Skip to main content
 

distributed environment

Results 1 - 25 of 69Sort Results By: Published Date | Title | Company Name
Published By: ASG Software Solutions     Published Date: Apr 30, 2008
In order to provide high quality, cost effective business services in complex, distributed environments, improved IT management strategies are required. Business Service Management (BSM) is a strategic approach to managing IT services in support of improved business performance.
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: Dome9     Published Date: Apr 25, 2018
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Dome9
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Processeur Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Intel® Xeon® Prozessor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside, intel core, intel inside, das intel inside-logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: Webroot     Published Date: Nov 02, 2012
This short paper looks at this situation and suggests how by replacing traditional AV with next generation cloud-based endpoint protection you will solve many of the issues surrounding your highly distributed mobile workforce.
Tags : 
mobility, endpoint security, it security, endpoint protection, mobile workforce, high mobility
    
Webroot
Published By: VMWare - vFabric     Published Date: May 10, 2012
Read this paper to learn how to enable a fast, scalable, fault-tolerant distributed foundation for data management that runs dynamically across many environments.
Tags : 
vfabric, data management, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware
    
VMWare - vFabric
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics, integrated mitigation
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
CA Technologies
Published By: IBM     Published Date: Jan 09, 2017
In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. This paper provides four key steps that can move you toward a more mature solution now.
Tags : 
ibm, security, services operations, iam programs
    
IBM
Published By: Genesys     Published Date: Dec 11, 2013
Read Now: The Automatic Call Distributor (ACD) is no longer a core component in the contact center and has become a costly technology that is difficult to manage in a distributed enterprise environment. If you are looking to move away from your legacy call center infrastructure — to a modern, multi-channel Contact Center this white paper gives you a blueprint to modernization and replacing your ACD. Read this insightful resource to learn how building a multi-channel contact center based on IP/SIP technology can enable you to: • Enhance Customer Experience • Virtualize your customer service environment • Reduce Total Cost of Ownership (TCO) Get this whitepaper for best practices, and integration guidelines to help you transition to a modern, SIP/IP-based contact center environment. Read Now.
Tags : 
automatic call distributor, acd, contact senter, legacy call center infrastructure, multi-channel contact center, ip/sip technology, total cost of ownership, tco, genesys
    
Genesys
Published By: Okta     Published Date: May 09, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
    
Okta
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations using machine data platforms like Splunk recognize the importance of consolidating disparate data types for top-down visibility, and to quickly respond to critical business needs. Machine data is often underused and undervalued, and is particularly useful when managing infrastructure data coming from AWS, sensors and server logs. Download “The Essential Guide to Infrastructure Machine Data” for: The benefits of machine data for network, remote, web, cloud and server monitoring IT infrastructure monitoring data sources to include in your machine data platform Machine data best practices
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Rackspace     Published Date: Jan 09, 2012
Distributed computing has been pervasive in IT organisations for nearly two decades, but the tables are beginning to turn. This whitepaper discusses Rackspace's experience in quick deployment and hosting of VDI environments.
Tags : 
rackspace, technology, virtual desktop, vdi, infrastructure, data center
    
Rackspace
Published By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. They are at the core of achieving critical business objectives that are relevant to every high-performing organization. As a result, there are few IT or security initiatives that demand as much deliberation and scrutiny.
Tags : 
identity management, access management, it environments, data security, business performance
    
IBM
Published By: Schneider Electric     Published Date: Jan 26, 2018
Part 2 in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." In our last webinar, we discussed how trends & technologies like IoT and its many applications have helped drive an Always On, Always Connected mentality that has completely evolved customer experience standards. These demands are driving a need for resiliency in local edge environments, meaning compute & storage capacity is now coming back on premise for many applications – especially in industries like Healthcare, Retail, Finance, and Education. In other words, this highly distributed access layer is now becoming a compute layer – one that is mission-critical to delivering a flawless (or at least acceptable) customer experience. These environments are often make-shift wiring closets (janitor’s closets, back rooms, etc.) with no dedicated IT staff per each location. More than ever before, Healthcare, Retail, Finance, and Education customers are turning to solution providers to be that “dedicated IT staff” to find and fix problems before they start, so that the customer (or patient, or student) experience they’re working to provide remains a good one. APC by Schneider Electric has: Connected Products making it easy to remotely monitor your customers’ environments Including our NEW Smart-UPS with APC SmartConnect – the industry’s first cloud-connected UPS! A Managed Service Program to help you develop & monetize power as a managed service Fill out your information and click "Register" to watch part 2 of our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Fix My Problem Before it Starts.” This webinar originally aired on October 19th, 2017.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 26, 2018
Part 3 in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." As distributed edge environments become more critical, physical security becomes more important. Nobody would leave their data center wide open for anyone to enter, but that’s exactly how many organizations treat their edge computing sites. Often, they consist of a rack or two of gear in a non-dedicated location, perhaps a janitor’s closet, with little to no physical security. Fill out your information and click "Register" to watch the third event in our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Protect me from Downtime!” This webinar originally aired on November 9th, 2017. In this webinar, we discuss physical security best practices, including environmental issues such as temperature and humidity monitoring. We also update partners on the physical security features of the latest APC racks and the NetBotz line of security and environmental appliances, cameras and sensors.
Tags : 
    
Schneider Electric
Published By: Kaseya     Published Date: May 13, 2015
Healthcare systems are inherently distributed across large campus environments, making regular IT systems management complex and time consuming. The risks of irregular maintenance and non-compliance of IT and security policies are not only measured in dollars lost but in lives saved.
Tags : 
business intelligence, enterprise content management, data warehousing, network infrastructure
    
Kaseya
Published By: Okta     Published Date: Jul 19, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Jamf     Published Date: Mar 29, 2018
With large quantities of student and faculty information on hand, complicated information systems and distributed environments spread across departments, higher education institutions are subject to breaches in the same fashion and with the same magnitude as large corporations. But fear not, we're here to help. This white paper provides you with the confidence and know-how to combat the threat of security breaches and avoid the associated costs on your budget and sanity. After reading, you'll be able to: • Identify common types of security breaches • Work with faculty and staff to better secure your environment • Prevent hacks and malicious software from reaching university systems
Tags : 
    
Jamf
Published By: Cohesity     Published Date: Apr 24, 2018
As organizational needs change and workloads become increasingly distributed, a key realization is emerging: traditional approaches to backup and recovery may no longer be sufficient for many organizations. These companies may have discovered that their existing tools are not keeping pace with other advancements in their computing environments, such as scale-out storage systems and hyperconverged systems, which seek to reduce data center complexity and help manage surging storage costs.
Tags : 
    
Cohesity
Published By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Forcepoint     Published Date: Aug 31, 2018
Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network efficiency.
Tags : 
    
Forcepoint
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.