• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

hr infrastructure

Results 151 - 175 of 261Sort Results By: Published Date | Title | Company Name
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc
By: IBM     Published Date: Jan 09, 2015
Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how to develop the type of network that truly supports mobile devices, applications and unified communications programs, thereby establishing the foundation for stronger mobile solutions.
Tags : 
ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges, iot, byod, networking, security, it management, wireless
    
IBM
By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys
By: HP     Published Date: Dec 05, 2014
This assessment is composed of a core set of comparative questions, and the option to be assessed in any of three key areas: computing economics, service delivery and business performance. After a half-decade of cost cutting and shrinking IT budgets, the compute infrastructure that powers the enterprise now is typically inefficient, slow and not optimized for business outcomes. It is better suited to the economic realities of 2010 rather than the rigors of the application workloads, delivery models & business expectations of today driven by cloud, mobility, security and big data megatrends. As a result, there is a significant gap between what businesses expect from technology and what IT can deliver.
Tags : 
server, performance, efficiency, application, infrastructure, information technology, mobility, cloud, storage, data, speed, software
    
HP
By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation
By: HP     Published Date: Nov 05, 2014
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
converged system, business efficiency, integrated systems, integrated management, virtualization, the cloud, big data, mobility, data center, it management, data management
    
HP
By: Kaspersky Lab     Published Date: Oct 30, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries’ motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.
Tags : 
financial profit, economic espionage, it security, risk mitigation, security, it management, knowledge management, business intelligence, business management
    
Kaspersky Lab
By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : 
singtel, vpn, wan, lan, infrastructure, ip networks, ip telephony, local area networking
    
Singtel
By: Equinix     Published Date: Oct 27, 2014
The businesses that thrive amid fluctuating technology demands are not only keeping a finger on the pulse of current trends, they have the infrastructure in place to handle whatever changes might come. And they’re doing so by treating their data centers as a strategic asset—a hub from which providers and performance can all stem. Are you ready for what’s next? According to analyst forecasts and IT executives, the five key trends affecting our state of technology are mobility, consumer technology, cloud services, hyperdigitization and globalization. In the following pages, you’ll learn how these bgtrends are affecting current networks, and why a strategic data center is key to not only surviving, but thriving, today and in the future.
Tags : 
data center, enterprise, cloud, experience, hybrid, performance, strategy, interconnectivity, network, drive, evolution, landscape, server, mobile, technology, globalization, stem, hyperdigitization, consumer, networking
    
Equinix
By: BMC Software     Published Date: Oct 23, 2014
Rapid shifts in the ways that technology and information are consumed and delivered— through cloud computing, big data, social networking, and smart devices—are transforming how companies compete. IT is at the center of the fray, working with business leaders to develop and execute a digital transformation strategy that capitalizes on these major new technologies. In order to lead this transformation, IT executives must focus on three areas: collaborating with business leaders to build a strategic vision, modernizing technology infrastructure, and rebuilding IT organizations to execute against new digital business goals.
Tags : 
saas, cloud, itsm, integrating itsm, itsm integration, saas integration, networking, it management
    
BMC Software
By: HP     Published Date: Oct 15, 2014
Just “keeping the lights on” in the server room is highly complex and largely inefficient. Maintaining IT infrastructure, system interdependencies, and application interoperability tie up valuable personnel and resources. The old way of simply throwing more hardware capacity at a problem can only serve to increase the complexity and further dampen productivity. In a perfect world, the infrastructure—hardware and software—would have been built as an integrated but scalable unit from the ground up. In our world, though, the best new systems combine independent pieces of IT infrastructure to form simplified computing platforms, freeing up IT to focus on business innovation rather than infrastructure management. Welcome to the new world of IT.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business, storage, data management
    
HP
By: HP     Published Date: Oct 15, 2014
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business, storage, data management
    
HP
By: IBM     Published Date: Oct 14, 2014
Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how to develop the type of network that truly supports mobile devices, applications and unified communications programs, thereby establishing the foundation for stronger mobile solutions.
Tags : 
mobile collaboration, mobile applications, mobile solutions, mobile infrastructure, it management, mobile data systems, application performance management, best practices, business intelligence
    
IBM
By: Singlehop     Published Date: Oct 01, 2014
As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.
Tags : 
cloud security, infrastructure threats, security data, chp infrastructure, security, it management, business analytics, risk management
    
Singlehop
By: HP     Published Date: Oct 01, 2014
Enterprises look to private clouds for more than just virtual infrastructure provisioning. Private cloud vendors have started to bundle additional capabilities into their solutions, including pervasive VM management capabilities, design tools for complex application templates, and service catalogs. Over the next 12 months, more than half of enterprises will prioritize building internal private clouds. Today, the most common approach is through the purchase of commercial software to layer atop existing infrastructure resources. Regardless of the approach you choose, there’s no shortage of tools to support your efforts.
Tags : 
wave, private, cloud, solutions, application, templates, catalogs, services, capabilities, complex, infrastructure, virtual, private, management, pervasive, tools, it management, cloud computing
    
HP
By: Red Hat     Published Date: Sep 25, 2014
When a company sells services to a consumer audience primarily through a Web user interface (UI), that Web UI had better be online and available, all the time, especially if you are an airline. Such is the real-world scenario that faces Chris Skretowski, Linux Specialist at Devon, United Kingdom-based Flybe, Europe's largest regional airline. Despite being a relatively small IT function, it powers a regional airline with over 1,700 employees and 55 aircraft, and the company has big ambitions, driven top down by a new CEO who believes that technology adoption and use can make a real difference in the company's bottom line. Having a board that is supportive of IT as a strategic business driver means there is lots of open air ahead for Skretowski, who is responsible for all the Linux infrastructure that front ends the company's missioncritical Web presence. Flybe was one of the 21 companies that were interviewed for quantitative results on their operations as part of an IDC ROI analys
Tags : 
web user interface, it function, it infrastructure, roi analysis, it management, data management
    
Red Hat
By: Epicor     Published Date: Sep 25, 2014
The software as a service (SaaS) model of application delivery, more commonly known as ‘cloud deployment’, in which software features are accessed through a Web browser, is an excellent way for manufacturing companies to get the bene?ts of enterprise resource planning (ERP) systems without the need to build additional IT infrastructure. ERP functionality delivered “from the cloud” avoids the complexity and costs that often accompany on premisess ERP implementations, and typically provides a much more favorable total cost of ownership, compared to legacy on premisess deployment. Companies subscribe to the software features that they need and can add new ones as business requirements change, without buying additional servers or storage to support new functionality. The ERP features are the same as for an on premises ERP system, except that it is hosted and maintained on the Cloud provider’s infrastructure.
Tags : 
saas, cloud deployment, cloud erp, it infrastructure, software features, application delivery, it management, data management
    
Epicor
By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks, application security, firewalls, hacker detection, intrusion detection, intrusion prevention, security management, vulnerability management
    
Arbor
By: Riverbed     Published Date: Sep 05, 2014
Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach could place data at risk. A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance—even thousands of miles—and still get the same performance as if the storage remained local to the branch. Organizations can now consolidate remote infrastructure to increase security and ef?ciency, without adversely impacting end-user performance in branch of?ces.
Tags : 
consolidation, servers, remote, storage, isolated islands, efficiency, security, networking, it management
    
Riverbed
By: Riverbed     Published Date: Sep 05, 2014
Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach is costly and places data at risk. However, a new branch converged infrastructure architecture allows IT to consolidate in the branch office to minimize the IT footprint needed to run branch applications-all the while centralizing remote servers and data in the data center.
Tags : 
branch, infrastructure, lower costs, consolidation, servers, data center, it footprint, networking, enterprise applications, data management
    
Riverbed
By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
By: HP     Published Date: Aug 25, 2014
HP ConvergedSystem 700x with Microsoft Hyper-V is an ideal example of the market transition toward integrated computing platforms. Built on HP’s ConvergedSystem 700x converged infrastructure platform, HP ConvergedSystem 700x with Microsoft Hyper-V is a flexible preconfigured solution designed for small to large enterprise and service provider deployments. The solution is built on HP ProLiant or HP BladeSystem servers, HP 3PAR SAN storage, and HP 5900-Series or HP Flex10 networking. The entire stack is managed through HP Insight Control for System Center, which integrates physical and virtual server management through HP Insight with Microsoft System Center 2012 for unified management and orchestration Read this whitepaper to learn more about ESG’s analysis of the costs and benefits—and ultimate economic value—associated with deploying and managing HP ConvergedSystem 700x with Microsoft Hyper-V, versus a comparable conventional data center infrastructure comprised of discrete, non-integ
Tags : 
converged system, economic, enterprise, computing, platforms, deployment, vsphere, application, virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business, storage
    
HP
By: HP     Published Date: Aug 25, 2014
At first, virtualization efforts focused on optimization – making the server more efficient. These efforts transitioned into standardizing virtualization across the data center, including management of servers, storage and networking. Now customers are looking to use virtualization technology and all supporting infrastructure as a complete and extremely efficient system.HP ConvergedSystem 300 for Virtualization has been designed to address one of today’s top priorities for IT organizations – deploying applications faster through virtualization but in a way that does not increase IT complexity. Pre-configured to meet the needs of mid-market customers, HP ConvergedSystem 300 for Virtualization offerings can be easily, reliably, and rapidly deployed to support a variety of virtualized application use cases such as general IT infrastructure, decision support, collaboration or business processing.
Tags : 
converged system, server, complexity, storage, networking, virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, standardizing
    
HP
By: Entrust Datacard     Published Date: Jul 21, 2014
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI).
Tags : 
identity guard, cloud services, pki, secure, mobile identities, devices, security
    
Entrust Datacard
By: IBM     Published Date: Jul 09, 2014
Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how to develop the type of network that truly supports mobile devices, applications and unified communications programs, thereby establishing the foundation for stronger mobile solutions.
Tags : 
ibm, mobility, mobile, mobile technology, mobile infrastructure, it infrastructure, it management, mobile computing
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter