• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

system

Results 6126 - 6150 of 6370Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
McAfee
By: McAfee     Published Date: Jan 20, 2015
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, networking
    
McAfee
By: AppDynamics     Published Date: Sep 25, 2017
IDC’s research shows enterprises around the world are using multicloud strategies to optimize the performance of modern and existing legacy applications running on-premises, in public cloud services, and on legacy systems. In the early days of enterprise cloud adoption, many organizations focused their cloud strategies on enabling net-new cloud-native applications written to take advantage of dynamic cloud infrastructure and pay-as-you-go consumption-based cost models. Early success with these implementations is convincing more and more enterprises to expand their cloud footprint and to migrate existing applications to cloud in order to enhance end-user experiences, optimize cloud resource utilization and costs, and create a more flexible and agile business environment.
Tags : 
    
AppDynamics
By: AppDynamics     Published Date: Sep 25, 2017
IDC’s research shows enterprises around the world are using multicloud strategies to optimize the performance of modern and existing legacy applications running on-premises, in public cloud services, and on legacy systems. In the early days of enterprise cloud adoption, many organizations focused their cloud strategies on enabling net-new cloud-native applications written to take advantage of dynamic cloud infrastructure and pay-as-you-go consumption-based cost models. Early success with these implementations is convincing more and more enterprises to expand their cloud footprint and to migrate existing applications to cloud in order to enhance end-user experiences, optimize cloud resource utilization and costs, and create a more flexible and agile business environment.
Tags : 
    
AppDynamics
By: AppDynamics     Published Date: Feb 08, 2018
The primary intended audience for this document is any expert in professional services who needs to assure the health of SharePoint and systems connected to it. If you’re a systems architect, you can gain understanding of SharePoint components and how other applications can take advantage of SharePoint. If you’re an independent consultant, you’ll learn about the elements of comprehensive coverage and total visibility into operations with prebuilt monitoring configurations.
Tags : 
    
AppDynamics
By: Salesforce     Published Date: Dec 02, 2015
When Salesforce CEO Marc Benioff co-founded the cloud computing company back in 1999, one of the first things he did was define his management process. As he shares in his book Beyond the Cloud, Benioff wanted to put into words what his focus was and then clearly communicate it to the rest of the business. The result was the V2MOM (pronounced “V2 mom”), an acronym that stands for vision, values, methods, obstacles, and measures. Benioff says this system has helped keep everyone at the fast-growing company on the same page over the years. Below are the basic steps of Benioff’s V2MOM system. You can use them to start defining your management process.
Tags : 
    
Salesforce
By: Epicor Software     Published Date: Nov 25, 2014
This whitepaper identifies eight ideas on how to deliver more value to your customers in a completely different way.
Tags : 
enterprise resource planning, erp, erp system, software, software implementation, software solution, upgrade software, distribution
    
Epicor Software
By: MarkLogic     Published Date: Dec 03, 2014
So many people are realising that yesterday’s technology can’t support today’s fast-changing data and are turning to a new generation of database: NoSQL. NoSQL makes it easy to consolidate your heterogeneous data and consolidate disparate data silos because you don’t need to make data conform to the row-and-column restrictions of relational technology. Get a head start and download Enterprise NoSQL for Dummies and discover: • The NoSQL lingo • What it does and how it works • How it can be used • Tips for what to look for in an Enterprise NoSQL database Go beyond relational and learn how NoSQL allows you to build applications with greater ease and speed! http://info.marklogic.com/nosql-for-dummies.html
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable
    
MarkLogic
By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
Intel Security
By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center
    
Intel Security
By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
    
Great Bay Software
By: NetApp     Published Date: Jun 27, 2016
“Are solid-state arrays (SSAs) worth the extra cost? This independent survey of SSA users found that their deployments provided a positive ROI after only 5.4 months, significantly faster than hard-disk drive (HDD) storage systems. Discover why Gartner strongly advises that SSAs be considered whenever HDD-based storage systems need to be replaced. Read the report: Solid-State Array TCO Reality Check.”
Tags : 
    
NetApp
By: NetApp     Published Date: Aug 26, 2016
For customers looking to implement flash for primary data center storage, NetApp's All Flash FAS systems offer some significant advantages over competitive offerings. Customer can deploy All Flash FAS arrays for specific applications now and later extend them to private and hybrid cloud-based applications as enterprise IT's longer term strategy dictates. Read this technology insight paper on investing strategically in all flash arrays.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
By: NetApp     Published Date: Mar 05, 2018
Did you know that by 2020, 50% of analytic queries will be generated using search, natural-language processing or voice, or will be automatically generated? Read the Gartner report Technology Insight for Modern Analytics and Business Intelligence Platforms and find out how to meet the time-to-insight demands of today's competitive business environment. Learn how to: • Determine when to use existing, traditional BI technologies versus modern analytics and BI • Broaden data access beyond relational systems • Adopt new approaches to data modeling
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
By: NetApp     Published Date: Mar 05, 2018
Are solid-state arrays (SSAs) worth the extra cost? This independent report, based on end-user surveys and inquires, finds that SSA deployments provide a positive ROI after within months. Discover why Gartner strongly advises that SSAs be considered whenever legacy storage systems need to be replaced.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
By: STANLEY Healthcare     Published Date: Mar 24, 2015
When four of its hospitals needed to transition from manual to automated temperature monitoring, Allina Health sought a solution that would meet its core requirements: timely alerts to problems and automatic data capture for compliance reporting requirements. Ultimately, it was also looking for an enterprise solution that could form the standard for its entire health system. Read this case study to learn why Allina Health chose STANLEY Healthcare’s Wi-Fi-based AeroScout® Environmental Monitoring solution, including MobileView software, as its system-wide standard to build an enterprise foundation for asset tracking, environmental monitoring, and other RTLS capabilities.
Tags : 
healthcare, medicine, asset tracking, environmental monitoring, rtls, hospital
    
STANLEY Healthcare
By: ServiceNow     Published Date: Jul 09, 2015
Enterprises are transforming IT by adopting service automation tools and processes, making teams more innovative and efficient. By consolidating fragmented and redundant service systems, standardizing operational processes and by creating a single system of record for IT, CIOs can shift their attention from maintenance to service, effectively changing enterprise IT.
Tags : 
    
ServiceNow
By: IBM     Published Date: May 27, 2015
Continuous engineering is explained in easy to understand terms in this Dummies book, appropriate for all levels of product and systems development stakeholders.
Tags : 
continuous engineering, systems development, product development, data analysis, software development, it management, knowledge management, data management
    
IBM
By: XO Communications     Published Date: Apr 14, 2015
Enterprise communications is at a critical juncture. Employees require the very best mobility and collaboration tools while IT struggles with tight budgets and lean staffing. Read this paper to learn about these looming challenges and how hosted PBX with Unified Communications can help you address these issues, paving the way for better enterprise communications.
Tags : 
    
XO Communications
By: MobileIron     Published Date: Mar 21, 2017
Modern enterprises are rapidly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services. As a result, these organizations are quickly outgrowing basic mobile device management (MDM) capabilities and apps like email and calendar. Building a secure mobile and cloud architecture now requires a comprehensive approach to enterprise mobility management (EMM). It requires a unified platform with defense-grade security, massive scalability, a broad ecosystem of technology partners, enhanced Office 365 security, and integrated desktop and mobile management. And it has to provide all of this without locking customers into a proprietary technology stack.
Tags : 
    
MobileIron
By: Microsoft Azure     Published Date: Apr 10, 2018
Help your sellers work smarter and build stronger relationships Sales teams work so hard, they can burn out quickly. It’s tough when customer contacts, sales goals, productivity tools, and social networking are all separated and siloed. Instead of working in separate systems that make day-to-day selling complex, you can help simplify the way your sellers work. And empower your team to be more productive and efficient. Our e-book, “The Savvy Seller’s Guide to Building Profitable Relationships,” is packed with advice for making selling much less painful—and more profitable. Did you know if your lead has had prior exposure to content from your company’s brand, that they’re 25% more likely to respond to your InMail? You’ll find this and more helpful facts in the e-book, including actionable insights to help your team: Identify the right leads—including pinpointing who’s on the buying committee Capture buyers’ attention Use insights and predictive intelligence from AI and machine learni
Tags : 
    
Microsoft Azure
By: Dell EMC     Published Date: Aug 03, 2015
Understand how Vidant Health System transforms health IT strategy and accelerates meaningful use of Epic EHR with EMC XtremIO
Tags : 
vidant health system, multiple emc solutions, business operations, it storage infrastructure, storage transformation, it initiatives, storage management, internet security
    
Dell EMC
By: Dell EMC     Published Date: Nov 03, 2015
This white paper provides an introduction to the EMC Isilon OneFS operating system, the foundation of the Isilon scale-out storage platform.
Tags : 
    
Dell EMC
By: Dell EMC     Published Date: Aug 15, 2017
The all-flash, hybrid & archive storage systems allow customers to take on new, demanding unstructured data apps to achieve faster business outcomes.
Tags : 
nas storage, storage platform, storage system, data storage, data management
    
Dell EMC
Start   Previous    239 240 241 242 243 244 245 246 247 248 249 250 251 252 253    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter