• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

hr infrastructure

Results 1 - 25 of 280Sort Results By: Published Date | Title | Company Name
By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Attackers are pivoting through your infrastructure. What if you could pivot through theirs?
Tags : 
    
Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Traditional threat intelligence is reactive, basing security on information gathered only after an attack is successfully carried out. With threats increasing in sophistication and speed, you need intelligence that can learn from internet activity patterns, automatically identify attacker infrastructure being staged for the next threat, and block those threats before they have the chance to attack your organization. Download this white paper to learn how a predictive intelligence can aid in the fight against cyberattacks.
Tags : 
    
Cisco Umbrella EMEA
By: Intel     Published Date: Nov 13, 2019
A modern network typically extends from the core data center out to the edge and across multiple public, private, and hybrid clouds. This reality is changing how networks are architected, deployed, and managed. Modern, future-ready networks must bring the scale, reliability, and efficiency associated with the cloud into the enterprise network. This can be done through server-based network virtualization and orchestrated virtual network functions (VNFs) that allow network infrastructures to deliver innovative services with efficiency and ease
Tags : 
    
Intel
By: Google     Published Date: Nov 04, 2019
"Gartner evaluated the cloud providers offering infrastructure as a service. Google is proud that Gartner identifies Google as one of only three Leaders in this market. Get your complimentary copy of the report to learn: Where the market stands and where it's going How the vendors scored on the various criteria Which platform solutions are best for your business Why Google was named a Leader in the Infrastructure-as-a-Service market"
Tags : 
database servers, cloud database, application infrastructure, cloud database, data integration
    
Google
By: Dell EMC     Published Date: Oct 30, 2019
As data volumes grow larger every year, businesses that adopt more sophisticated approaches to storing and deriving value from that data benefit in terms of performance, scalability, and cost. How do you migrate effectively to the latest storage and infrastructure technologies, while also mitigating the associated disruption and risk? Download this overview from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
By: ServiceNow     Published Date: Oct 24, 2019
A single outage can be the thread that causes business services to unravel. Can you quickly identify the root cause of an outage and its impact on your business? See how ServiceNow helps customers seamlessly connect their IT infrastructure to transform the customer experience for business stakeholders.
Tags : 
servicenow, operations, business, stakeholders, customer
    
ServiceNow
By: ServiceNow     Published Date: Oct 24, 2019
Learn how ServiceNow has been applying machine learning and analytics with AIOps to help you cut through event noise to create actionable signals, identify service outages and degradations, remediate service and infrastructure issues accurately, and drive continuous improvement in service quality
Tags : 
servicenow, business, services, ops, analytics
    
ServiceNow
By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks
By: Amazon Web Services APAC     Published Date: Sep 19, 2019
This paper examines how cities are using cloud technology to address public challenges, using the framework of the global coalition, Smart Cities Council. This framework promotes three core values for smart cities: livability, providing clean, healthy living conditions without pollution and congestion; workability, providing an enabling infrastructure (energy, transportation, internet connectivity) and high-quality jobs; and sustainability, doing so at no cost to future generations, as the Council puts it. This paper proposes a fourth core value, inclusivity: provisioning services to all city residents regardless of their background.
Tags : 
    
Amazon Web Services APAC
By: MuleSoft     Published Date: Sep 09, 2019
Today’s digital era places strain on traditional financial firms, including increased customer expectations, the threat of disintermediation by market entrants, strict regulatory requirements, and more. How do banks, who face operational silos and aging systems, keep up? The answer lies in building a digital platform with APIs. In this session, hear directly from seasoned technologists to learn about the approach, tools, and operating model they use to successfully adapt and lead in the marketplace. Discover how to get more out of your existing legacy and cloud infrastructure and, in turn, deliver a flexible architecture that can easily adapt as new technologies emerge. During this session, you will learn: Why industry disruptions and increased customer expectations demand a bank that transforms into a digital platform. How an API-led approach to integration can help financial firms transform into digital platforms. SunTrust’s journey with MuleSoft’s Anypoint Platform and Salesf
Tags : 
    
MuleSoft
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
By: Darktrace     Published Date: Sep 04, 2019
Michael Sherwood, CIO of City of Las Vegas, explains how implementing Darktrace’s Enterprise Immune System with its autonomous defense capability fundamentally transformed his team’s cyber security posture. Whether upstream, midstream, or downstream, Darktrace can be deployed to protect oil and gas production and transportation. Remote deployments on rigs can include local modeling and analysis, as well as central correlation for security monitoring of all assets. Darktrace appliances can support low-bandwidth and inhospitable environments through the use of ruggedized industrial probes. With Darktrace’s Industrial Immune System, the entire infrastructure is visualized and protected, including Industrial IoT and ICS.
Tags : 
    
Darktrace
By: Dell EMC Storage     Published Date: Sep 03, 2019
The move to data-centric business models is geared to enable organizations to turn their data into data capital. Because of the more stringent performance, scalability, availability, flexibility, and management requirements of the data-centric model, these organizations must modernize their storage and data protection infrastructure through the process of IT transformation. This white paper defines data capital, describes how boosting data capital is a critical ingredient for competitive differentiation, and discusses the implications for data storage and data protection infrastructure. It then turns to an overview of the Dell EMC storage and data protection portfolio, exploring the benefits these solutions offer to organizations interested in crafting the most effective infrastructure to maximize the value of data capital. Dell EMC Transformation powered by Intel®
Tags : 
    
Dell EMC Storage
By: Darktrace     Published Date: Aug 30, 2019
The Industrial Immune System is a fundamental AI platform for OT cyber defense. The self-learning technology passively learns what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber threats in real time. Martin Sloan, Group Head of Security, Drax: “I often describe Darktrace as life insurance. It catches anomalous behavior and deals with the incident immediately.” Find out how AI is being using to defend Drax power station, the largest coal-powered plant in the UK. Read this case study to find out how Darktrace’s Industrial Immune System can protect your entire digital infrastructure.
Tags : 
    
Darktrace
By: CloudHealth by VMware     Published Date: Aug 26, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Aug 22, 2019
A number of recent surveys indicate that cloud costs are becoming a major concern for businesses, many of whom have found cloud computing to be more expensive than they thought. The surveys align with Gartner’s 2017 prediction that “through 2020, 80% of businesses will overshoot their cloud infrastructure as a service (IaaS) budgets due to a lack of cost optimization approaches”. This could be due to a lack of understanding about cloud pricing, or a lack of knowledge about the full range of measures that can be taken to reduce cloud costs. The one area in which businesses are struggling to control costs more than any other is the hybrid cloud. Analysts attribute hybrid cloud overspend to the complexity of operating a private or public cloud in conjunction with an on-premises infrastructure. Businesses using VMware Cloud (VMC) on AWS don’t experience as much operational complexity in their hybrid environments, but they can still be guilty of overspending. This eBook will offer 6 Ways to
Tags : 
    
CloudHealth by VMware
By: Dell EMC Storage     Published Date: Aug 20, 2019
The move to data-centric business models is geared to enable organizations to turn their data into data capital. Because of the more stringent performance, scalability, availability, flexibility, and management requirements of the data-centric model, these organizations must modernize their storage and data protection infrastructure through the process of IT transformation. This white paper defines data capital, describes how boosting data capital is a critical ingredient for competitive differentiation, and discusses the implications for data storage and data protection infrastructure. It then turns to an overview of the Dell EMC storage and data protection portfolio, exploring the benefits these solutions offer to organizations interested in crafting the most effective infrastructure to maximize the value of data capital.
Tags : 
    
Dell EMC Storage
By: Stripe     Published Date: Aug 06, 2019
Payments is an increasingly strategic area of focus for enterprises, impacting market expansion, customer experience, business model evolution and, ultimately, revenue growth. As the role of payments in business strategy continues to expand, enterprises need secure, reliable and scalable infrastructure to underpin their transaction acceptance and processing capabilities. Stripe commissioned 451 Research to understand how large enterprise-scale merchants are thinking through their online payments infrastructure requirements. 451 Research surveyed 800 merchants across 8 countries, including a mix of business decision-makers from payments to finance to IT. KEY FINDINGS • 87% of mid- and large-sized businesses surveyed use the cloud as their dominant payments environment. • Nearly two-thirds of respondents using the public cloud for payments have seen improvements in security, innovation and uptime, while nearly three in five cited improved scalability. • Respondents using public-cloud-
Tags : 
payment security, platform as a service (paas), foreign currency transactions, fraud protection, payment solutions
    
Stripe
By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
By: Hewlett Packard Enterprise     Published Date: Jul 25, 2019
Provision IT the way you want it, when you want it, through a platform that automates operations. That's Composable Infrastructure. Learn how it represents a key competitive advantage for organizations that want to succeed in the Idea Economy.
Tags : 
    
Hewlett Packard Enterprise
By: NetApp APAC     Published Date: Jul 08, 2019
All-flash storage is on a strong growth trajectory, but the industry is not swooning naively over the blazing fast I/O speeds. Most IT managers are talking a mature, step-by-step approach to all-flash adoption. Falling per-gigabyte prices are making the technology more commonplace. Solid state drives are no longer just for specialized, high-performing tasks. Before they leap, however, storage professionals want to understand the full business picture as they formulate a winning strategy for putting all-flash storage to use for more workloads. This paper offers insights for business success with all-flash storage based on IT Central Station reviews. Real users weigh in on what it takes to get the most out of the technology. It covers such aspects of flash storage as the need for simplicity and the importance of flexibility. The paper also looks at how to build a business case for all-flash and think through the implications of issues such as integration with existing infrastructure.
Tags : 
    
NetApp APAC
By: Ahead     Published Date: Jun 05, 2019
Digital Business Continues to Move the Cyber Goal Posts Fortune magazine estimates that by the year 2020, US companies will spend $101 billion per year on cyber security, up 38% from 2016. With all of the money being invested in cyber security, why do the pace and complexity of new security threats continue to rise year after year? A big reason is that today’s digital business involves a more mobile workforce with expectations of immediate and on demand access to data fronted by intuitive and engaging user experiences, and often underpinned by public cloud infrastructure for increased agility and time to market.
Tags : 
    
Ahead
By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What's Hiding in Your Encrypted Traffic? SSL Orchestration ensures encrypted traffic can be decrypted, inspected by security controls, then re-encrypted. This technology will allow you to maximize your inbound and outbound threats including exploitation, callback, and data exfiltration. Download the overview to learn: o How to maximize your investments in security inspection technologies o How SSL Orchestrator delivers the latest SSL encryption technologies across your entire security infrastructure o The benefits and features of SSL Orchestrator
Tags : 
    
F5 Networks Singapore Pte Ltd
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter