architectures

Results 1 - 25 of 287Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: Datastax     Published Date: Nov 02, 2018
Most enterprises operate in a hybrid cloud environment, whether they know it or not. The benefits of hybrid cloud and multi-cloud architectures are numerous, but since most companies don’t even realize they’re using multi-cloud, they’re not taking full advantage of the multi/hybrid cloud environment. Read this ebook to learn how proper data management via an enterprise data layer empowers enterprises to unlock the full potential of their multi- and/or hybrid cloud strategies to achieve data autonomy while scaling efficiently, effectively, and safely.
Tags : 
    
Datastax
Published By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva
Published By: IBM APAC     Published Date: Oct 16, 2018
Modern AI, HPC and analytics workloads are driving an ever-growing set of data intensive challenges that can only be met with accelerated infrastructure. Designed for the AI era and architected for the modern analytics and AI workloads, Power Systems AC922 delivers unprecedented speed for the AI Era like up to 5.6 times as much bandwidth, which results from The only architecture enabling NVLink between CPUs and GPUs a variety of next-generation I/O architectures: PCIe gen4, CAPI 2.0, OpenCAPI and NVLINK. Proven simplified deep-learning deployment and AI performance
Tags : 
    
IBM APAC
Published By: StreamSets     Published Date: Sep 24, 2018
The advent of Apache Hadoop™ has led many organizations to replatform their existing architectures to reduce data management costs and find new ways to unlock the value of their data. One area that benefits from replatforming is the data warehouse. According to research firm Gartner, “starting in 2018, data warehouse managers will benefit from hybrid architectures that eliminate data silos by blending current best practices with ‘big data’ and other emerging technology types.” There’s undoubtedly a lot to ain by modernizing data warehouse architectures to leverage new technologies, however the replatforming process itself can be harder than it would at first appear. Hadoop projects are often taking longer than they need to create the promised benefits, and often times problems can be avoided if you know what to avoid from the onset.
Tags : 
replatforming, age, data, lake, apache, hadoop
    
StreamSets
Published By: Avi Networks     Published Date: Aug 17, 2018
Flexible infrastructure choices and application architectures are changing the way that modern enterprises run their computing. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. With application owners seeking public-cloud-like simplicity and agility in their own data centers, IT teams are under pressure to reduce wait times to provision applications and updates.
Tags : 
    
Avi Networks
Published By: NEC     Published Date: Sep 29, 2009
Written by: IDC Abner Germanow, Jonathan Edwards, Lee Doyle IDC believes the convergence of communications and mainstream IT architectures will drive significant innovation in business processes over the next decade.
Tags : 
it architecture, idc, automation, automated order processing, soa, service oriented architecture, soap, http, xml, wsdl, uddi, esbs, jee, .net, crm, san
    
NEC
Published By: ASG Software Solutions     Published Date: Feb 23, 2010
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.
Tags : 
asg, cmdb, virtualization, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: Cisco EMEA     Published Date: Nov 13, 2017
IT has the opportunity to completely redefine the role networking plays in the business. But that requires executing on a vision that continuously aligns the network to ever-changing business needs. Fortunately, the right network architectures and supporting technologies required to deliver on that vision are rapidly becoming available. Automation, programmability, self-protecting, and self-healing capabilities move IT away from “keeping the lights on” and provide more time and opportunity to serve as a strategic partner to business initiatives across functional areas.
Tags : 
network, transformation, digital success, organization, idc
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
To better understand how companies are finding the unique, hybrid cloud architectures that best meet their needs, we interviewed executives at companies that had reduced or changed their use of managed or cloud IaaS or that chose to avoid the public cloud in the first place. These companies include retail, social media, healthcare, financial services, and public sector companies. Some of these companies were born in the cloud while others transitioned from traditional IT infrastructures. Company sizes ranged from 300 employees to more than 300,000.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, iaas
    
Hewlett Packard Enterprise
Published By: SAP     Published Date: May 18, 2014
For years, experienced data warehousing (DW) consultants and analysts have advocated the need for a well thought-out architecture for designing and implementing large-scale DW environments. Since the creation of these DW architectures, there have been many technological advances making implementation faster, more scalable and better performing. This whitepaper explores these new advances and discusses how they have affected the development of DW environments.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
IoT has proven its value in the private sector. Ever since the 1980’s, US manufacturing has undergone a dramatic transition based on IoT. Machines that where once manually calibrated and maintained began to be controlled by specialized computers. These computers were able to quickly recalibrate tools which allowed manufactures to produce smaller batches of parts, but were also often locked into proprietary computing languages and architectures.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Over the past several years, the IT industry has seen solid-state (or flash) technology evolve at a record pace. Early on, the high cost and relative newness of flash meant that it was mainly relegated to accelerating niche workloads. More recently, however, flash storage has “gone mainstream” thanks to maturing media technology. Lower media cost has resulted from memory innovations that have enabled greater density and new architectures such as 3D NAND. Simultaneously, flash vendors have refined how to exploit flash storage’s idiosyncrasies—for example, they can extend the flash media lifespan through data reduction and other technique
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
IT organizations today must work in an “and” world, rather than an “or” world to meet the demands of their users. In an “and” world, IT architectures and strategies leverage an ever-broadening variety of tools while still supporting and propelling a single strategy.
Tags : 
    
Hewlett Packard Enterprise
Published By: Red Hat     Published Date: Aug 22, 2018
What does a digital transformation look like? It varies from organization to organization, of course, since they have invested in countless systems and applications over the years. Digital transformation consists of building new applications and next-generation architectures on today’s open standards, using on-demand resources. For many organizations, digital transformation also means optimizing existing systems and application resources – integrating, replacing, or abstracting key pieces of their infrastructures into services.
Tags : 
    
Red Hat
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
IT organizations today must work in an “and” world, rather than an “or” world to meet the demands of their users. In an “and” world, IT architectures and strategies leverage an ever-broadening variety of tools while still supporting and propelling a single strategy.
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt
Published By: Dell EMC     Published Date: Nov 10, 2015
Download this whitepaper to see how Dell offers the technology, know-how and experience to deliver new workload-optimized architectures that simplify IT for any size enterprise.
Tags : 
    
Dell EMC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee