• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

iot

Results 201 - 225 of 590Sort Results By: Published Date | Title | Company Name
By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva
By: Dynatrace     Published Date: Apr 16, 2018
Internet-of-things (IoT) is increasing in excitement across all industries as they look to provide innovation in their product and services, and monitor risks and costs in their business operations. But IoT is not a single technology. It is an ecosystem of human and non-human touchpoints that span across multiple technologies. This creates a dynamic and complex environment that is difficult to see and manage in scope. The traditional monitoring approach of watching dashboards, responding to alerts, and manually analyzing doesn’t work anymore. Today’s hyper-dynamic, highly distributed IoT application environments have become way too complex and move too quickly. The volume, velocity, and variety of information is simply more than humans can keep up with using traditional tools.
Tags : 
    
Dynatrace
By: Dynatrace     Published Date: May 21, 2019
The Internet of Things (IoT) is exploding across every industry, everywhere, starting a new chapter in digital transformation. As new use-cases for IoT continue to emerge, the digital experiences they enable will become increasingly critical to business success, connecting all aspects of human society. Based on a global survey of 800 CIOs, this report examines the challenges organizations face as they begin to explore and deploy Internet of Things (IoT) use-cases and web-scale applications.
Tags : 
    
Dynatrace
By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
By: Entrust Datacard     Published Date: May 10, 2017
The rapid rise of digital business is moving public key infrastructure (PKI) into the spotlight. Once commonly viewed as a deep-weeds technology reserved for niche applications, PKI is now emerging as a core technology for securing cloud, mobile and Internet of Things (IoT) initiatives.
Tags : 
digital, cloud, cloud computing, internet of things, intrastructure
    
Entrust Datacard
By: Enventys Partners     Published Date: Jul 02, 2019
A good product development company is often faster on its feet compared to developing a product internally. Get your initial concept to a prototype, and hit the accelerator from there. You can give decision makers within your company something they can see and touch, rather than a nebulous pitch during the concept stage. This whitepaper outlines how outsourcing or augmenting your internal product development capabilities can get you great results while providing additional value at each step of the process.
Tags : 
product development, blueprint, iot connectivity, enventys partners
    
Enventys Partners
By: Epicor     Published Date: Apr 04, 2017
As a manufacturer, you know the industry is changing. You’re expected to produce more, work faster and leaner, and find ways to make new products like those comprising the Internet of Things (IoT). Customer and employee expectations are also changing rapidly because our experiences as consumers shape our demands for business. As many factory employees are approaching retirement, a new generation is joining the workforce—a generation that wants the business systems they interact with to be as intuitive as those they use in all other areas of their life. A new report from Aberdeen explores today’s manufacturing landscape and outlines how enterprise resource planning (ERP) software forms a foundation that can support Industry 4.0 for smaller manufacturers looking to grow.
Tags : 
industry 4.0, erp software, enterprise resource planning software, modern manufacturer
    
Epicor
By: Epicor     Published Date: Aug 18, 2017
As a manufacturer, you know the industry is changing. You’re expected to produce more, work faster and leaner, and find ways to make new products like those comprising the Internet of Things (IoT). Customer and employee expectations are also changing rapidly because our experiences as consumers shape our demands for business. As many factory employees are approaching retirement, a new generation is joining the workforce—a generation that wants the business systems they interact with to be as intuitive as those they use in all other areas of their life. A new report from Aberdeen explores today’s manufacturing landscape and outlines how the latest enterprise resource planning (ERP) software forms a foundation that can support Industry 4.0 for smaller manufacturers looking to grow.
Tags : 
industry 4.0, erp software, enterprise resource planning software, epicor erp
    
Epicor
By: Epicor     Published Date: Dec 06, 2018
Change—and the innovation it creates—increasingly defines the winners and losers in today’s manufacturing industry. As successful manufacturers continue to embrace the Internet of Things (IoT), Industry 4.0, and other digital transformation trends, it’s important to recognize and implement these changes or risk getting left behind by the competition. In this Epicor eBook, we’ll look at five key areas where successful manufacturers must embrace change and use it to drive innovation, competition, and growth—including: • The accelerating pace of technology change • The changing face of the modern workforce • Competing in a global manufacturing marketplace • Tapping the power of analytics and data-driven manufacturing • Charting a path to sustainable, cost-effective compliance We’ll also explain how Epicor Cloud ERP equips manufacturers to regard change as an opportunity rather than a threat. Download the eBook to learn more.
Tags : 
epicor erp, cloud erp, digital transformation
    
Epicor
By: Epicor     Published Date: Jan 09, 2019
Behind the scenes of the world’s leading industrial and manufacturing companies, a profound digital transformation is now underway .1 As with any profound transformation, the opportunities for competitive advantage and growth are enormous, but so are the challenges . How do you determine what your next digital transformation steps should be? How do you position your manufacturing business to take the next step—and the one after that? This eBook will help you answer these questions . In it we will: XX Introduce the role of visibility in digital transformation XX Consider three key trends that are shaping the future of manufacturing by delivering the visibility that enables transformation: – Growth of the Internet of Things (IoT) – The advance of analytics – The migration of applications to the cloud XX Identify the traits you need in your core systems to take advantage of these trends—giving you the visibility to identify and take the steps that will help transform your business into
Tags : 
    
Epicor
By: Equinix EMEA     Published Date: May 22, 2019
Much has been written about the impact of technology on insurance, this most traditional of industries. Artificial intelligence (AI), connected cars, drones and the Internet of Things (IoT) are all becoming integral to the insurance and automotive industries. This becomes obvious when using your car’s navigation system – an everyday action that might well lead to a chain of events few would even think of today. To find out more download this whitepaper today.
Tags : 
    
Equinix EMEA
By: Extreme Networks     Published Date: Feb 14, 2017
Cada vez hay más dispositivos y sistemas autónomos que utilizan la red compo infraestructura de comunicación. Este fenómeno, conocido como “Internet of Things” es hoy día omnipresente en cualquier entorno, desde edificios inteligentes a hospitales. Las universidades y centros educativos no son ajenos a este fenómeno. En este documento se analiza la problemática concreta que IoT plantea a este tipo de entornos y la forma de darle respuesta
Tags : 
    
Extreme Networks
By: Extreme Networks     Published Date: Feb 14, 2017
La tecnología es hoy día el mejor aliado de cualquier Administración Pública para acercarse al ciudadano. Muchos organismos públicos están desplegando tecnologías de “edificación inteligente” tanto para para ofrecer al ciudadano una amplia gama de servicios on-line en sus sedes como para gestionar de forma más eficiente sistemas y servicios dentro de los edificios públicos. En este documento se analizan los retos y estrategias más adecuadas para el despliegue de este tipo de tecnologías.
Tags : 
    
Extreme Networks
By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDC’s Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: • Why having a modern healthcare infrastructure is so important • The major challenges IoT brings to healthcare networks • How IEC 80001 is impacting compliance • Trends that confront a network IT professional in healthcare • Risks Healthcare IT must eli
Tags : 
healthcare, iot, iec 800001, extreme networks, healthcare it
    
Extreme Networks
By: F5     Published Date: May 12, 2016
App Protection is fraught with complexity and with the growth of IoT and the applications that go along with it, the issues are only growing. By enhancing existing security portfolios with solutions and services focused on the application level, organizations can better protect the applications that can expose their sensitive data.
Tags : 
application protection, app protection, security, cloud, cloud computing, public cloud, security application, application security
    
F5
By: F5 Networks Inc     Published Date: Jun 24, 2015
Enterprises are moving to a software-defined, private cloud data center model for agility, operational efficiency, and a self-service approach to deploying applications and associated services. They are utilizing a two-tier hybrid services architecture to get the benefits of specialized hardware for front door network services and scalable software for application, stack-specific services. Read this whitepaper to learn how to integrate the necessary services with the orchestration and automation systems of a software-defined data center.
Tags : 
appplication services, cloud, software, load balancing, iot, agility, automation, operational efficiency
    
F5 Networks Inc
By: F5 Networks Inc     Published Date: Jun 24, 2015
To succeed in this dynamic environment, organizations must create networks that combine core layer 4-7 functionality, programmability, and application fluency into a scalable Application Delivery Network. While these components all bring their individual benefits, the real lasting value lies in the resulting synergy of the combined solution. Read this whitepaper to learn about the five advantages of F5 when evaluating a replacement for Cisco ACE.
Tags : 
appplication services, cloud, software, load balancing, iot, agility, automation, operational efficiency
    
F5 Networks Inc
By: F5 Networks Inc     Published Date: Jun 24, 2015
To meet the challenges of IT organizations, Cisco and F5 have developed a shared architectural vision and joint solution to simplify networking and solve pain points in next-generation data centers. The solution extends the F5 Synthesis architecture and programmable Software-Defined Application Services (SDAS) within the Cisco Application Centric Infrastructure (ACI), helping customers efficiently deliver applications that are fast, secure and available. Read the whitepaper to learn more.
Tags : 
appplication services, cloud, software, load balancing, iot, agility, automation, operational efficiency
    
F5 Networks Inc
By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : 
protection, ddos, security, reporting, organization, device
    
F5 Networks Inc
By: F5 Networks Inc     Published Date: Mar 30, 2018
It seems like every day there’s another article about IoT, big data analytics, and cloud architectures—and their unlimited potential for companies trying to gain a competitive edge in this digital world. If your business is in the midst of a digital transformation (and chances are, it is), you’re probably already enjoying some the benefits of the public cloud: economies of scale, preconfigured solutions that can be spun up with a few clicks, utility billing, and more. What you may not have heard, however, is how the shared security model of the public cloud affects your security responsibilities —and how it can be used to your advantage in these multicloud environments.
Tags : 
roi, cloud, security, architectures, business, economies
    
F5 Networks Inc
By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
threats, applications, cybercriminals
    
F5 Networks Inc
By: F5 Networks Inc     Published Date: Aug 16, 2018
As signaling and scrubbing technology evolve (and as your solutions become more and more adaptable), DDoS attacks will become less effective and less attractive to would-be adversaries. The time will soon come when a 1 Tb attack from an IoT botnet will seem like a mere annoyance, rather than a catastrophic event—if you even notice it at all. So how do you get there faster? Plan ahead by designing a defense in-depth DDoS strategy and partner with a trusted security provider to handle the large attacks. Upfront preparation will pay off when the threat of DDoS attacks no longer keeps you up at night.
Tags : 
strategy, ddos, spam, technology, solutions
    
F5 Networks Inc
By: F5 Networks Inc     Published Date: Sep 14, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
    
F5 Networks Inc
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter