datacenter security

Results 1 - 25 of 32Sort Results By: Published Date | Title | Company Name
Published By: Blue Lane     Published Date: Apr 03, 2007
Andreas Antonopoulos, SVP & Founding Partner of Nemertes Research, discusses the challenges of securing the new virtual datacenter.
Tags : 
virtualization, datacenter, security, vulnerability, vmware, virtualshield, security, patching, blue lane, vulnerability management, server virtualization, patch management
    
Blue Lane
Published By: Blue Lane     Published Date: Nov 15, 2007
Virtualization has become all the rage for companies interested in optimizing their servers and storage systems. This shift in data center architecture allows IT organizations to reduce operational costs and increase flexibility and responsiveness to changing business demands.
Tags : 
data center security, datacenter security, data centre, network security, virtual server, virtual data center, server virtualization, blue lane, security
    
Blue Lane
Published By: Cisco     Published Date: Dec 21, 2016
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 20, 2018
Edison has followed the development and use of Cisco’s Application Centric Infrastructure (ACI) over the past five years. Cisco ACI delivers an intent-based networking framework to enable agility in the datacenter. It captures higher-level business and user intent in the form of a policy and translates this intent into the network constructs necessary to dynamically provision the network, security, and infrastructure services.
Tags : 
    
Cisco
Published By: Citrix     Published Date: May 08, 2014
A report into the need for datacenter security and how Citrix NetScaler is the solution.
Tags : 
datacenter security, netscaler, citrix, defense, data center
    
Citrix
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
Read this paper to learn how NetScaler is meeting modern demands for more robust datacenter security.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
Learn why Citrix was named a leader in the 2015 Gartner Magic Quadrant for Application Delivery Controllers, for the ninth consecutive year. With more than 25 years experience providing secure access to enterprise applications, it’s clear you can rely on Citrix to drive new levels of security and productivity in your organization. Register to download the 2015 Gartner Magic Quadrant for Application Delivery Controllers, plus receive a bonus white paper, Citrix NetScaler - A Foundation for Next-Generation Datacenter and Cloud-Based Security.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Read this paper to learn how NetScaler is meeting modern demands for more robust datacenter security.
Tags : 
citrix, netscaler, security, data center, cloud
    
Citrix Systems, Inc.
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: e-DMZ Security LLC     Published Date: Sep 27, 2010
This white paper discusses key issues and offers innovative solutions to support granting access to production resources.
Tags : 
e-dmz security. emergency access, production access, access control, compliance, developer access, mission-critical, business-critical, datacenter security
    
e-DMZ Security LLC
Published By: F5 Networks Inc     Published Date: Feb 02, 2016
Let’s face it, your apps are everywhere. You have more to worry about than ever before: diverse services, cloud and datacenter locations, mission critical SaaS applications and new security threats.  In this report you’ll learn which app delivery services your peers have most broadly deployed, how they are approaching the cloud, and how they are addressing the growing sophistication of security attacks.
Tags : 
application delivery, datacenter locations, saas applications, security threats, app delivery service, it management, knowledge management, enterprise applications
    
F5 Networks Inc
Published By: HP     Published Date: Jul 29, 2008
Connect to this special web event to hear from Forrester Research and HP on how to address key vulnerabilities in the storage network, receive tips and recommendations on selecting and implementing data storage encryption solutions and details on how to achieve centralized key management and data encryption where it matters most.
Tags : 
mission critical, security, datacenter, data center, storage security, storage
    
HP
Published By: Intel Security     Published Date: Oct 20, 2015
Companies are well aware of the benefits of virtualization and cloud computing, but many are reluctant to embrace the public clould because they don't have a way to assess and ensure security. This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : 
aberddeen, data center, datacenter, cloud, server security, networking, data management
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center, virtual datacenter, security, data center
    
Intel Security
Published By: Juniper Networks     Published Date: Oct 19, 2015
Datacenters are the factories of the Internet age, just like warehouses, assembly lines, and machine shops were for the industrial age. Over the course of the past several years, riding the wave of modernization, datacenters have become the heart and soul of the financial industry, which each year invests over $480 billion in datacenter infrastructure of hardware, software, networks, and security and services.
Tags : 
juniper, datacenter, threat, ciso, enterprise, data, customer
    
Juniper Networks
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Make sure you’re getting the most out of your data and the artificial intelligence (AI) technologies available. Read the e-book, Six cloud data challenges solved for app developers and get actionable answers. Learn the best approach when faced with six familiar data scenarios: Keeping track of essentials such as scalability and availability. Making sure your app delivers consistent service to multiple customers. Delivering data in real time, across the globe, without the complexities of multiple datacenters. Creating actionable insights from big data. Incorporating artificial intelligence into your apps. Locking down security while building in the cloud.
Tags : 
    
Microsoft Azure
Published By: PC Mall     Published Date: Jun 22, 2011
This white paper from Microsoft discusses the underlying economics driving the transition from mainframe to client/servers. The economics of the cloud, by using in-depth modeling, is also reviewed to better understand the long-term IT landscape.
Tags : 
cloud computing, virtualized datacenter, network security, private cloud, public cloud
    
PC Mall
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, datacenters, enterprise, linux, security mechanisms, network firewalls
    
Red Hat
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters, virtualization technologies, cloud computing practices, security, data center
    
Red Hat
Published By: Red Hat     Published Date: Sep 26, 2014
What if you could simplify and standardize all your systems? What if you could make the most of what you have, while moving to a trusted and secure platform that gives you the ability to innovate like never before? With Red Hat you can… IT must keep up with the demands of business, but still lead the way to innovation that fuels growth. Eliminate excessive complexity and inefficiency in your datacenter—without leaving behind existing investment. Standardizing on Red Hat doesn't mean ripping and replacing. It means having a well-managed platform AND freeing up resources to innovate with greater efficiency, security, stability, and minimal overhead.
Tags : 
it efficiency, standardized operating environment, it solutions, integration, it management
    
Red Hat
Published By: Red Hat     Published Date: May 05, 2015
IT organizations are under intense pressure to improve service levels and contain expenses in today’s challenging economic climate. Forward-looking organizations are upgrading IT infrastructure and implementing virtualization and cloud computing solutions to improve business agility and drive down costs. Many enterprises are adopting a dual platform approach, retaining Microsoft Windows for office productivity and collaboration applications, and deploying Red Hat® Enterprise Linux® for infrastructure and datacenter modernization initiatives. By adopting standards-based Red Hat Enterprise Linux, businesses can enjoy high performance, reliability, and security, with a lower overall TCO.
Tags : 
red hat, platform strategies, modern datacenter, virtualization, cloud computing solutions, it management, knowledge management, data management, data center
    
Red Hat
Published By: Riverbed Technology, Inc.     Published Date: May 27, 2014
Data in branch and remote offices is subject to a variety of threats. Data centers are built to secure data, but remote offices lack the same level defenses. It’s now possible to eliminate the risks of branch office IT, consolidating servers and storage into the datacenter without sacrificing the benefits of having servers at the edge close to users.
Tags : 
datacenter, data security, consolidating servers, consolidating storage, data defense, enterprise expansion, edge close to users, riverbed, idg, security, knowledge management, enterprise applications, storage, data center
    
Riverbed Technology, Inc.
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee