• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

private

Results 126 - 150 of 839Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Oct 20, 2017
Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements many companies are turning to cloud computing. To remain competitive companies need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. A complete cloud strategy will likely include both private and public clouds because some applications and data might not be able to move to a public cloud. Moving to the cloud should not create information silos but should improve data sharing. Any cloud strategy should make sure that it is possible to integrate on-premises, private cloud and public cloud data and applications. Furthermore, any on-premises cloud deployments must be able to easily migrate to public cloud in the future
Tags : 
    
Oracle
By: Oracle Security Solutions     Published Date: Oct 20, 2017
Organizations face onboarding risks of BYOS (Bring Your Own Service) as they hire new employees that bring their own cloud services into the work environment. Risks facing IT and security teams include protecting corporate data and defending against modern threats. While IT and Security teams want to adopt modern cloud applications and increase business agility, they also want to implement visibility and monitoring to protect corporate data and comply to security policies. This session will highlight how new methodologies available today enable organizations to discover sanctioned and un-sanctioned cloud services that are being used within their organization, and how they can apply consistent security policies across the public and private cloud to protect corporate data and conform to compliance policies.
Tags : 
    
Oracle Security Solutions
By: Oracle CX     Published Date: Oct 19, 2017
Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements many companies are turning to cloud computing. To remain competitive companies need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. A complete cloud strategy will likely include both private and public clouds because some applications and data might not be able to move to a public cloud. Moving to the cloud should not create information silos but should improve data sharing. Any cloud strategy should make sure that it is possible to integrate on-premises, private cloud and public cloud data and applications. Furthermore, any on-premises cloud deployments must be able to easily migrate to public cloud in the future
Tags : 
    
Oracle CX
By: Oracle CX     Published Date: Oct 19, 2017
Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements many companies are turning to cloud computing. To remain competitive companies need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. A complete cloud strategy will likely include both private and public clouds because some applications and data might not be able to move to a public cloud. Moving to the cloud should not create information silos but should improve data sharing. Any cloud strategy should make sure that it is possible to integrate on-premises, private cloud and public cloud data and applications. Furthermore, any on-premises cloud deployments must be able to easily migrate to public cloud in the future.
Tags : 
    
Oracle CX
By: IBM     Published Date: Oct 16, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on-premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
ibm, encryption, hybrid-cloud, data protection
    
IBM
By: Riverbed DE     Published Date: Oct 16, 2017
GHD, a global company employing over 8500 people across 10 countries providing engineering, architecture, environment, and construction services to public and private sector clients, anticipates a cost savings of USD 1 million per year after implementing Riverbed’s SteelConnect across their organization. Understand how GHD: • Reduced their networking overhaul from 3 months to just 4 weeks • Enabled zero-touch network deployments to 50+ branch offices • Seamlessly integrated SteelConnect into existing Riverbed WAN and application optimization solutions • Reduced global telecommunications costs by 75% • Provided access to their entire business services offering to all connected end users • Shifted costs from expensive MPLS connections
Tags : 
engineering, architecture, environment, public sector, private sector, ghd
    
Riverbed DE
By: Microsoft     Published Date: Oct 06, 2017
In jeder Geschichte gibt es eine Wahlmöglichkeit: A oder B, wahr oder falsch, sein oder nicht sein. Bei Daten ist es genauso. Sollen Ihre Daten in einer Public Cloud, einer Private Cloud oder lokal gespeichert werden? In welcher Sprache sollen Sie Ihre Anwendungen schreiben? Auf welcher Plattform sollen diese Apps ausgeführt werden? SQL Server 2017 erspart Ihnen diese schwierigen Entscheidungen – genauso wie Optionen, die Ihre Produktivität einschränken könnten. Verwenden Sie die Sprache Ihrer Wahl auf der Plattform Ihrer Wahl, lokal oder in der Cloud.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Microsoft
By: SAP     Published Date: Sep 28, 2017
In today’s digital economy, consumer products (CP) companies face pressures from all sides. Consumers wield great power based on easy access to information about products, pricing, and availability. The barriers of entry for new players with the “next big product idea” are lower than ever. At the same time, channel partners, from big retailers to Amazon, are expanding their own private-label businesses. Added to all that, tremendous volatility persists in the basic costs of doing business, from raw materials, to labor, to shipping, and beyond.
Tags : 
sap, 4hana, real time supply, digitized sales, software portfolio, value proposition, customer
    
SAP
By: Lookout     Published Date: Sep 25, 2017
Ein Überblick über die gesamte Bandbreite der mobilen Risiken für Unternehmensdaten Es ist an der Zeit, das unternehmensweite Risikomanagement zu ändern. Mobilgeräte spielen in unserem privaten und beruflichen Leben eine zentrale Rolle. In der überwiegenden Mehrheit aller Unternehmen liegt der Schwerpunkt jedoch nach wie vor auf dem Schutz traditioneller PC-Endgeräte. Um diese Entwicklung zu fördern, hat Lookout die Matrix für mobile Risiken entwickelt. Sie dient dazu, Sicherheitsorganisationen für das Risikospektrum von Mobilgeräten zu sensibilisieren und Daten bereitzustellen, die die Häufigkeit von Sicherheitsrisiken für mobile Plattformen veranschaulichen.
Tags : 
    
Lookout
By: NetApp     Published Date: Sep 19, 2017
Get the OpenStack Private Cloud Storage blueprint. Learn about the benefits of cloud computing, how to orchestrate your IT infrastructure, why you should consider OpenStack, and what the right OpenStack block storage looks like.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, cloud storage
    
NetApp
By: SAP     Published Date: Sep 19, 2017
In today’s digital economy, consumer products (CP) companies face pressures from all sides. Consumers wield great power based on easy access to information about products, pricing, and availability. The barriers of entry for new players with the “next big product idea” are lower than ever. At the same time, channel partners, from big retailers to Amazon, are expanding their own private-label businesses. Added to all that, tremendous volatility persists in the basic costs of doing business, from raw materials, to labor, to shipping, and beyond.
Tags : 
sap, 4hana, real time supply, digitized sales, software portfolio, value proposition, customer
    
SAP
By: Fiserv     Published Date: Sep 14, 2017
Global anti-money laundering (AML) standards have long required that understanding beneficial ownership be a part of a financial institution’s AML program. Beneficial ownership outlines the identity of individuals with a controlling interest in a privately held company, enabling a financial institution to understand the ultimate beneficiary of a financial transaction. Identifying beneficial ownership can be a complex process, but it’s one that institutions must conquer if they are to remain in compliance with industry rules and legislation.
Tags : 
anti-money laundering, aml, aml software, anti-money laundering software, beneficial ownership, risk management, aml requirements, complex ownership structures, financial action task force, fincen, financial crimes enforcement network, eu aml directive
    
Fiserv
By: Red Hat     Published Date: Sep 08, 2017
Prepare for modern, cloud-native applications and operations with a scaled-out infrastructure. Gain agility to better meet customer needs now and in the future.
Tags : 
    
Red Hat
By: Entelo     Published Date: Sep 06, 2017
Today's tech candidates are actively interacting and sharing their work on different websites, networks, and forums. As more of these channels surface, recruiters have the advantage to connect with more people in real-time, build a community based on shared interests, and to develop their employer identity among candidates. This webinar will cover recruiting on Slack, Reddit, AngelList, and Meetup – a communication tool, aggregated news site and forum, Q&A social network, startup platform, and online portal for interest groups. Michelle Lusen, senior corporate recruiter at Slack, will join us for the webinar to share her best practices for connecting with candidates. In this webinar, you'll learn: How to establish rapport and develop a Slack community of candidates using private and public communication channels Where to look on Reddit and AngelList to find people most interested in hearing about your open role Tactics to identify and engage with domain experts on Meetup How to navi
Tags : 
    
Entelo
By: F5 Networks Inc     Published Date: Aug 25, 2017
With the cloud transforming application development and deployment—enabling organizations to improve flexibility, automate processes, and decrease time to market—some big questions remain. One of the most important issues an organization must address is how it can best employ the smarter tools and limitless scale that the cloud offers. One way that enterprises take advantage of the benefits of the cloud is by deploying their own private cloud, which is a computing model that fosters agility while allowing organizations to maintain control of their infrastructure, while better securing their applications and their data.
Tags : 
    
F5 Networks Inc
By: IBM APAC     Published Date: Aug 25, 2017
Transitioning from traditional IT to cloud IT is not an all-at-once, big bang effort. Rather, the cloud adoption process should be an agile, incremental process. And the first part of that process is understanding the different cloud models. Contrary to popular belief, cloud isn’t necessarily only public cloud, multi-tenant, and hosted in a vendor’s data center. It can also be private cloud, single-tenant, and/or hosted in a corporate data center. Often the best solution is a hybrid combination of these options. This paper will show you the advantages of hybrid cloud applications and explore the considerations you should make to find an optimal solution for your organization.
Tags : 
cost reduction, cost optimization, business agility, innovation, business models
    
IBM APAC
By: CA Technologies     Published Date: Aug 24, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies
By: Key Private Bank     Published Date: Aug 23, 2017
"The latest Key Private Bank whitepaper takes a deeper look at the types, methods and impacts of fraud and identity theft - and how you can prepare and protect your family and your wealth from this growing threat. ©2017 KeyCorp. E89861 170620-248192"
Tags : 
identity theft, fraud, wealth protection, fraud prevention, prepare, cybercrime, cyberattack, phishing, types of fraud
    
Key Private Bank
By: CA Technologies     Published Date: Aug 21, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies
By: Dell EMC     Published Date: Aug 17, 2017
The migration from a traditional enterprise IT infrastructure architecture with separate servers, separate traditional SAN, and separate hyperscale public cloud to an integrated hyperconverged architecture including Server SAN and an integrated hybrid cloud is a profound change. Wikibon explores the premise that the migration is justified, and the optimum hybrid cloud strategy is to use the same architecture and software for both the on-premises True Private Cloud and the public cloud services. Wikibon uses the term “True Hybrid Cloud” to describe this approach.
Tags : 
hyper-converged infrastructure, hci, it infrastructure, vmware environment, it performance
    
Dell EMC
By: Akamai Technologies     Published Date: Aug 17, 2017
Das Mirai-Botnet nutzt Hunderttausende von internetfähigen Geräten, die nur über ein schwaches standardmäßiges Kennwort verfügen. Durch Installation von Malware übernimmt Mirai die Kontrolle über die Geräte und errichtet auf diese Weise eine weltumspannende Armee von infizierten Bots. Bis zum Zeitpunkt der Attacke durchsucht jedes betroffene Gerät das Internet nach weiteren angreifbaren Geräten und infiziert diese. Das Internet der Dinge besteht aus Milliarden von Geräten, die Daten senden und empfangen können und heutzutage fast überall anzutreffen sind. Private Sicherheits- und Unterhaltungsgeräte wie Internetkameras, digitale Videorecorder (DVR) und Router werden häufig mit der Mirai-Malware infiziert.
Tags : 
    
Akamai Technologies
By: Juniper Networks     Published Date: Aug 10, 2017
The dramatic growth of hybrid cloud deployments is creating new challenges for security professionals that can no longer be addressed with legacy technologies, policies and processes. As applications and data move fluidly between multiple clouds private, public and hybrid—organizations must take a unified approach to security that incorporates a range of products working hand in glove to reduce risk and protect the business.
Tags : 
cloud, malware protection, compromised files, threat intelligence, security director, virtual firewall, atp, srx, vsrx
    
Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
The impact of cloud computing and software-defined networking (SDN), including network virtualization, has convinced large enterprises and customers building private, public, and hybrid cloud networks to consider new approaches to help them meet their current and future data center switching needs. Data center switching platforms are constantly evolving, delivering increasingly better performance while simplifying network operations.
Tags : 
scaling, memory, asic platforms, broadcom, tomahawk platforms, juniper networks, multivector scaling, memory architecture
    
Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologies—including both public and private clouds. You’ll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you won’t be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : 
intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
    
Juniper Networks
By: Juniper Networks     Published Date: Aug 08, 2017
A leader in shale oil and gas production, this global Fortune 500 oil and gas company transformed its business, shifting its focus to oil and gas exploration and production and divesting refineries and gas stations. Central to this transformation was to improve operating performance to deliver more value to shareholders.
Tags : 
    
Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter