Skip to main content
 

critical infrastructure

Results 1 - 25 of 181Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : 
security, enterprise network, firewall, cisco, gartner, magic quadrant
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
The bar for success is rising in higher education.  University leaders and IT administrators are aware of the compelling benefits of digital transformation overall—and artificial intelligence (AI) in particular. AI can amplify human capabilities by using machine learning, or deep learning, to convert the fast-growing and plentiful sources of data about all aspects of a university into actionable insights that drive better decisions. But when planning a transformational strategy, these leaders must prioritize operational continuity. It’s critical to protect the everyday activities of learning, research, and administration that rely on the IT infrastructure to consistently deliver data to its applications.
Tags : 
    
Hewlett Packard Enterprise
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
FRONTEO provides end-to-end project management, litigation consulting and eDiscovery solutions for a global base of law firms and corporations. To meet clients’ critical information needs, the business requires connectivity and data center solutions that can process, access and interpret terabytes of sensitive data—reliably and at top speeds. Get actionable insights from experts at FRONTEO and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
To support business continuity, many organizations eagerly avoid putting all their eggs in one basket. Understanding the critical role of last-mile connectivity and always-available Internet access, savvy firms utilize redundant wide area network (WAN) and Internet connections from multiple service providers to ensure network availability in addition to load balancing. Despite the good intentions, their Internet connectivity risks may still be in a single basket. That is because internet service providers (ISPs) and competitive local exchange carriers (CLECs) may operate using leased network infrastructure from the same incumbent local exchange carrier (ILEC).
Tags : 
    
Spectrum Enterprise
Published By: TriNet     Published Date: Mar 13, 2013
Establishing a startup’s business infrastructure early — that is, establishing support in the areas of legal, accounting, tax, insurance, and human resources (HR) — provides a number of critical benefits for any entrepreneur to consider. This paper discusses suggestions for management teams that will facilitate establishment of an appropriate infrastructure.
Tags : 
    
TriNet
Published By: Apstra     Published Date: Feb 21, 2019
IT organizations are facing new challenges as a result of digital transformation, widespread cloud and SaaS adoption, mobile proliferation and pervasive IoT deployments. They must build and operate their internal data centers to deliver high availability for mission critical applications, rapidly onboard new applications and scale capacity on demand – all within the mandate to be cost competitive with infrastructure as a service providers (IaaS) like AWS and Azure. They are architecting and building new Intent-Based Data Centers to deliver private cloud services to their internal and external customers.
Tags : 
saas, data center automation
    
Apstra
Published By: Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
Cylance
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate owned laptops accessing the internet from other networks. More cloud apps, mean that users don’t need to be on the corporate network to get work done. And more branch offices connecting directly to the internet.
Tags : 
visibility, protection, deployment, management, platform, integration, cloud, infrastructure
    
Cisco EMEA
Published By: HPE Intel     Published Date: Mar 15, 2016
As more enterprises adopt technologies such as cloud, mobile, and analytics to help achieve strategic competitive advantage, CIOs and IT managers must support business-critical processes at a very high level across the enterprise. At the same time, IT organizations must manage complex hybrid IT infrastructures that include both cloud and on-premises technologies from multiple vendors and support providers. IDC believes that to tackle these challenges, IT organizations should look to support providers for comprehensive offerings to help optimize IT operations and improve the efficiency of IT service delivery. In addition, IDC recommends that IT organizations looking to manage rapid change in today’s IT landscape consider support providers with a record of innovative support services and a focus on advanced technology in support delivery.
Tags : 
    
HPE Intel
Published By: HPE     Published Date: Feb 11, 2015
It’s essential to align critical applications and infrastructure with your overall modernization program to address risk, optimize benefits, and prioritize your business needs.
Tags : 
    
HPE
Published By: HPE     Published Date: Feb 11, 2015
Applications modernization has become imperative as the maintenance of “mature” applications consumes a disproportionate share of resources. HP aligns critical applications and infrastructure with your overall modernization program.
Tags : 
    
HPE
Published By: Oracle CX     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
    
Oracle CX
Published By: Dell EMC     Published Date: Nov 02, 2015
Today’s IT environment is more complex than ever. The applications that have become critical to business operations require greater processing power, memory, and storage. This guide prepares decision-makers to choose servers that meet their current needs, while building a flexible, reliable, scalable infrastructure to handle future requirements.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
As organizations continue to virtualize their infrastructures to gain higher levels of operational efficiency, VM sprawl and resource utilization are two key factors that can quickly create havoc for IT admins. In resource-siloed infrastructures, where multiple administrators are in charge of different pieces of the infrastructure, complexity continues to grow as mission-critical data sets and organizations grow. This is especially true in dynamic, mission-critical environments, where one wrong move or lack thereof could significantly impact an application, the end-user experience, or worst case, company revenue. The impact of hyper-converged infrastructures on IT has been profound. In fact, 85% of respondents to a recent ESG survey already use or plan to use a hyper-converged solution in the coming months. Though that number appears high, it is not all that surprising. ESG also asked organizations to identify which factors drove them to deploy or considering deploying a hyper-conv
Tags : 
ubuntu, performance, windows, hyper-convergence
    
Dell EMC
Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
    
HPE
Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
    
HPE
Published By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
Published By: Emerson Network Power     Published Date: Feb 07, 2011
In this whitepaper, we will explain trends that drive management challenges that data center operators are faced with. We will then show you the value proposition of Emerson's solutions, which can help you to: . Adapt data center infrastructure without increased cost; . Improving efficiency without added risk; . Maximize existing infrastructure investments; . Ensure availability of mission-critical services; and . Extend the life of existing infrastructure. Read on for more.
Tags : 
emerson, data center, automation, infrastructure, virtualization, cloud computing, cloud
    
Emerson Network Power
Published By: Emerson Network Power     Published Date: Aug 19, 2010
While both IT and facilities organizations have invested heavily in technology resources (people, processes and tools) to manage the data center infrastructure, they have failed to achieve the promise and potential due to critical gaps between their data center facilities and IT infrastructure components. A new perspective on managing the critical infrastructure gaps is emerging. Read on for more.
Tags : 
emerson, data center, automation, infrastructure, virtualization, cloud computing, cloud
    
Emerson Network Power
Published By: Emerson Network Power     Published Date: Mar 02, 2011
A new perspective on managing the critical infrastructure gaps is emerging. Read on for more.
Tags : 
emerson network power, avocent, data center, infrastructure management
    
Emerson Network Power
Published By: Red Hat     Published Date: Jan 01, 2013
IDC profiles a range of customers successfully employing Red Hat Enterprise Linux for a full spectrum of workload types, including high-end applications previously hosted on non-x86 servers.
Tags : 
linux, business-critical workloads, workload data, ecosystem, application software, development, deployment software, infrastructure software
    
Red Hat
Published By: Entrust Datacard     Published Date: May 10, 2017
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively.
Tags : 
certificate management, digital business, pki, datacard, certificate management
    
Entrust Datacard
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
The need to bridge the gap between traditional IT services and cloud application delivery is vital.   This HPE Pointnext blueprint guide examines the critical global business services and IT technology best practices for enabling cloud-native applications—from DevOps practices to underlying infrastructure. The blueprint helps IT teams accelerate the development and delivery of cloud-native applications.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Learn why many organizations are leveraging forward-looking best practices from the experts at HPE Pointnext to help them transition to an ITaaS structure. This guide examines the critical business and technology practices enabling ITaaS, from using flexible IT partner resources, ITIL features, operations service practices, to funding infrastructure as a service.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.