• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

cloud service

Results 76 - 100 of 1707Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jun 29, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
IBM
By: Dell EMC & Intel     Published Date: Sep 06, 2018
Datacenter improvements have thus far focused on cost reduction and point solutions. Server consolidation, cloud computing, virtualization, and the implementation of flash storage capabilities have all helped reduce server sprawl, along with associated staffing and facilities costs. Converged systems — which combine compute, storage, and networking into a single system — are particularly effective in enabling organizations to reduce operational and staff expenses. These software-defined systems require only limited human intervention. Code imbedded in the software configures hardware and automates many previously manual processes, thereby dramatically reducing instances of human error. Concurrently, these technologies have enabled businesses to make incremental improvements to customer engagement and service delivery processes and strategies.
Tags : 
    
Dell EMC & Intel
By: Dell EMC & Intel     Published Date: Sep 06, 2018
Jusqu’à présent, les améliorations du datacenter se sont limitées à la réduction des coûts et à des solutions ponctuelles. La consolidation des serveurs, le Cloud computing, la virtualisation et l’implémentation de stockage Flash ont contribué à réduire la prolifération des serveurs, ainsi que les coûts de personnel et d’installations associés. Regroupant ressources de calcul, de stockage et de réseau au sein d’une même solution, les systèmes convergés se révèlent particulièrement efficaces dans la baisse des dépenses de personnel et de fonctionnement. Ces systèmes définis par logiciel (software-defined) exigent peu d’interventions humaines. Le code intégré dans le logiciel configure le matériel et automatise de nombreux processus autrefois manuels, ce qui réduit considérablement le risque d’erreurs humaines. Ensemble, ces technologies ont permis aux entreprises d’améliorer progressivement les processus et stratégies d’engagement client et de prestation de services.
Tags : 
    
Dell EMC & Intel
By: Dome9     Published Date: Apr 25, 2018
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Dome9
By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
By: B Channels     Published Date: Apr 27, 2018
This white paper provides an overview of Cloud service providers and outlines three key learnings for dealing with them effectively. Discover what connects cloud service providers with traditional software vendors Download to explore 3 key differences.
Tags : 
    
B Channels
By: KPMG     Published Date: Jul 12, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now
Tags : 
    
KPMG
By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprises currently face challenges regarding the price, performance, and flexibility of traditional wide area networks (WANs). Aggressive growth in the adoption of public cloud services (a projected 86% spike between 2014 and 2018)1 is forcing organizations to look elsewhere for a more effective network solution to address distributed traffic across remote sites and branch offices. Some of the specific issues organizations face with their traditional WANs include: - High total cost of ownership (TCO) - Lengthy provisioning cycles - Performance degradation with the growth of cloud traffic - Inadequate redundancy and resiliency - Lack of application-aware connectivity To better manage WAN investments, enterprises are adopting a new approach for their distributed branch office networks. Software-defined WAN (SD-WAN) offers improved performance, agility, and operational flexibility plus significant cost savings. But not all SDWAN solutions are created equal.
Tags : 
    
Fortinet EMEA
By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA
By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
    
Fortinet EMEA
By: Oracle     Published Date: May 08, 2019
What if your database could install, manage, secure, and upgrade itself—with little or no manual administration required? Now it’s possible, thanks to machine learning, artificial intelligence and the power of the cloud. Discover how the Oracle Autonomous Database is: • Self-driving: Tell it the service level you want to achieve, and it does the rest. • Self-securing: It installs patches automatically and uses AI to counter threats. • Self-repairing: It patches, scales, and tunes itself while your operations are running, to deliver 99.995% uptime. Discover the power of autonomous data management. Download now.
Tags : 
    
Oracle
By: CA Technologies     Published Date: Dec 27, 2011
In this executive Q&A, Cloud Luminary and DonorsChoose.org CTO Oliver Hurst-Hiller discusses the importance of being able to seamlessly and quickly switch to a cloud service, the benefits of having all aspects of your company moved to the cloud, and more.
Tags : 
cloud, technology, donors choose, cloud computing, cloud service, data management, analytical applications, business intelligence, data protection, data quality
    
CA Technologies
By: Digital Realty     Published Date: Feb 24, 2015
GoGrid needed a state-of-the-art data center in the heart of the financial district to be up and running within days. As a fast-growing technology company headquartered in the San Francisco Bay Area, they needed a scalable data center with a robust infrastructure and an experienced operations team to support the cloudbased services they provide to their customers. Find out why they turned to Digital Realty.
Tags : 
data center, infrastructure management, access control, physical security, it management
    
Digital Realty
By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron
By: Dell EMC     Published Date: Nov 04, 2016
While some distributed enterprises look to the cloud to reduce server sprawl and centralize operations, in many cases, the cloud simply isn’t feasible. Maybe the offices are in remote locations with limited Internet service or low-bandwidth connectivity causes issues such as latency and availability. Download the solutions brief to discover why VCE VxRail hyper-converged appliances from Dell EMC are ideal for consolidating multiple applications in a remote location onto a single, high-performance and high-availability platform that’s easy to deploy and manage.
Tags : 
distributed enterprises, vmware, storage, virtualization, software management, appliances, storage management
    
Dell EMC
By: CA Technologies     Published Date: Aug 01, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, smart phones, customer interaction service, customer relationship management, customer service, web service management, cloud computing
    
CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, mobile workers, smart phones, customer interaction service, customer relationship management, web service management, cloud computing
    
CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
How CA Cloud Service Management Speeds Deployment and Time to Value.
Tags : 
cloud service management, speed up deployment, ca cloud service management, accelerate time to value, system management software, service management, cloud computing
    
CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
How CA Cloud Service Management Speeds Deployment and Time to Value.
Tags : 
cloud service management, speed up deployment, ca cloud service management, accelerate time to value, service management, cloud computing
    
CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.
Tags : 
improving consumer experience, optimal it service delivery, cloud service management, mobile computing, mobile data systems, mobile workers, return on investment, cloud computing
    
CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.
Tags : 
cloud service management, mobile computing, mobile data systems, customer interaction service, cloud computing
    
CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, customer interaction service, customer service, web service management, cloud computing
    
CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, mobile workers, smart phones, customer interaction service, customer relationship management, customer satisfaction, customer experience management, cloud computing
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter