cloud based data

Results 101 - 125 of 189Sort Results By: Published Date | Title | Company Name
By: ServiceSource     Published Date: Nov 01, 2013
In this book we describe best practices honed through 13 years of experience and partnership with some of the leading technology companies in the world. These best practices will give you insight into three key areas: • Data management & renewal opportunity generation • Sales strategy & execution • Continuing the renewal cycle We hope you enjoy this book!
Tags : reducing customer churn, servicesource, recurring revenue, higher profit margins, drive innovation, drive performance, saas companies, competitive markets, less loyal customers, the cloud, profitable revenue stream, unique business process, technology platform, deliver real-time, fact-based plan, renewal ready data, accelerate analytics, channel partners, science of renewals
     ServiceSource
By: Equinix     Published Date: Oct 20, 2015
The cloud is impacting WAN architectures. IT leaders looking to use a cloud-based infrastructure and/or application services, especially high-bandwidth, real-time voice and video over Internet Protocol applications, should strategically locate communications hubs outside the enterprise data center.
Tags : communication hubs, wan architectures, cloud-based infrastructure, application services, high-bandwith, networking, enterprise applications
     Equinix
By: Dell EMC     Published Date: Jun 29, 2016
EMC Isilon Cloudpools software provides policy-based automated tiering that lets you seamlessly integrate with the cloud as on additional storage tier for the isilon cluster at your data center. Learn more about groundbreaking software in this solution brief.
Tags : data, storage, best practices, enterprise, management
     Dell EMC
By: AWS     Published Date: Aug 23, 2018
AWS supports healthcare organizations with HIPAA Eligible Services and the AWS Healthcare Compliance program. AWS products and services are being used by many customers that handle electronic patient health information (PHI) to build solutions that meet HIPAA and HITRUST regulatory requirements for cloud-based workloads. In this webinar, you’ll learn how AWS HIPAA Eligible Services can help you build secure workloads to handle PHI in compliance with HIPAA and HITRUST standards. AWS Healthcare experts will be joined in this webinar by AWS Partner Network (APN) Partners ClearDATA and Cloudticity.
Tags : 
     AWS
By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
     Ciena
By: Tenable     Published Date: Feb 05, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : vulnerability management, analyst report, idc
     Tenable
By: BMC ASEAN     Published Date: Dec 18, 2018
Big data projects often entail moving data between multiple cloud and legacy on-premise environments. A typical scenario involves moving data from a cloud-based source to a cloud-based normalization application, to an on-premise system for consolidation with other data, and then through various cloud and on-premise applications that analyze the data. Processing and analysis turn the disparate data into business insights delivered though dashboards, reports, and data warehouses - often using cloud-based apps. The workflows that take data from ingestion to delivery are highly complex and have numerous dependencies along the way. Speed, reliability, and scalability are crucial. So, although data scientists and engineers may do things manually during proof of concept, manual processes don't scale.
Tags : 
     BMC ASEAN
By: Riverbed     Published Date: Feb 26, 2015
To increase agility while lowering costs, IT organizations are using virtualization and cloud-based infrastructure services to consolidate and reduce the number of physical servers and data centers across the enterprise. IDC estimates that, by 2015, more than 20 percent of the information running through servers will do so on virtualized systems. This percentage increases along with the size of the company, with some larger organizations using 100 percent virtualized systems. IDC predicts that, over the next decade, the amount of information managed by enterprise data centers will grow by a factor of 50.
Tags : increase agility, virtualization, infrastructure, the cloud, cloud based, consolidation, it management
     Riverbed
By: Amazon Web Services     Published Date: Sep 05, 2018
Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. It’s designed for speed and ease of use — but to realize all of its potential benefits, organizations still have to configure Redshift for the demands of their particular applications. Whether you’ve been using Redshift for a while, have just implemented it, or are still evaluating it as one of many cloud-based data warehouse and business analytics technology options, your organization needs to understand how to configure it to ensure it delivers the right balance of performance, cost, and scalability for your particular usage scenarios. Since starting to work with this technolog
Tags : 
     Amazon Web Services
By: EVault Inc.     Published Date: Aug 22, 2012
Go hybrid and get the best of both data protection worlds. Cloud-connected backup and recovery seamlessly combines cloud-based and onsite data protection technologies for fast, local restores and ensured, offsite disaster recovery. Read the white paper to: . Discover the benefits of transitioning from tape to disk . Learn how to get shorter backup windows and faster recovery times . Ensure your data is totally secure and easily recovered
Tags : white paper, cloud, connected, backup, recovery, hybrid, data, protection, local, restores, offsite, disaster, storage, data center
     EVault Inc.
By: CDW     Published Date: Nov 13, 2012
With the right SaaS security solutions, small businesses can gain enterprise-class safeguards at an affordable price.
Tags : cdw, cloud, cloud computing, cloud based security, cybertheft, data breaches, business technology
     CDW
By: Symantec Corporation     Published Date: Aug 28, 2013
SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. For example, they protect remote communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL certificates to protect confidential information. In addition, SSL certificates are used to secure server-to-server communications for applications and data exchange. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services.
Tags : ssl certificates, communication, webmail, technical support, technology, data, security, knowledge management, data management, business technology
     Symantec Corporation
By: QTS Data Centers     Published Date: Mar 31, 2015
Information technology is undergoing rapid change as organizations of all types begin to embrace the idea of moving computing infrastructure from on-premises to the cloud. It is easy to understand why the cloud has taken off faster than any technology phenomenon in recent memory. The cloud has the potential to reduce total cost of ownership (TCO) while enabling quicker responses to fast-moving markets and ever-changing customer needs. “Being able to flex your compute resources based on changes in volume and customer demand increases agility, making going to the cloud a very attractive proposition for our customers,” says Brian Johnston, chief technology officer for QTS in Overland Park, Kansas, a provider of data center solutions and fully managed services.
Tags : qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management
     QTS Data Centers
By: Microsoft Office 365     Published Date: May 10, 2016
We’ve identified seven ways that moving to cloud-based productivity apps can: Improve your communication and teamwork Increase your company’s mobility Turn data into insights Download the e-book to learn how you can make the most of the cloud with Office 365.
Tags : 
     Microsoft Office 365
By: Cloudian     Published Date: Feb 15, 2018
As the volume of unstructured data created and used continues to increase rapidly, organizations are faced with challenges around data storage. In response, many new technologies — specifically objectbased storage, software-defined storage, all-flash arrays, and cloud-based storage services — are experiencing rapid adoption. Yet object-based storage has been limited by the need to rewrite existing file-based applications — a prospect that is costly and requires more manpower than is practical for many organizations. Cloudian offers both an object storage platform and more recently an enterprise file services product. When deployed together, Cloudian's products are designed to consolidate file and object data into a single repository and can enable organizations to manage environments that span the cloud as well as on-premises.
Tags : 
     Cloudian
By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
     Lenovo and Intel
By: Courion     Published Date: Nov 05, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : courion, access risk management, cloud based environment, mobile, data loss prevention, security, data management, data center
     Courion
By: McAfee EMEA     Published Date: Mar 14, 2018
Use of cloud computing services continues to grow rapidly as organizations migrate business applications and data to cloud-based software, platform and infrastructure services. Gartner estimates 2017 will see growth of 18% in spending on public cloud services and that cloud adoption will infuence more than 50% of IT spending through 2020. Deloitte Global predicts that by the end of 2022 more than half of all IT spending will go to IT-as-a-service providers. In the 2016 edition of this survey, 56% of the security professionals responding said limitations on access to collect incident response data and evidence for forensic analysis was a key challenge to securing the cloud. Sixty-two percent said they were concerned about unauthorized access by outsiders, and 59% said they worried about access by other cloud tenants. Of the 10% who reported being breached, half blamed stolen credentials or compromised accounts.
Tags : 
     McAfee EMEA
By: Datalink     Published Date: Jul 27, 2012
Running IT as a service (ITaaS) is not necessarily a new concept. But, the era of cloud computing now places a whole new spin on ITaaS. In this white paper, you'll learn why there is so much buzz around cloud services and the role IT should play in this new cloud-based era. You'll also learn a useful model to help transform your company's IT data center into a private cloud that can ultimately manage and oversee the delivery of both internal and external cloud services to the business.
Tags : datalink, cloud, buy, build, itaas, infrastructure, cloud computing, business technology
     Datalink
By: mindSHIFT Technologies     Published Date: Jul 01, 2014
In this whitepaper, you will learn how your company can benefit from cloud-based business continuity and the 10 steps it can take to execute an effective plan.
Tags : mindshift, cloud, cloud based business continuity plan, business continuity plan, data management, data protection, scalability, cloud architecture, cloud infrastructure, business technology
     mindSHIFT Technologies
By: MuleSoft     Published Date: Oct 13, 2015
Improving data management is critical for streamlining regulatory reporting, monetizing customer analytics, and democratizing data-driven decision-making. Financial firms must transform their data management approach to unlock data from its silos, incorporate unstructured information from non-traditional sources, and integrate information whether on-premises, in the cloud, batch-based, or real-time. As this evolution continues, technology leaders must consider integration holistically across the enterprise and create an agility layer that is key to future-proofing their data management architecture. Read this whitepaper to learn: -Data management challenges in financial services -Best practices to manage data in financial institutions -Integration strategies for optimal data management
Tags : back office systems, operational effectiveness, unlocking data, business imperatives, modernizing legacy systems, enterprise applications
     MuleSoft
By: Microsoft     Published Date: Jul 20, 2018
This guide presents a structured approach for designing cloud applications that are scalable, resilient, and highly available. The guidance in this ebook is intended to help your architectural decisions regardless of your cloud platform, though we will be using Azure so we can share the best practices that we have learned from many years of customer engagements. In the following chapters, we will guide you through a selection of important considerations and resources to help determine the best approach for your cloud application: 1. Choosing the right architecture style for your application based on the kind of solution you are building. 2. Choosing the most appropriate compute and data store technologies. 3. Incorporating the ten high-level design principles to ensure your application is scalable, resilient, and manageable. 4. Utilizing the five pillars of software quality to build a successful cloud application. 5. Applying design patterns specific to the problem you are trying to
Tags : 
     Microsoft
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com