Skip to main content
 

cloud data

Results 1426 - 1450 of 1565Sort Results By: Published Date | Title | Company Name
Published By: Okta     Published Date: Jun 15, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
office 365, identity and mobility management, deployment, user adoption, adoption guide
    
Okta
Published By: Okta     Published Date: Jul 01, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
    
Okta
Published By: NovaStor     Published Date: Nov 08, 2010
New Business Opportunities for IT Resellers, Solution Providers and System Integrators
Tags : 
backup, backup service, managed services, msp, cloud backup, data protection, managed backup
    
NovaStor
Published By: The Bunker     Published Date: Nov 30, 2010
What questions should an organization ask about security and availability when contemplating a cloud computing model
Tags : 
cloud, security, data centre, sla, continuity, disaster recovery
    
The Bunker
Published By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
As enterprises focus on consolidation of data centers, they continue to expand the roles and numbers of branch offices, often in locations that are difficult to support and protect. Learn to extend the virtual edge of the data center to branch offices, enabling complete consolidation of servers and data, improving security, and providing LAN performance at the edge via the WAN.
Tags : 
wan, cloud based computing, optimization, performance, data center, data consolidation, servers, disaster recovery, risk
    
Riverbed Technology, Inc.
Published By: HP and Intel® Xeon® processors     Published Date: Nov 21, 2011
This white paper separates fact from fiction, reality from myth, and, in doing so, will aide senior IT executives as they make decisions around cloud computing.
Tags : 
cloud, cloud computing, myths, infrastructure, services, it executives, data, intel, hybrid cloud
    
HP and Intel® Xeon® processors
Published By: NovaStor     Published Date: Apr 07, 2011
White paper discusses meeting the challenges of remote data protection in the private cloud and includes requirements and best practices
Tags : 
private cloud backup, private cloud data management
    
NovaStor
Published By: nick.morgan     Published Date: Apr 13, 2011
Reducing the security risks organisations are facing by shifting IT operation to the cloud.
Tags : 
cloud environments, virtual environments, security implications, business benefits, virtual machines, organisations, information, data loss, data interception
    
nick.morgan
Published By: NovaStor     Published Date: Apr 27, 2011
Meeting the Challenges of Remote Data Protection
Tags : 
backup, backup software, private cloud backup, cloud backup, private cloud, data protection
    
NovaStor
Published By: Internap     Published Date: Jul 15, 2011
Download this report and learn key questions and answers companies should know before deploying a private cloud and how Internap can deliver value at every stage of your IT organization's evolution toward the cloud.
Tags : 
cloud, internap, private cloud, managed hosting, colocation, data center, cdn, internap, ecommerce, data center, internap, data center services, cdn, internet connectivity
    
Internap
Published By: Citrix Systems     Published Date: Sep 08, 2011
Build a Cloud computing infrastructure with maximum availability, performance and security. Free guide shows you how -- compliments of Citrix.
Tags : 
citrix, cloud computing, netscaler, scale app delivery, load balancing technology, sla, load balancer, application delivery, data center infrastructure, ssl, adc, application delivery controller
    
Citrix Systems
Published By: Citrix Systems     Published Date: Sep 08, 2011
Free guide to show you how to reduce infrastructure costs and total cost of ownership (TCO) while increasing security, user productivity and business agility.
Tags : 
citrix, netscaler, it goals, infastructure, tco, total cost of ownership, virtualization, cloud computing, load balancer, application delivery, data center infrastructure, ssl, adc, application delivery controller
    
Citrix Systems
Published By: HP & Intel     Published Date: Oct 04, 2011
Read this Cloud Security Planning Guide to make sure your cloud computing initiatives avoid these dangerous - and costly - pitfalls.
Tags : 
    
HP & Intel
Published By: Dell Storage     Published Date: Nov 02, 2011
Private cloud computing advances the delivery of efficient, agile IT infrastructure allowing enterprises to plan incremental enhancements to existing infrastructure, and the right SAN.
Tags : 
technology, dell, san foundation, cloud deployment, data center, data management
    
Dell Storage
Published By: IBM     Published Date: Jan 23, 2013
The paper examines key factors you should consider when planning for the transition to cloud-based business resilience and in selecting your cloud partner.
Tags : 
disaster recovery, cloud computing, cloud, virtualization, data protection, business continuity
    
IBM
Published By: Equinix     Published Date: Jul 31, 2012
This GigaOM Pro paper reviews the metrics and the technologies you should consider when migrating to the private cloud. Get your complimentary 10-page report now.
Tags : 
public, cloud, private, technologies, technology, public, equinix, gigaom, pro, zynga, cdn, applications, software, network, limelight, iaas, paas, saas, data, center
    
Equinix
Published By: Workday     Published Date: Mar 02, 2018
Many CIOs are wary of moving data out of on-premise systems and into the cloud. But the cloud is the best choice for agility, flexibility, and data security. Read this report from CIO.com to learn about the benefits your business could experience by moving to the cloud.
Tags : 
    
Workday
Published By: Mimecast     Published Date: Oct 17, 2013
"Storage Anywhere & Everywhere" is a new study by Free Form Dynamics sponsored by Mimecast. It includes lessons from expert or 'elite' organizations on how to get control of your data and make it work to your advantage.
Tags : 
mimecast, free form dynamics, inforgraphic, defragmentation, liberating data, controlling data, elite organizations, measure roi, understanding data, establish policies, protect your data, streamline routine, cloud services, hosted services, control corporate data
    
Mimecast
Published By: CDW     Published Date: Sep 10, 2014
Enterprise-critical applications—those which drive the core of an organization—require the highest availability infrastructure to support the most stringent service levels. EMC meets this need with a high performing, functionally capable, and competitively priced high-end networked storage system—the EMC® Symmetrix® VMAX® 20K system with the Enginuity™ operating environment. The VMAX 20K scale-out architecture helps organizations exceed the performance and capacity demands of hyper-consolidation, cloud deployments, and all-virtual Software Defined Data Centers (SDDCs), while simplifying the costs of data management.
Tags : 
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, man investments, asset, softcat
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets
    
CDW
Published By: Kaseya     Published Date: Jul 24, 2013
BYOD, cloud computing, MAC adoption and social networking security will dominate IT organizations this year.
Tags : 
kaseya, byod, cloud computing, mac adoption, social networking, data, it solutions, it concepts
    
Kaseya
Published By: NETIQ     Published Date: Mar 12, 2013
NetIQ’s Identity, Access and Security Management solutions integrate seamlessly to help you control access to cloud services and data, reduce your risk of data breaches in mixed environments.
Tags : 
security and compliance in the cloud
    
NETIQ
Start   Previous    49 50 51 52 53 54 55 56 57 58 59 60 61 62 63    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.