cloud application

Results 76 - 100 of 1329Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
     Akamai Technologies
By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
     Delphix
By: Dell     Published Date: Sep 04, 2015
Download this white paper to learn how to build a private cloud that seamlessly integrates with external clouds without compromising systems and applications, performance insight and cross-cloud interoperability.
Tags : 
     Dell
By: Dell EMC     Published Date: Nov 04, 2016
While some distributed enterprises look to the cloud to reduce server sprawl and centralize operations, in many cases, the cloud simply isn’t feasible. Maybe the offices are in remote locations with limited Internet service or low-bandwidth connectivity causes issues such as latency and availability. Download the solutions brief to discover why VCE VxRail hyper-converged appliances from Dell EMC are ideal for consolidating multiple applications in a remote location onto a single, high-performance and high-availability platform that’s easy to deploy and manage.
Tags : distributed enterprises, vmware, storage, virtualization, software management, appliances
     Dell EMC
By: Akamai Technologies     Published Date: Jun 14, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and ef ciency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : digital technology, cloud, security, connectivity, authenticate
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
"Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile."
Tags : zero trust, security, cyber security, cloud
     Akamai Technologies
By: Dell     Published Date: May 04, 2015
Read this paper to further learn how: - Leveraging cloud technology can help drive costs while enabling service-oriented IT. - Private and hybrid cloud approached improve application delivery. - Cloud implementations increase agility and help organizations adjust to meet customer and worker expectations. - Dell Cloud features Intel® technology.
Tags : 
     Dell
By: Dell     Published Date: May 04, 2015
To run a truly efficient private cloud, the enterprise must have clear visibility into operations, applications, and costs, no matter how heterogeneous the underlying virtualized environment. Read on to learn how to build the ties that bind the private cloud infrastructure to what the business needs.
Tags : 
     Dell
By: Dell     Published Date: May 04, 2015
Read this white paper to see how end-to-end solutions from Dell combine Microsoft Windows Server® 2012 “Cloud Operating System” and a new generation of Microsoft business applications on flexible, scalable, power-efficient, virtualization-ready infrastructure
Tags : 
     Dell
By: Akamai Technologies     Published Date: Aug 17, 2017
Why Cloud-Based Security is Crucial for Enterprise Web Applications
Tags : web application, security, cloud-based security
     Akamai Technologies
By: Dell     Published Date: Feb 04, 2015
With support for Windows Server 2003 ending, transitioning to Server 2012 is clearly a must for companies. While migration will be an adjustment for organizations relying on niche applications that are 10 years old, the costs of not upgrading to Server 2012 could prove fatal.
Tags : dell, windows, microsoft, modernization, management, modernization, server, 2003
     Dell
By: HP     Published Date: Dec 05, 2014
Delivering high-quality services with greater speed and efficiency is one of the greatest pressures facing your information technology (IT) infrastructure. The rise of computing in the cloud, expansive mobility options, and increasing pressure to boost application performance have added even further complexity - leading to inefficiencies that can limit your opportunity for growth and success. Traditional, siloed IT infrastructures are often too labor intensive, inefficient, and slow to overcome these challenges. Organizations need a converged, cloud-ready, software defined infrastructure to help them meet the evolving demands of their business.
Tags : server, performance, efficiency, application, infrastructure, information technology, mobility, cloud
     HP
By: PulseSecure     Published Date: Apr 01, 2015
Learn how to enable fast and secure network, cloud, and application access in order to maximize productivity for those employees who work remotely or are constantly travelling.
Tags : mobile connectivity, byod, device security, policy compliance, enduser, pulse secure, mobile worker, networking
     PulseSecure
By: Hewlett Packard Enterprise     Published Date: Jul 19, 2018
We’re in the era of hybrid cloud, an integrated combination of public and private cloud environments. Most companies moving into the public cloud today are making strategic decisions about which applications should go to the cloud and which should stay on-premises. Get acquainted with hybrid cloud management strategies and solutions, and learn what critical components must be addressed as you plan your hybrid cloud environment.
Tags : private cloud, hybrid cloud
     Hewlett Packard Enterprise
By: CA Technologies     Published Date: Nov 07, 2014
Les activités IT et métier sont concernées par de nombreuses tendances : l’adoption du Cloud, l’accroissement de la mobilité, l’essor des médias sociaux et l’augmentation des flux d’informations circulant au sein de toute l’entreprise. Le concept de périmètre réseau n’a plus de sens. En effet, l’IT doit aujourd’hui composer avec des identités hautement distribuées sur l’ensemble de l’environnement métier et provenant de nombreuses sources, telles que des applications, des systèmes, des médias sociaux, etc. Les employés et les clients mobiles sont, par ailleurs, en train de changer profondément l’activité et de redéfinir le défi consistant à fournir rapidement des applications sécurisées à une population d’utilisateurs en constante évolution. À chaque défi son opportunité. L’identité remplace désormais le périmètre réseau, et seules les entreprises qui ont compris cette évolution sont en mesure de dynamiser et de protéger leur activité.
Tags : business trends, cloud adoption, sociial media, social mobility, security in the cloud, business security, wireless, business technology
     CA Technologies
By: CA Technologies     Published Date: Nov 07, 2014
Les supports mobiles, sociaux et de cloud computing ont aidé à éliminer les vieux périmètres réseau. La nouvelle entreprise ouverte doit faire avec un large éventail d'utilisateurs, d'appareils et d'applications, sans limites définies. De nouveaux modèles de sécurité sont essentiels pour à la fois permettre et protéger les activités commerciales dans ce monde nouveau. Téléchargez le guide.
Tags : mobile media, social media, mobile workers, security in the cloud, removal of the network perimeters, business technology
     CA Technologies
By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
     Akamai Technologies
By: IBM APAC     Published Date: Jun 21, 2019
Moving major, business-supporting applications to the cloud can be a challenge for a variety of reasons. You may have concerns about the physical migration of data, as data loss or business disruption stemming from a migration issue would be a disaster for the business. Security is another typical concern, as a data breach of your most sensitive applications—like SAP or Oracle— could prove highly damaging. Akin to security, data sovereignty is an issue for many businesses. Stringent compliance laws in some jurisdictions are dictating data “residency”; and in the cloud, it is not always clear where the data is housed. Among managed cloud service users, 68% state that using such services helps them to better manage resource allocation and make SAP and Oracle costs more predictable. In this paper, we will look at common concerns over deploying and optimally managing business-critical, legacy applications in the cloud. We consider the benefits of managed cloud services, and how your
Tags : 
     IBM APAC
By: Alert Logic     Published Date: Sep 03, 2014
As more organizations consider a move to the cloud, security remains a top concern. Learn how Alert Logic’s suite of security solutions are designed to provide infrastructure and application security and compliance through a cloud-native model that takes advantage of the AWS business model and elastic scaling capabilities.
Tags : alert logic, amazon web security solutions, aws business model, security
     Alert Logic
By: Red Hat Government     Published Date: Jul 21, 2011
An IDC executive report examines the future of cloud computing, focusing on design goals that support portability of applications and data, which will certainly avoid expensive and time-consuming fixes.
Tags : cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization
     Red Hat Government
By: Red Hat Government     Published Date: Jul 21, 2011
Do you have an effective cloud governance plan? This whitepaper guides you through best practices for ensuring your applications and data can safely move between clouds - whether they are private, public or hybrid.
Tags : cloud governance, governance, consistency, portability, consistant, portable, cloud computing, interoperability
     Red Hat Government
By: Red Hat Government     Published Date: Jul 21, 2011
Organizations around the world are benefiting from public clouds. But, when production applications or critical data is involved, it's important to extend on-premise governance to your public or hybrid cloud resources. Effective cloud governance is possible.
Tags : cloud governance, governance, cloud computing, interoperability, red hat, open source, idc, enterprise linux
     Red Hat Government
By: Red Hat     Published Date: Jan 01, 2013
Linux has long since staked its claim to the cloud. Red Hat Enterprise Linux, with its consistency, stability, scalability, and support, is in a class of its own. Offering an outstanding environment for application deployment and the economy and innovation of open source, Red Hat Enterprise Linux also provides the reliability you need.
Tags : cloud system, consistency, stability, scalability, support, application deployment
     Red Hat
By: Red Hat     Published Date: Jan 06, 2014
Interested in leveraging automation technologies and a cloud architecture to make developers more productive? Learn how PaaS can benefit your organization to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies. Begin charting your path to PaaS with OpenShift Enterprise.
Tags : enterprise, paas, openshift, openshift online, red hat, openstack, open-source architect, infrastructure-as-a-service
     Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com