architectures

Results 76 - 100 of 304Sort Results By: Published Date | Title | Company Name
Published By: Splunk     Published Date: Aug 21, 2018
Due to recent cyberattacks, security operations centers (SOCs) have had to focus on a holistic and cohesive security strategy by consolidating the right people, processes and technology to mitigate and remediate attacks. This white paper, “The Five Essential Capabilities of an Analytics-Driven SOC”, dives into the necessity of SOCs to be analytics driven and how it helps IT and business leaders assess their own risk levels. Download this white paper to to learn about: *How advanced analytics and machine learning are now critical hallmarks of the modern security platform *How proactively hunting and investigating threats can shore up defenses *Why adaptive security architectures, like Splunk’s, are needed to prevent, detect and respond to attacks in today’s security landscape
Tags : 
    
Splunk
Published By: Cisco     Published Date: Dec 27, 2017
Hyperconvergence has been receiving a tremendous amount of attention because it represents the next step in the evolution of IT resource delivery. This technology takes the idea of integrating compute, storage and networking that started with converged systems design and has improved on those architectures by adding deeper levels of abstraction and automation. Hyperconverged infrastructure (HCI) vendors promise simplified operation and the ability to quickly and easily expand capacity by deploying and launching additional modules; simplicity has been the key selling point for the HCI pioneers. As HCI ventures even deeper into the enterprise and cloud environments, the architectures will need to become more efficient, agile and adaptable to help IT professionals shoulder the burden of rapidly growing data sets and workloads. This report discusses the benefits of HCI and the enhancements that must be made to expand HCI deeper into the mainstream enterprise datacenter.
Tags : 
    
Cisco
Published By: Aerohive     Published Date: Jun 01, 2015
This guide reveals how to evaluate enterprise WiFi Network.
Tags : 
wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks, evaluate enterprise wlan networks
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Ce document apporte des conseils permettant d’évaluer les réseaux Wi-Fi d’entreprise grâce à l’étude des exigences clés, des considérations de l’architecture, des 10 éléments inhérents à un réseau Wi-Fi et de l’utilisation du processus DDP pour sélectionner un fournisseur.
Tags : 
wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks, evaluate enterprise wlan networks
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Dieses Dokument enthält Ratschläge für die Bewertung eines WiFi-Netzes im Unternehmen und analysiert die wichtigsten Anforderungen, architekturbezogene Erwägungen, 10 Sachen, die ein WiFi-Netz imstande zu tun sein muss, und benutzt das RFP Verfahren, um einen Zulieferer auszuwählen.
Tags : 
wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks, evaluate enterprise wlan networks
    
Aerohive
Published By: Juniper Networks     Published Date: Feb 01, 2016
Read this report from IDG to see how Juniper Networks can help in several ways: • Simplify at the data center, campus, and branch levels • Protect the edge via the cloud • Centralize functions like configuration, provision, management, and more
Tags : 
    
Juniper Networks
Published By: Aerohive     Published Date: Oct 26, 2015
Join this webinar to learn: - What the latest solution offerings look like and how to avoid investing in dead technology - Why more vendors are using the cloud to drive technical and commercial flexibility for organisations - How to easily grow your network with demand
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
Published By: Aerohive     Published Date: Oct 27, 2015
Ce webinaire s’adresse à tous les professionnels de l’informatique qui veulent en savoir plus sur les réseaux sans fil, et souhaitent déployer ou étendre ces derniers dans leur entreprise
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
Published By: Aerohive     Published Date: Oct 27, 2015
Das Webinar richtet sich an IT-Spezialisten, die mehr über die Möglichkeiten im Bereich WLAN erfahren möchten bzw. an Organisationen, die planen, WLAN einzusetzen oder ihre bestehende WLAN-Infrastruktur zu erneuern.
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
Published By: Aerohive     Published Date: Oct 27, 2015
This webinar is for IT professionals looking to learn about, implement or expand wireless networks in their organization.
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
Published By: Aerohive     Published Date: Oct 27, 2015
Questo webinar è rivolto a specialisti IT interessati ad apprendere, implementare ed espandere le reti wireless nella propria organizzazione.
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
Published By: BMC Software     Published Date: May 16, 2011
Learn how you can combine the benefits of traditional IT management with the dynamic potential of cloud architectures in this white paper.
Tags : 
bmc software, hybrid cloud delivery, cloud services management, bmc cloud lifecycle management, cloud service delivery, cloud resource management, service catalog establishment, hybrid cloud integration
    
BMC Software
Published By: Blue Coat Systems     Published Date: Jul 05, 2011
A new generation of WAN optimization solutions can help network managers optimize consolidated data architectures internally, but also harness the power of the internet to reshape the way businesses leverage new technologies.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, cindy borovick, virtualization, idc, server, data center
    
Blue Coat Systems
Published By: NetApp     Published Date: Sep 24, 2013
"Storage system architectures are shifting from large scale-up approaches to scale-out of clustered storage approaches. The need to increase the levels of storage and application availability, performance, and scalability while eliminating infrastructure or application downtime has necessitated such an architectural shift. This paper looks at the adoption and benefits of clustered storage among firms of different sizes and geographic locations. Access this paper now to discover how clustered storage offerings meet firms’ key requirements for clustered storage solutions and the benefits including: Non-disruptive operations Secure multi-tenancy Scalability and availability And more"
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, storage, data management, data center
    
NetApp
Published By: NetApp     Published Date: Sep 24, 2013
"Storage system architectures are moving away from monolithic scale-up approaches and adopting scale-out storage – providing a powerful and flexible way to respond to the inevitable data growth and data management challenges in today’s environments. With extensive data growth demands, there needs to be an increase in the levels of storage and application availability, performance, and scalability. Access this technical report that provides an overview of NetApp clustered Data ONTAP 8.2 and shows how it incorporates industry-leading unified architecture, non-disruptive operations, proven storage efficiency, and seamless scalability."
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, non-disruptive operations, storage, business technology, data center
    
NetApp
Published By: NetApp     Published Date: Feb 19, 2015
This report examines the most common hybrid cloud architectures and the storage management factors required for IT to extend their data center with efficiency. Learn about the keys to successfully implementing a hybrid cloud approach.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Aug 14, 2015
Most common hybrid cloud architectures.
Tags : 
cloud computing, storage, infrastructure, operations, data center
    
NetApp
Published By: Dell EMC     Published Date: May 15, 2015
Swiss analyst, Storage Switzerland, reports on the importance of customers assessing the right fit for a data center and workloads, specifically when evaluating an all-flash array solution.
Tags : 
emc, storage switzerland, all-flash, architectures, workload, data center, scale, storage, data management, business technology
    
Dell EMC
Published By: Dell EMC     Published Date: May 15, 2015
This IDC study provides detailed insights into the rapidly growing market for enterprise storage systems that leverage flash storage media. This study segments this market into the following two technology segments: AFAs and HFAs. Insights into these two market segments are provided historically. Market shares and IDC analysis are provided for each of the top vendors in these two segments along with detailed market-level analysis.
Tags : 
emc, storage all-flash, architectures, workload, data center, scale, storage, hybrid, vendor profiles, data management, business technology
    
Dell EMC
Published By: Dell EMC     Published Date: May 15, 2015
See how XtremIO redefined paradigms in the legal services marketplace for the US-based company, Clutch Group.
Tags : 
emc, storage all-flash, array, architectures, workload, data center, scale, storage, hybrid, vendor profiles, legal services, clutch, compliance, data management, business technology
    
Dell EMC
Published By: Dell EMC     Published Date: May 15, 2015
This SQL Database focused case study is based on Connections Education, an online US-based education leader. Learn how this online education leader chooses EMC XtremIO to manage unpredictably fast growth.
Tags : 
emc, storage all-flash, array, architectures, workload, data center, scale, storage, hybrid, xtremio, scalable, development, roi, data management, business technology
    
Dell EMC
Published By: Dell EMC     Published Date: May 15, 2015
Understand how Vidant Health System transforms health IT strategy and accelerates meaningful use of Epic EHR with EMC XtremIO
Tags : 
emc, storage all-flash, array, architectures, workload, data center, scale, storage, hybrid, xtremio, ehr, analytics, healthcare, icd-10, data management, business technology
    
Dell EMC
Published By: Dell EMC     Published Date: May 15, 2015
This Wikibon research shows that flash will become the lowest cost media for almost all storage from 2016 and beyond, and that a shared data philosophy is required to maximize the potential from both storage cost and application functionality perspectives.
Tags : 
emc, storage all-flash, array, architectures, workload, data center, scale, storage, hybrid, analytics, infrastructure, data management, business technology
    
Dell EMC
Published By: Ping Identity     Published Date: Feb 12, 2016
In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity protocols has been developed. OpenID Connect 1.0 uses the same building blocks as the modern application architectures and APIs it secures—REST and JSON. This allows it to profile and extend OAuth 2.0 to add an identity layer—creating a singular, cohesive framework that promises to secure APIs, mobile native applications and browser applications. This paper introduces OpenID Connect (Connect), detailing its features and its application in enterprise use cases.
Tags : 
    
Ping Identity
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
forrester, wave, web, application, firewalls, akamai
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee