it infrastructure

Results 26 - 50 of 3027Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : security, application security, access control, security policies
     Cisco
By: ServiceNow     Published Date: Oct 06, 2015
IT service support management tools are vital for infrastructure and operations organizations to manage support and delivery of IT services. This Magic Quadrant research profiles key vendors of enterprise ITSSM tools to help I&O leaders make better selections.
Tags : 
     ServiceNow
By: ServiceNow     Published Date: Oct 06, 2015
Les outils de gestion du support des services informatiques (ITSSM) sont essentiels pour les organisations Infrastructure et Opérations (I&O) afin de gérer la prise en charge et la prestation des services informatiques. Cette étude Magic Quadrant dresse le profil des principaux fournisseurs d'outils ITSSM afin d'aider les responsables I&O à faire des choix pertinents.
Tags : 
     ServiceNow
By: Simplivity     Published Date: Jul 02, 2015
ActualTech Media and SimpliVity have partnered to create a new report that presents data from surveyed IT professionals and their experiences with hyperconverged infrastructure. The report defines Hyperconvergence and outlines the future of the industry.
Tags : hyperconvergence, robo, market report, storage, disaster recovery, operational efficiency, high it costs, data protection, data management, wan optimization, virtualization, application delivery, application performance
     Simplivity
By: IBM MaaS360     Published Date: Jul 01, 2016
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives.
Tags : ibm, gartner, mobile, enterprise mobility, enterprise mobility management suites, wireless, enterprise applications
     IBM MaaS360
By: IBM     Published Date: Apr 20, 2017
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives. UEM is not limited to PCs, tablets and smartphones. Smart devices, broadly grouped as part of the IoT, will increasingly become included in UEM. Devices such as Apple TVs, printers and smartwatches are identifiable examples of IoT devices managed by EMM tools. However, not all IoT objects will fall under the realm of EMM tools. Some devices may be managed directly by manufacturers. Other types of devices will have proprietary management tools. And many devices will not need to be managed at all. However, it is clear that the diversity and number of devices will continue to grow, and IT organizations must be ready.
Tags : auditing, enterprise data protection, mobile device management, mobile application management, mobile identity, policy enforcement, content optimization
     IBM
By: Secureworks     Published Date: Oct 04, 2017
Secureworks has been tracking cybercrime activity for more than 10 years and, as we monitor this activity to protect our clients, we collect a large amount of data on both the criminals and their infrastructure and systems. This annual report presents an overview of the cybercrime landscape and trends we observed primarily from the period of mid-2016 to May 2017, in addition to a handful of other trends ranging from 2015 to 2016.
Tags : 
     Secureworks
By: Google Apigee     Published Date: Jun 08, 2018
A must-read for IT professionals that provides a comprehensive analysis of the API management marketplace and evaluates 22 vendors across 15 essential criteria. APIs are the de-facto standard for building and connecting modern applications. But securely delivering, managing and analyzing APIs, data and services, both inside and outside an organization, is complex. And it’s getting even more challenging as enterprise IT environments grow dependent on combinations of public, private and hybrid cloud infrastructures. Choosing the right APIs can be critical to a platform’s success. Likewise, full lifecycle API management can be a key ingredient in running a successful API-based program. Tools like Gartner’s Magic Quadrant for Full Life Cycle API Management help enterprises evaluate these platforms so they can find the right one to fit their strategy and planning. Apigee is pleased to offer you a complimentary copy of the Gartner report. Access in-depth evaluations of API managemen
Tags : 
     Google Apigee
By: Genesys     Published Date: Jul 13, 2018
With artificial intelligence (AI) gaining ground, the right contact center infrastructure (CCI) can be the critical business differentiator for long-term flexibility and scalability. Gartner Research looked at three use cases to evaluate CCI vendors, and Genesys received the highest use case scores (4.16 out of 5) for Customer Engagement Center in Gartner Critical Capabilities.
Tags : gartner, contact center, artificial intelligence, infrastructure, crm system
     Genesys
By: Genesys     Published Date: Aug 07, 2018
Our deep integration with CRM systems and support for digital channels enables a single view of the customer that is essential for an organization’s success.
Tags : gartner, contact center, artificial intelligence, infrastructure, crm system
     Genesys
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
     Group M_IBM Q2'19
By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
     Fortinet EMEA
By: Avi Networks     Published Date: Mar 06, 2019
Modern application architectures such as microservices are changing the way that modern enterprises run their infrastructure. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. And now with the emergence of containerized applications, it is critical to re-evaluate how application services are provided across data centers and multiple cloud environments.
Tags : 
     Avi Networks
By: Blue Medora     Published Date: Oct 24, 2016
a recent Forrester Consulting research report shows that tools creep and lack of visibility are big problem areas for companies. Additionally, the research showed that only 24 percent of companies could provision infrastructure in a matter of hours instead of days or weeks.
Tags : it operations, blue medora, visibility, cloud management, open-source databases, infrastructure provisioning
     Blue Medora
By: Digital Realty     Published Date: Jan 23, 2019
Download the new white paper from Digital Realty that explores how to improve cloud performance through a multi-cloud platform, centralized governance, and on-demand networking.
Tags : digital realty, cloud, cloud computing, governance, cloud infrastructure, cloud performance
     Digital Realty
By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
     Box
By: Viavi Solutions     Published Date: Sep 30, 2015
Each enterprise has its own reasons for moving to virtual infrastructure, but the common benefit is better and more efficient server utilization. Ensure comprehensive visibility with three practical steps highlighted in this white paper.
Tags : server virtualization visibility, virtual infrastructure, server utilization, virtualization, viavi, networking
     Viavi Solutions
By: Viavi Solutions     Published Date: Sep 30, 2015
Each enterprise has its own reasons for moving to virtual infrastructure, but the common benefit is better and more efficient server utilization. Ensure comprehensive visibility with three practical steps highlighted in this white paper.
Tags : server virtualization visibility, virtual infrastructure, server utilization, virtualization, viavi, networking
     Viavi Solutions
By: Onvia     Published Date: Feb 10, 2015
Onvia’s 3 Trends Shaping State & Local Contracting Growth in 2015 reflects on important trends that are expected to shape government contracting this year. Highlights from the report: Onvia’s 3 Trends Shaping State & Local Contracting Growth in 2015 reflects on important trends that will shape government contracting over the coming year. Highlights from the report: • 2014 Review: A “slowing trend” in competitive opportunities, due to macro political-economic factors, with context for expected changes in 2015. • 2015 Trend 1: Potential for stronger growth driven by an expected rebound in government tax revenue and greater bond income for large debt-financed infrastructure projects. • 2015 Trend 2: Technology contracting volume gains traction in non-IT industry sectors, with insight into five niche technologies shaping 2015 procurement. • 2015 Trend 3: Cooperative purchasing influences the overall state and local agency market, with implications for both local and national competitors.
Tags : government procurement, government contracts, state contracts, local contracts, government opportunities, public sector contracts, cooperative purchasing, government it, government marketing, government business intelligence, local contracting, state contracting, government bids, government rfps, sled contracts, term contracts, vendor intelligence, government agency intelligence, competitive intelligence, state and local contracts
     Onvia
By: Heroix     Published Date: Oct 15, 2012
Download this whitepaper to look at three ways IT performance monitoring can help meet multiple goals, to save corporate dollars and improve the company's performance.
Tags : it performance, it infrastructure, it resources, business technology
     Heroix
By: HP     Published Date: Nov 14, 2011
Read this whitepaper to learn 3 simple steps SMBs can take to heighten business performance and increase brand office productivity.
Tags : branch office, performance, productivity, customer, service centers, infrastructure
     HP
By: IBM     Published Date: Jul 20, 2016
New research from IBM found that one-third of employees surveyed at Fortune 1000 companies are sharing and uploading corporate data on third-party cloud apps. Why? They’re tired of workplace apps that don’t perform like their personal apps: intuitively, on the go, and with some intelligence. Saying “yes” might feel good to your teams, but it can also turn your infrastructure into a Beast. You don’t know all the different apps being used, like file sharing or online meetings. Or how much they cost. Or if your content is safe and manageable. Can you give your teams what they want without getting trampled by the Beast? Yes you can. You can transform the Beast into a Beauty. But you need to consider three critical ways to make that happen.
Tags : ibm, enterprise social solutions, enterprise solutions, business operations, business technology, third-party cloud apps, workplace apps, enterprise applications
     IBM
By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
     Cisco Umbrella EMEA
By: HP Inc.     Published Date: Dec 06, 2017
3D printing taking steps to make impact in the marketplace. McKinsey & Company predicted the impact of 3D printing and direct product manufacturing could hit $500 billion annually 2025. But first, as John Hauer writes, the infrastructure for 3D printing – such as software, color capabilities, and affordable printing materials – needs to keep advancing.
Tags : printing, industry, manufacturing, marketplace, color capabilities, software
     HP Inc.
By: HP Inc.     Published Date: Jun 13, 2018
McKinsey & Company predicted the impact of 3D printing and direct product manufacturing could hit $500 billion annually 2025. But first, as John Hauer writes, the infrastructure for 3D printing – such as software, color capabilities, and affordable printing materials – needs to keep advancing. Check it out
Tags : 
     HP Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com