivery Networking solutions. For BEA WebLogic Server 10, F5 has designed an integrated and adaptable network platform for delivering WebLogic applications across the LAN and WAN. The result is an intelligent and powerful solution that secures and speeds your WebLogic deployment today, while providing an optimized architecture for the future.
Tags : 
oracle, bea, weblogic applications, weblogic deployments, optimized architecture, networking, platforms, network architecture
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
iControl provides the means by which F5's BIG-IP platform can be automated, integrated, and flexible such that it can adapt in real-time to changing network and application infrastructure conditions inside and outside the data center. Whether you are building out a new infrastructure or adapting to new technology, using iControl can enable unprecedented levels of control over and visibility into the application delivery process.
Tags : 
enhancement, feature, big-ip, application delivery controller, adaptable, dynamic, device, system
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Apr 18, 2012
VDI deployments offer tremendous advantages but can also impact server and network resources significantly.  A complete VDI solution should deliver a reliable, high-performing desktop user experience while taming complexity and supporting scalability within a secure, stable framework.
Tags : 
vdi, vmware view, citrix, xenapp, xen desktop, virtual desktop infrastructure, big-ip, application delivery controllers
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As signaling and scrubbing technology evolve (and as your solutions become more and more adaptable), DDoS attacks will become less effective and less attractive to would-be adversaries. The time will soon come when a 1 Tb attack from an IoT botnet will seem like a mere annoyance, rather than a catastrophic event—if you even notice it at all. So how do you get there faster? Plan ahead by designing a defense in-depth DDoS strategy and partner with a trusted security provider to handle the large attacks. Upfront preparation will pay off when the threat of DDoS attacks no longer keeps you up at night.
Tags : 
strategy, ddos, spam, technology, solutions
    
F5 Networks Inc
Published By: ForgeRock     Published Date: Oct 08, 2014
Customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before. Forrester finds that to achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity. Fortunately, a new consumer-facing solution is gaining currency and has earned a name unto itself: Identity Relationship Management.
Tags : 
customer focused, content, access management, consumer-facing solution, iam platform, enterprise applications
    
ForgeRock
Published By: ForgeRock     Published Date: Mar 10, 2015
In the modern age, customers are in control of when, where, and how they consume information. In this environment, customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before, and to gather as much data and insight from these interactions as possible. To achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity— not typical characteristics of employee-facing IAM, but all too typical of other systems of engagement. This species of solution is worthy of a unique name: identity relationship management (IRM).
Tags : 
iam, irm, forrester, forgerock, platforms, relationship management, software development
    
ForgeRock
Published By: Gigamon     Published Date: Dec 13, 2018
Perimeter-based solutions for network security do not work, leading to tool sprawl and performance issues. Read CSO Magazine’s interview with Gigamon CISO, Simon Gibson, to learn why a new, more intelligent approach is needed to build resilience into technology operations. “Security Should Be an Enabler” talks about an architectural approach that distributes only relevant data to appropriate tools, enabling an adaptable, simplified model at a reduced cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Download the Gigamon white paper, "Addressing the Threat Within: Rethinking Network Security Deployment," to learn how evolving cybersecurity threat conditions are changing the trust model for security. See how a structured and architectural approach to network security gives security solutions better access to network traffic while enabling them to scale cost effectively. Learn how a security delivery platform can be the foundational building block for deploying adaptable security solutions. Read now.
Tags : 
    
Gigamon
Published By: HP Inc.     Published Date: Jun 20, 2019
As workplace technology continues its rapid evolution, IT teams face new complexities at every turn. Luckily the adaptable new service model, DaaS, is perfectly placed to help them overcome these challenges, bringing simplicity, flexibility and new opportunities for innovation.
Tags : 
    
HP Inc.
Published By: IBM     Published Date: Sep 10, 2009
What do the new ITIL® standards mean for a small business? This view into ITIL best practices in service management shows how you can maximize the business value of your technology. With an adaptable approach, aligning IT operations with business goals to achieve desired results for customers.
Tags : 
itilv3, ibm, value, itil, best practice, cobit, coit, etom
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : 
ibm, banking, mobility, risk, mitigation, security
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : 
security, mobile risk mitigation, mobile baking, detect fraud, application security, hacker detection, identity management, intrusion detection
    
IBM
Published By: IBM     Published Date: Nov 04, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : 
mobility, mobile risk, security, mitigation
    
IBM
Published By: IBM     Published Date: Jan 09, 2015
This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.
Tags : 
best practices, it security, cloud infrastructure services, it business solutions, knowledge management, enterprise applications, data management, data center
    
IBM
Published By: IBM     Published Date: Jan 20, 2016
To succeed in the digital era, you have to be totally in sync with the behavior and preferences of your customers in a fast-changing landscape. You have to be quick and adaptable.
Tags : 
ibm, cmo, challenge, business, roi, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : 
ibm, mobile, mobility, mobile risk mitigation, security, mobile computing, mobile data systems, wireless security
    
IBM
Published By: IBM     Published Date: Jun 07, 2017
Read this eBook to get insight on the essential elements of a modernized B2B integration architecture. Companies need a strategy as they think about modernizing their B2B integration capabilities. This eBook describes what to look for and how IBM can help. You’ll learn about: · Operating a single, secure B2B integration gateway · Simplified onboarding and partner management. · High availability business operations and disaster recovery · Adaptable capabilities to help react to changes to your business processes · Visibility and analytics that provide actionable insight over those processes · Supporting a mix of hybrid deployment models including on-premises and cloud
Tags : 
b2bi, ibm, b2b integration, modernization, b2b architechture
    
IBM
Published By: JBoss Developer     Published Date: Oct 21, 2016
Flytoget AS, a publicly owned transportation company in Norway, operates the airport express train between Oslo Airport and the city center. Each year, the company transports millions of passengers on its trains. To succeed in an increasingly competitive landscape, Flytoget decided to modernize its IT infrastructure with a cloud-based approach. Flytoget deployed Red Hat JBoss Fuse with 3scale API Management Platform to create a highly adaptable and reliable foundation for its modernization efforts. As a result, the company has achieved intelligent, integrated transportation services that will help it retain its market-leading role.
Tags : 
application integration, business intelligence, enterprise software
    
JBoss Developer
Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.