standard

Results 26 - 50 of 845Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Feb 23, 2016
WAN optimization increasingly resembles a mature market with increasing feature standardization. Vendor innovation is focused on supporting new application types and deployment options, with WAN optimization migrating toward more diverse platforms or to a WAN cloud.
Tags : wan architecture, business optimization, network development, network management
     Cisco
By: Financial Force     Published Date: Dec 01, 2017
Download this guide to review three major pain points that companies are facing as they prepare for the new revenue recognition standards-ASC 606 and IFRS 15- as they are fast approaching.
Tags : 
     Financial Force
By: HPE     Published Date: Feb 11, 2015
One of the top priorities for enterprises today is modernizing their data center to transform from the inefficiencies of siloed infrastructure to a modular, efficient, standards based infrastructure.
Tags : 
     HPE
By: HPE Service Virtualization     Published Date: Aug 18, 2016
When companies invest in a performance center of excellence, it can take up to three years before it starts paying dividends back. As a result, customers are happier, outages are a seemingly rare occurrence, and performance becomes prioritized as a standard policy for application development and deployment.
Tags : 
     HPE Service Virtualization
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
Nimble Storage: Redefining the standard for system availability - How Nimble Storage uses predictive analytics to achieve more than six nines availability across its entire installed base.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
6-Nines is a standard benefit of being our customer. That’s why this is a cost-nothing, do-nothing different guarantee. • Applicable on all models and configurations • Automatic on new arrays and on existing arrays with a support renewal • Guaranteed for as long as the product is supported HPE InfoSight monitors your uptime and if you experience less than 99.9999% availability, we’ll work with you to resolve the issue and provide support credit(s) at no cost
Tags : 
     Hewlett Packard Enterprise
By: CrowdStrike     Published Date: Aug 01, 2017
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology —what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution,it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn:?How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware?Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML ?How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-generation AV
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Oct 23, 2017
The endpoint security market continues to expand with vendors old and new marketing their solutions as “next generation” game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture. Navigating this crowded vendor landscape can be challenging — how does the buyer find the true next-generation protection today’s targeted, advanced threats demand? A new white paper, “The Five Essential Elements of Next -Generation Endpoint Protection,” offers guidance on how to see through the hype and understand the critical must-have elements that meet true next-generation criteria and set a new standard in EPP. Download the white paper to learn: Details on the five essential capabilities that define true next-generation EPP and why they are so important A matrix that evaluates and compares the potential impact of different solutions A list of top questions to ask ve
Tags : 
     CrowdStrike
By: Infosys     Published Date: May 30, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : internal, applications, data, hacks, privacy, enterprises
     Infosys
By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
     Dome9
By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
     Dome9
By: Eaton     Published Date: Jul 09, 2018
Our industry has made numerous technological advances designed to protect homeowners, businesses and electrical workers. That makes every fatal electrocution in the home all the more distressing. Between 2010 and 2013, the U.S. saw an estimated average of 48 electrocution fatalities associated with consumer products per year, with large and small electric appliances chief among them1. Tragedies like these can be avoided, especially when the ground fault circuit interrupter (GFCI) technologies needed to prevent dangerous events are readily available. As the principle NEMA representative at the National Electrical Code (NEC) Code-Making Panel Two, I saw public input asking for increased GFCI protection for the home during the 2017 code cycle. The code panel expanded the GFCI requirement for facilities other than dwelling units as part of section NEC 210.8(B). However, residential standards improvements were sidelined.
Tags : 
     Eaton
By: Preempt     Published Date: Nov 02, 2018
Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover: - An analysis of recent malware and attacks and the tools they used to spread through the network. - A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them. - Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network. - How to gain visibility into PsExec, WMI, and RPC in general and how to create controls t
Tags : 
     Preempt
By: Automation Anywhere     Published Date: Feb 21, 2019
Robotic Process Automation was born with the vision of empowering business users to create software bots that could interact with enterprise systems just like humans. Its benefits include substantial time and cost savings, improved customer satisfaction, increased workforce morale, and the ability to build a competitive advantage over competitors. But to fully realize all these benefits, it’s important for businesses to select a solution with a robust RPA security architecture that supports core principles, such as least privileges and separation of duties while delivering end-to-end protection for the critical apps and sensitive data involved. This paper provides an overview of the industry’s highest standard for enterprise-grade security as demonstrated by the market’s leading Digital Workforce platform, Automation Anywhere Enterprise.
Tags : 
     Automation Anywhere
By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
     Delphix
By: Akamai Technologies     Published Date: Aug 17, 2017
Das Mirai-Botnet nutzt Hunderttausende von internetfähigen Geräten, die nur über ein schwaches standardmäßiges Kennwort verfügen. Durch Installation von Malware übernimmt Mirai die Kontrolle über die Geräte und errichtet auf diese Weise eine weltumspannende Armee von infizierten Bots. Bis zum Zeitpunkt der Attacke durchsucht jedes betroffene Gerät das Internet nach weiteren angreifbaren Geräten und infiziert diese. Das Internet der Dinge besteht aus Milliarden von Geräten, die Daten senden und empfangen können und heutzutage fast überall anzutreffen sind. Private Sicherheits- und Unterhaltungsgeräte wie Internetkameras, digitale Videorecorder (DVR) und Router werden häufig mit der Mirai-Malware infiziert.
Tags : 
     Akamai Technologies
By: Dell     Published Date: Feb 04, 2015
More than 23 million servers in the world are still running on the Microsoft Windows Server 2003 operating system, making it the most popular engine for serving information and applications globally for over a decade. But, starting in July 2015, Microsoft will no longer provide basic support for it.
Tags : dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
     Dell
By: Dell     Published Date: Feb 04, 2015
Migrating your enterprise to a modern Microsoft® Windows® operating system is a complex process that can strain IT resources. That’s why Dell is focused on helping customers meet the deadline of the decade: On 14 July 2015 support for Windows 2003 will cease. The strategic value to efficient Windows migration is application, hardware and deployment readiness.
Tags : dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
     Dell
By: Dell     Published Date: Feb 04, 2015
Technology is moving fast and your data center needs to keep up so your business can thrive. Migrating to the latest platforms and solutions, such as Windows® Server® 2012 R2, lets you take advantage of its virtualization advancements and tap into the Microsoft cloud OS. Combined with unique innovations featured in Dell server, storage and networking solutions, you can do more than modernize your IT — you can transform it.
Tags : dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
     Dell
By: Dell     Published Date: Feb 04, 2015
In the last few years there have been radical changes in the ways organizations operate and people work. Explosion of data, increased mobile demands, and the globalization of business in general are making 24/7 access to people and information the norm. Sophisticated cyber attacks are requiring robust systems security designed to counter new threats. And velocity is now essential when delivering new IT services.
Tags : dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
     Dell
By: Dell     Published Date: Feb 04, 2015
With support for Windows Server 2003 ending, transitioning to Server 2012 is clearly a must for companies. While migration will be an adjustment for organizations relying on niche applications that are 10 years old, the costs of not upgrading to Server 2012 could prove fatal.
Tags : dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, cloud, platforms, future, mobility, standardization, byod, virtualization
     Dell
By: Dell     Published Date: Feb 04, 2015
This IDC white paper considers the approaching end of extended support for Windows Server 2003 and explores Windows Server migration options, hardware/software replacements, and support services to help customers tackle a modernization effort. It also evaluates the benefits that customers can enjoy, thanks to a move off of Windows Server 2003 prior to the conclusion of extended support.
Tags : dell, windows, microsoft, modernization, risk, management, modernization, idc, server, 2003, support, services, efficiency, cost, cloud, platforms, future, mobility, standardization, byod
     Dell
By: SAS     Published Date: Apr 16, 2015
As big data shifts away from a more theoretical concept (only adopted by those on the leading edge), the fun can really begin. How do you prepare for more information than you’ve ever collected before? How can you manage this information with the same standards you applied in the past? These are questions that are causing both IT and business sides to start actively preparing for – and implementing – big data.
Tags : 
     SAS
By: HPE     Published Date: Mar 23, 2015
This Porter Consulting report analyzes enterprise campus networking solutions from Aruba Networks, Cisco, HP and Ruckus Wireless. The paper examines key business and technology trends affecting enterprises with 500-5000 employees. We identify fundamental requirements IT decision makers should consider when evaluating campus networking solutions including: • Ensuring simple, secure and cost-effective user access • Supplying adequate bandwidth and quality of service • Streamlining deployment and operations • Supporting emerging standards and technology requirements Our goal is to provide business and technical decision makers with a guide to the key players and their strengths.
Tags : 
     HPE
By: Entrust Datacard     Published Date: Nov 29, 2016
Extended Validation (EV) certificates were launched in January 2007. EV certificates are an effort to define a standard for a high assurance SSL/TLS certificate and create a new trust foundation. The EV Guidelines are managed by the leading browsers and certification authorities (CAs) through the CA/Browser Forum, and have been since launch.
Tags : extended validation certificates, ssl, security, ssl certificate, ev certificate, ev guidelines
     Entrust Datacard
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com