applications the cloud

Results 26 - 50 of 515Sort Results By: Published Date | Title | Company Name
By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
     Fortinet EMEA
By: Fortinet EMEA     Published Date: Nov 26, 2018
Companies are increasingly moving data and applications to public cloud platforms. Sometimes these transitions happen with IT’s approval and guidance; sometimes they don’t. Regardless, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. It’s difficult to gain visibility and control of the security posture when the organization relies on an assortment of disparate cloud platforms that all take different approaches to security and offer different tools. And it’s hard for a small security staff to stay on top of disparate solutions that fail to integrate.
Tags : 
     Fortinet EMEA
By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
     Akamai Technologies
By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
     Delphix
By: Dell     Published Date: May 04, 2015
To run a truly efficient private cloud, the enterprise must have clear visibility into operations, applications, and costs, no matter how heterogeneous the underlying virtualized environment. Read on to learn how to build the ties that bind the private cloud infrastructure to what the business needs.
Tags : 
     Dell
By: Hewlett Packard Enterprise     Published Date: Jul 19, 2018
We’re in the era of hybrid cloud, an integrated combination of public and private cloud environments. Most companies moving into the public cloud today are making strategic decisions about which applications should go to the cloud and which should stay on-premises. Get acquainted with hybrid cloud management strategies and solutions, and learn what critical components must be addressed as you plan your hybrid cloud environment.
Tags : private cloud, hybrid cloud
     Hewlett Packard Enterprise
By: IBM APAC     Published Date: Jun 21, 2019
Moving major, business-supporting applications to the cloud can be a challenge for a variety of reasons. You may have concerns about the physical migration of data, as data loss or business disruption stemming from a migration issue would be a disaster for the business. Security is another typical concern, as a data breach of your most sensitive applications—like SAP or Oracle— could prove highly damaging. Akin to security, data sovereignty is an issue for many businesses. Stringent compliance laws in some jurisdictions are dictating data “residency”; and in the cloud, it is not always clear where the data is housed. Among managed cloud service users, 68% state that using such services helps them to better manage resource allocation and make SAP and Oracle costs more predictable. In this paper, we will look at common concerns over deploying and optimally managing business-critical, legacy applications in the cloud. We consider the benefits of managed cloud services, and how your
Tags : 
     IBM APAC
By: Emerson Network Power     Published Date: Mar 09, 2011
This brochure will help to depict the various solutions' applications in the arena of Power Management ,Virtualization, Data Center Automation and Cloud Computing.
Tags : emerson network power, quick start, power management, virtualization, data center automation, cloud computing
     Emerson Network Power
By: Silver Peak     Published Date: Sep 26, 2016
As enterprise IT considers ways to improve WAN functionality and service levels while lowering costs, the interest in SD-WANs has dramatically increased. But not all SD-WANs are created equal. As new applications emerge, whether hosted on premise or in the cloud, demands on WAN throughput, efficiency, and reliability increase. Performance-driven SD-WANs significantly improve application performance and Quality of Service (QoS) making it even easier for enterprises to justify adopting SD-WAN solutions.
Tags : sd-wan, networking, it management, network architecture, silver peak
     Silver Peak
By: Silver Peak     Published Date: Feb 06, 2017
As enterprise IT considers ways to improve WAN functionality and service levels while lowering costs, the interest in SD-WANs has dramatically increased. But not all SD-WANs are created equal. As new applications emerge, whether hosted on premise or in the cloud, demands on WAN throughput, efficiency, and reliability increase. Performance-driven SD-WANs significantly improve application performance and Quality of Service (QoS) making it even easier for enterprises to justify adopting SD-WAN solutions.
Tags : sd-wan, networking, it management, network architecture, silver peak
     Silver Peak
By: Rubrik EMEA     Published Date: Jan 04, 2019
Moving applications and workloads to the cloud has become a major goal for most IT decision-makers. But cloud migration can come with challenges and pitfalls for organizations that haven’t done their homework. This paper examines some real-world examples of organizations that successfully made the transition with the help of an experienced vendor with bold new ideas
Tags : cloud, data, archiving, backup, applications, infrastructure, recovery, workloads, vendor, organizations
     Rubrik EMEA
By: Avanade DACH     Published Date: Jan 08, 2019
To compete in today’s world, business leaders are placing increased demands on IT. Unfortunately, many IT departments are not able to deliver future innovation with their current infrastructure, applications and processes. To meet these demands, IT must digitally transform the enterprise through the adoption of cloud native practices, allowing them to both optimize and transform their existing infrastructure and applications. Recent Avanade research supports this thinking, finding that 88% of senior IT decision-makers believe that IT modernization is crucial to addressing the emerging requirements of the digital business1 . On the upside, those surveyed also indicated that by modernizing their IT infrastructures they expect to deliver real business results, such as boosting annual revenue by 14%, while at the same time reducing business operating costs by 13%1 . For many, this sounds like a winning strategy but what does it mean to adopt cloud native approaches, and how does it impact
Tags : 
     Avanade  DACH
By: VMWare - vFabric     Published Date: May 15, 2012
Cloud computing is gaining widespread adoption, and for good reason. This paper highlights companies' confidence level in deploying custom Java applications in the cloud. Learn how to accelerate application deployment now!
Tags : enterprise applications, storage
     VMWare - vFabric
By: Oracle     Published Date: Aug 09, 2013
The beauty of the cloud is that you can get up and running fast. The following e-book will provide you a greater insight into Oracle HCM Cloud Services that are a new generation of cloud-based human capital management applications from the global leader in HR management software. Oracle HCM Cloud Services offer many powerful features and capabilities to accelerate your time to value.
Tags : hcm, cloud, cloud services
     Oracle
By: Oracle     Published Date: Aug 15, 2013
The beauty of the cloud is that you can get up and running fast. The following e-book will provide you a greater insight into Oracle HCM Cloud Services that are a new generation of cloud-based juman capital management applications from the global leader in HR management software. Oracle HCM Cloud Services offer many powerful features and capabilities to accelerate your time to value.
Tags : hcm, cloud, cloud services, enterprise applications, human resource technology, business technology
     Oracle
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
The need to bridge the gap between traditional IT services and cloud application delivery is vital.   This HPE Pointnext blueprint guide examines the critical global business services and IT technology best practices for enabling cloud-native applications—from DevOps practices to underlying infrastructure. The blueprint helps IT teams accelerate the development and delivery of cloud-native applications.
Tags : 
     Hewlett Packard Enterprise
By: IBM APAC     Published Date: May 18, 2017
Welcome to IT as a Service For Dummies, IBM Limited Edition. IT as a Service is the emerging technique that gives technology leaders the flexibility of providing the right set of services to the business. The world of IT is changing dramatically. Businesses are increasingly discovering that IT services are becoming the foundation for the customer experience. IT as a Service isn’t simply a new delivery model for applications. Instead, IT as a Service is a new approach to providing an array of modular services that are targeted to solve changing business problems. While services can be as straightforward as compute or storage in the cloud, they can also be used to complex solutions. Other services may include microservices or integration services that enable a business to quickly create new solutions to help service customers in a more creative and efficient manner.
Tags : service, dummies, ibm, cloud, mobile
     IBM APAC
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
     Rohde & Schwarz Cybersecurity
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : firewall, r&s, visibility, application, network, secure, cloud, business applications
     Rohde & Schwarz Cybersecurity
By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
     Oracle APAC
By: Riverbed     Published Date: Jul 17, 2013
Riverbed IT performance solutions allow you to align IT with the business objectives, accelerate applications and manage performance across the entire corporate network - at the data center, in the cloud, at branch offices, and for mobile workers. Businesses run faster and more efficiently, saving time and cutting the cost of infrastructure.
Tags : it performance, riverbed it, riverbed, network
     Riverbed
By: Workday     Published Date: Oct 17, 2017
Every day, hundreds of organizations communicate, collaborate, and drive their business forward with Workday cloud applications. Our customers say they gain unprecedented visibility into their workforce, improve overall productivity, and get the right people working on the most important initiatives—things they could not achieve with legacy systems. And all of this is accomplished with applications that are intuitive and easy to use. Our customers are unique and have different goals, challenges, and priorities. What they share in common is that they all decided to move beyond legacy systems to the cloud with Workday. So, why Workday?
Tags : 
     Workday
By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
     Tenable
By: Butler Technologies     Published Date: Jul 02, 2018
As enterprises become more distributed and migrate applications to the cloud, they will need to diversify their network performance management solutions. In particular, the network operations team will need to complement its packet-based monitoring tools with active test monitoring solutions to enhance visibility into the cloud and help enterprises scale monitoring gracefully and cost-effectively.
Tags : 
     Butler Technologies
By: DellEMC and Intel®     Published Date: Oct 25, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. New Possibilities Outside. Learn more about Dell EMC enterprise solutions in collaboration with Intel® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Inte
Tags : ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
     DellEMC and  Intel®
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com