iso

Results 276 - 300 of 955Sort Results By: Published Date | Title | Company Name
Published By: Cybric     Published Date: Oct 30, 2017
How a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Whether you’ve over-invested in security tools, under-invested, don’t know the extent of your security capabilities or you’re facing new regulations that require you to demonstrate and continually maintain compliance — there is a path forward. To understand and optimize what you have in place, as well as gaps you may have, develop a security rationalization process to calculate the return on your security investments. Read this paper to learn the five steps needed to get started.
Tags : 
cybersecurity, cyber security, ciso, security visibility, security assurance, security resilience, application security tools, appsec, security audit
    
Cybric
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Les serveurs Dell EMC PowerEdge, optimisés par la gamme de processeurs Platinum, offrent des performances plus fiables pour la virtualisation, l’IT convergée, le Cloud hybride et le Big Data. Optimisez l’automatisation, l’évolutivité et la sécurité grâce à la mise à niveau vers la nouvelle génération de serveurs PowerEdge. Des options de financement souples sont disponibles auprès de Dell Financial Services.
Tags : 
    
Dell and VMWare
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Les serveurs Dell EMC PowerEdge, optimisés par la gamme de processeurs Intel® Xeon® Platinum, offrent des performances plus fiables pour la virtualisation, l’IT convergée, le Cloud hybride et le Big Data. Optimisez l’automatisation, l’évolutivité et la sécurité grâce à la mise à niveau vers la nouvelle génération de serveurs PowerEdge. Des options de financement souples sont disponibles auprès de Dell Financial Services. Intel Inside® pour de nouvelles possibilités. Processeur Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, et Xeon Inside sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: CA Technologies EMEA     Published Date: Oct 24, 2017
Générez des données virtuelles riches qui couvrent tous les scénarios possibles et fournissent un accès illimité aux environnements nécessaires pour livrer des applications testées avec soin, dans les délais et le budget impartis. Modélisez les données des systèmes réels complexes et appliquez des algorithmes d’apprentissage automatisé de règles pour éliminer la dette technique et permettre une compréhension approfondie des applications composites. Mettez en outre à la disposition des équipes distribuées des données virtuelles à la demande et évitez les goulots d’étranglement au niveau des tests.
Tags : 
modèles de test, continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, ca test data manager
    
CA Technologies EMEA
Published By: OneLogin     Published Date: Oct 24, 2017
From the information provided in the interviews, Forrester has constructed a Total Economic Impact (TEI) framework for those organizations considering investing in OneLogin. The objective of the framework is to identify the benefits, costs, flexibility, and risk factors that affect the investment decision. Forrester employed four fundamental elements of TEI in modeling OneLogin: benefits, costs, flexibility options, and risks. Forrester took a multistep approach to evaluate the impact that OneLogin can have on the Organization (see Figure 2). Specifically, we: › Interviewed OneLogin marketing, sales, and product management personnel, along with Forrester analysts, to better understand the value proposition for OneLogin. › Conducted an in-depth interview with the Organization’s senior application engineer and its supervisor of IT security to obtain data with respect to costs, benefits, and risks. › Constructed a financial model representative of the interviews using the TEI metho
Tags : 
    
OneLogin
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Pour dynamiser le marché ou rester compétitives, les entreprises doivent livrer leurs produits logiciels plus rapidement que jamais. Les méthodes traditionnelles d’assurance qualité ne sont cependant pas en mesure de supporter cette cadence soutenue. Bien qu’ils aient aidé les organisations à améliorer la qualité du code, les mécanismes d’intégration continue ne prennent pas en charge les tests de bout en bout à l’échelle du cycle de vie du code.
Tags : 
continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test, ca test data manager
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Dans les organisations agiles d’aujourd’hui, les équipes de production se trouvent face à un défi de taille : déployer en production les nouvelles versions immédiatement après les phases de développement et de test. Pour assurer la réussite d’un tel déploiement, il est nécessaire de mettre en œuvre un processus automatique et transparent. ce processus, nous l’avons baptisé Zero Touch Deployment™. cet article examine deux approches du Zero Touch Deployment : une solution basée sur les scripts et une plate-forme d’automatisation de la mise en production. Il indique comment chacune de ces approches peut résoudre les principaux défis technologiques et organisationnels face auxquels se trouvent les organisations agiles lorsqu’elles décident d’implémenter un système de déploiement automatique. cet article commence par retracer le contexte commercial et technologique qui pousse les organisations agiles à se tourner vers des solutions d’automatisation du déploiement.
Tags : 
zero touch deployment, continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test, ca test data manager
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Pour pouvoir réellement mettre en œuvre une approche de livraison continue, les organisations doivent entièrement repenser la façon de mener leur processus d’assurance qualité (QA). Cela passe notamment par redéfinir le rôle que les professionnels d’assurance qualité jouent au sein de l’organisation, automatiser le plus possible à chaque niveau et revoir entièrement les structures de test, pour prendre en charge des versions logicielles plus légères et plus rapides.
Tags : 
continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test, ca test data manager
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Faites passer rapidement vos idées du stade de la conception au stade du développement, sans sacrifier la qualité, grâce à un écosystème de livraison continue de bout en bout capable de mettre en œuvre des tests rigoureux selon la fonctionnalité utilisateur souhaitée.
Tags : 
continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test, ca test data manager
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Dans une série d’articles, Paul Gerrard, consultant et spécialiste des tests, aborde diverses questions sur ces derniers. Les modèles de test sont essentiels pour les tests et, dans cet article, Paul Gerrard évoque l’art de créer et d’utiliser ces modèles. Si les testeurs interviennent de plus en plus tôt, de pair avec les développeurs ou du moins plus étroitement, les testeurs (et les développeurs) doivent être capables de créer des modèles, de savoir comment les articuler et les partager, ainsi que d’encourager une meilleure collaboration.
Tags : 
modèles de test, continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test, ca test data manager
    
CA Technologies EMEA
Published By: VMWare EMEA     Published Date: Oct 23, 2017
VMware vRealize® Suite is the market-leading cloud management platform purpose-built for heterogeneous multi-cloud environments. It provides a comprehensive management stack for IT services on VMware vSphere® and other hypervisors, physical infrastructure, OpenStack, and external clouds such as VMware vCloud® Air™ and Amazon Web Services, all with a unified management experience.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: VMWare EMEA     Published Date: Oct 23, 2017
VMware vRealize® Suite is the market-leading cloud management platform* purpose-built for heterogeneous, multi-cloud environments. It provides a comprehensive management stack for IT services on VMware vSphere® and other hypervisors, physical infrastructure, OpenStack, and external clouds such as VMware vCloud® Air™ and Amazon Web Services, all with a unified management experience. With vRealize Suite, IT can provision and manage at scale—compute, storage, network, and application services across multiple private and public cloud environments.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Oracle     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: Designed for scale-out and cloud infrastructures SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: Continuously provides real-time results. Processes more complex workload stacks. Optimizes usage of per-core software licenses Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
    
Oracle
Published By: Oracle CX     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: ? Designed for scale-out and cloud infrastructures ? SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor ? Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: ? Continuously provides real-time results. ? Processes more complex workload stacks. ? Optimizes usage of per-core software licenses. Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
    
Oracle CX
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted? Staying ahead requires adopting a combination of technology solutions. Key among them is a smart process and decision management system that infuses every process with intelligence in order to continuously raise the bar for customer centricity,
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted? Staying ahead requires adopting a combination of technology solutions. Key among them is a smart process and decision management system that infuses every process with intelligence in order to continuously raise the bar for customer centrici
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted?
Tags : 
cloud computing, digital economy, digital disruption, business operations
    
IBM
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Nous avons tous vécu cette expérience. Nous nous habituons tellement à la manière dont les choses se font que nous ne remettons pas souvent en cause les raisons pour lesquelles nous les faisons
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim, api management, full api lifecycle, restful web services, api portal, gestion des api, portail api, oauth, openid connect, rest json, soap xml, api analytics, orchestration transformation
    
CA Technologies EMEA
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: Madison Logic     Published Date: Oct 12, 2017
fjjfldsk fj sdklfj dslkfj dsljf kdlsfj lkds
Tags : 
    
Madison Logic
Published By: Sprinklr     Published Date: Sep 28, 2017
After the largest tech merger in history, Dell and EMC needed to align their marketing and social departments. Karen Quintos took the challenge and along with Alison Herzog formed the Chief Customer Office.
Tags : 
customer service, customer relationships, customer experience, customer retention, voice of the customer, social customer service, customer journey
    
Sprinklr
Published By: IBM     Published Date: Sep 28, 2017
This paper presents a cost/benefit case for two leading enterprise database contenders -- IBM DB2 11.1 for Linux, UNIX, and Windows (DB2 11.1 LUW) and Oracle Database 12c -- with regard to delivering effective security capabilities, high-performance OLTP capacity and throughput, and efficient systems configuration and management automation. Comparisons are of database installations in the telecommunications, healthcare, and consumer banking industries. For OLTP workloads in these environments, three-year costs average 32 percent less for use of DB2 11.1 compared to Oracle 12c.
Tags : 
ibm, enterprise database, oltp, telecommunications, healthcare, consumer banking
    
IBM
Published By: Druva     Published Date: Sep 27, 2017
Virtualization tools are providing storage pros with the ability to overcome the limitations of physical servers and gain more flexibility. While hypervisors are allowing them to leap over these boundaries, they’re simultaneously crumbling traditional data protection walls. It’s time to rethink how we handle backup. Inside, discover 8 essential real-world practices to put in place for hypervisor backup, archiving, and disaster recovery.
Tags : 
vmware, virtualization, hypervisors, data protection, archiving, disaster recovery
    
Druva
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee