Skip to main content
 

sans

Results 126 - 137 of 137Sort Results By: Published Date | Title | Company Name
Published By: VMware Dell     Published Date: Sep 30, 2008
This white paper describes a virtualized infrastructure that applies storage and server virtualization technologies to cost-effectively achieve a flexible, high performance, dynamic IT infrastructure that is simple to manage and scale.
Tags : 
vmware, dell, virtual server, virtual storage, equallogic, iscsi san, esx server, internet engineering task force (ietf)
    
VMware Dell
Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory
    
LogRhythm
Published By: Dell Storage     Published Date: Apr 21, 2011
Enterprise Manager provides a single storage resource management (SRM) interface for one or more Compellent SANs. The software also integrates with VMware vCenter to enhance server and storage visibility and manageability. This demo video shows how to use Enterprise Manager to collect VM host and guest storage statistics from vCenter, create, map and rescan storage volumes, and then format the volumes with VMFS to create datastores or assign the volumes as RDMs to a virtual machine. (3 min)
Tags : 
dell compellent, vcenter integration, compellent enterprise manager, storage resource management, srm, vmware vcenter, server, storage, virtual machine
    
Dell Storage
Published By: DataCore Software     Published Date: Jun 20, 2011
This ESG Lab Validation documents the results of hands on testing of DataCore SANsymphony-V R8 Storage Virtualization Software.
Tags : 
storage virtualization, sansymphony-v, datacore software, virtual desktop, thin provisioning
    
DataCore Software
Published By: Symantec     Published Date: Oct 02, 2012
Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names
Tags : 
exchange 2010, ssl certificates, ssl, exchange implementation, sans, security
    
Symantec
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: Norse     Published Date: Mar 10, 2014
Learn about how the internet has changed over the past year and see how these major changes have affected security protocols and how your organization should respond to keep current in a world that is run by the Internet.
Tags : 
norse, sans, internet of things, cybersecurity, nstac, industrial internet, cyber-physical systems, emerging technologies, survey, malware
    
Norse
Published By: Veracode     Published Date: Oct 26, 2016
Web application attacks are now the most frequent pattern in confirmed breaches, and organizations know that application security is key to protecting their data. But many organizations lack the resources to develop a comprehensive AppSec program, and need to look to external services. Download this guide for a straightforward, four-step method for acquiring the services you need to support a comprehensive AppSec program.
Tags : 
veracode, application security, sans, security
    
Veracode
Published By: Datastax     Published Date: Aug 07, 2018
A DBA’s life is full of surprises – some more pleasant than others. As a DBA you’re pretty much “on it” 24-7-365: putting out fires, checking alerts, training people, keeping test databases in sync with production, debugging, and praying your developers are writing halfway decent code. If you’re swinging over to the NoSQL side (the “dark” side?), or considering it, then you’ll want to read this white paper, The DBA’s Guide to NoSQL. It’s essentially a NoSQL bible, sans orders from God -- or Darth Vader.
Tags : 
    
Datastax
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Avec la prolifération des applications SaaS et des appareils mobiles, la sécurité réseau n’a jamais été aussi complexe. Vos employés et vos partenaires disposent désormais d’un niveau d’accès sans précédent à votre organisation, souvent hors des limites physiques de l’entreprise. En d’autres termes, votre sécurité basée sur le périmètre ne suffit plus : les identités sont devenues le nouveau périmètre.
Tags : 
    
CA Technologies EMEA
Published By: Oracle     Published Date: Feb 16, 2018
Les avancées du numérique révolutionnent la manière dont nous travaillons, en apportant des innovations de façon permanente dans notre quotidien de travail. Ces technologies très prisées ont renforcé les attentes, obligeant les organisations à développer l'agilité métier à des niveaux sans précédent. Même si les opportunités annoncées sont prometteuses, nous sommes confrontés à de nouveaux freins qui peuvent faire obstacle à la réussite, comme la nécessité d'innover rapidement, de minimiser les coûts et de répondre rapidement aux pressions exercées par la concurrence.
Tags : 
guide, pour, approche, integree, enjeux, oracle
    
Oracle
Published By: Workday France     Published Date: Mar 08, 2018
Nous connaissons actuellement une révolution technologique sans précédent. Entre les appareils mobiles avec écrans tactiles interactifs, la 3D au cinéma et à la télévision, et la possibilité d’accéder à Internet presque n’importe où dans le monde, la technologie semble apporter de nouvelles solutions à presque tout. in•no•ver (verbe) : introduire une nouveauté (méthodes, idées ou produits) au sein de quelque chose d’établi. Pourtant, cette innovation semble avoir du mal à imprégner le monde des logiciels de gestion d'entreprise. Alors que le grand public utilise de plus en plus Internet pour trouver des informations et que les appareils sont de plus en plus simples à utiliser, les dirigeants ont toujours du mal à obtenir des informations précises et mises à jour sur la situation financière de leur société, même si toutes les données dont ils ont besoin sont disponibles dans leurs systèmes.
Tags : 
    
Workday France
Start   Previous    1 2 3 4 5 6     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.