cloud research

Results 101 - 125 of 169Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Apr 06, 2012
Download this white paper from Osterman Research and Proofpoint to learn how the protection of corporate data from sophisticated malware and phishing attacks is at top of mind of IT decision makers.
Tags : 
cloud-based security, advanced persistent threat, threat protection, cloud security, phishing, malware, anti-malware, security
    
Proofpoint
Published By: VMware     Published Date: Oct 04, 2011
Read this white paper to learn about the direct link between cloud computing and business agility.
Tags : 
vmware, aberdeen, cloud computing, business leaders, global research
    
VMware
Published By: Limelight Networks     Published Date: Mar 02, 2018
Can your business afford to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage. In some cases the costs are much higher. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry. It seems no one is immune. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questi
Tags : 
content delivery network, cdn, multi-cdn, multiple cdns, web performance, web acceleration, digital content delivery, mobile delivery
    
Limelight Networks
Published By: IBM     Published Date: May 22, 2013
Enterprise Management Associates (EMA) has conducted extensive research investigating the integration and management challenges created by the convergence of on-premise and public Cloud hosted applications. Research conducted in mid-2012 uncovered some compelling statistics about the role of Cloud integration in today's companies: Nearly 50% of the companies surveyed have already deployed tiered transactions spanning public Cloud and on-premise computing environments (one form of "hybrid Cloud") Approximately 35% have integrated (or are in the process of integrating) multiple Software as a Service (SaaS) applications. As one IT professional put it, "Everything is connected to everything." Because of this fact, any discussionof public Cloud as a standalone technology is outmoded. Few modern on-premise applications exist as"silos," and the same is true of Cloud-delivered applications.
Tags : 
ibm, cloud, cloud computing, integration, cast iron, ema, hosted, cloud hosting
    
IBM
Published By: Singlehop     Published Date: Oct 01, 2014
As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.
Tags : 
cloud security, infrastructure threats, security data, chp infrastructure
    
Singlehop
Published By: Equinix     Published Date: Mar 26, 2015
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-in—having only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability. The good news is that more solutions become available every day, but with a learning curve and numerous management challenges and considerations. This CITO Research paper provides advice for managers about how to c
Tags : 
hybrid cloud, computing infrastructure, enterprises, storage, application availability
    
Equinix
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Developing for and in the cloud has never been more dependent on data. Flexibility, performance, security—your applications need a database architecture that matches the innovation of your ideas. Industry analyst Ovum explored how Azure Cosmos DB is positioned to be the flagship database of internet-based products and services, and concluded that Azure Cosmos DB “is the first to open up [cloud] architecture to data that is not restricted by any specific schema, and it is among the most flexible when it comes to specifying consistency.” From security and fraud detection to consumer and industrial IoT, to personalized e-commerce and social and gaming networks, to smart utilities and advanced analytics, Azure Cosmos DB is how Microsoft is structuring the database for the age of cloud. Read the full report to learn how a globally distributed, multi-model data service can support your business objectives. Fill out the short form above to download the free research paper.
Tags : 
    
Microsoft Azure
Published By: NetApp     Published Date: May 29, 2015
Download this case study to discover how a private discovery cloud infrastructure enables students and faculty to focus solely on medical research with its on-demand, self-service capabilities. Find out how it is changing the way content is shared and stored within an organization.
Tags : 
netapp, cloud, cloud computing, cloud infrastructure, healthcare cloud
    
NetApp
Published By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Gartner, Inc. has positioned McAfee as a Leader in the Gartner Magic Quadrant for Intrusion Prevention Systems (IPS) for the tenth consecutive time. With the shift to cloud-based architectures, the role of IPS is changing. Get access to this valuable Gartner research, $1,995.00 USD value, compliments of McAfee.
Tags : 
gartner mq, gartner magic quadrant, intrusion prevention systems, vips, ips, magic quadrant ips
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
    
McAfee
Published By: Oracle     Published Date: Feb 10, 2016
There is little question that cloud is well established as a way to deliver business applications. Based on IDC research, over 70% of manufacturing companies are using hosted applications somewhere within their supply chain, with another 25% considering it. The most popular supply chain management (SCM) application areas are transportation related (transportation management, global trade management), where the "network effect" (i.e., carrier pooling, regulatory impact) can leverage both shared knowledge and existing connectivity along with sales and operations planning, demand signal management, and business intelligence/analytics. The concern that cloud is "risky" is increasingly taking a back seat to the perceived benefits of the technology. Indeed, those benefits, both achieved and anticipated, are significant, including cost, speed of implementation, and the ability to "consume" new capabilities and functionality easily and transparently.
Tags : 
oracle, supply chain cloud, supply chain best practices, idc research
    
Oracle
Published By: Qualys     Published Date: Nov 05, 2013
Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.
Tags : 
qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
    
Qualys
Published By: IBM     Published Date: Jan 10, 2014
Building an effective sales team starts with hiring the best talent and then making them productive as quickly as possible.
Tags : 
social collaboration, social networking, social business, communication, social media, mobile, bid data, cloud
    
IBM
Published By: Mimecast     Published Date: Mar 31, 2009
The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage, idc
    
Mimecast
Published By: Trend Micro, Inc.     Published Date: Nov 12, 2009
Securing the Physical, Virtual, Cloud Continuum Virtualization and cloud computing are radically altering data center operations. In this webinar, Ted Ritter, Senior Research Analyst at Nemertes Research, and Harish Agastya, Director of Product Marketing at Trend Micro, discuss the rise of virtualization and cloud computing and the impact this is having on security best practices and next-generation security technologies.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
Trend Micro, Inc.
Published By: DocuSign     Published Date: May 29, 2014
Enterprises need to produce results faster, and that means eliminating paper and transitioning to fully digital processes. Digital transactions have become the new currency. Cloud, mobile and digital technologies such as e-signatures automate analog processes. This research note introduces digital transaction management (DTM) as a new way to conduct business.
Tags : 
docusign, aragon, cloud, mobile, digital, e-signatures, digital transaction management, dtm
    
DocuSign
Published By: Cisco Systems     Published Date: Dec 23, 2013
Are you ready to leverage the flexibility and power of mobile and cloud computing? ZK Research outlines the limitations of legacy WANs and provides recommendations for transforming your network into a strategic asset. See why the Cisco ISR 4451-AX is your building block for evolving the WAN. Read Now
Tags : 
cisco, zk research, wan, virtualization, data center, wireless network, wide area network, network-centric
    
Cisco Systems
Published By: Oracle     Published Date: Apr 22, 2014
A paper providing expert insights into the challenges and opportunity that the cloud presents and help in determining which deployment option could provide the biggest benefits for your organization.
Tags : 
erp, cloud, oracle, idc, cloud research
    
Oracle
Published By: Dell Software     Published Date: Aug 07, 2014
Application and data integration doesn't have to be slow and expensive. Learn how cloud-based integration platforms dramatically speed results and lower costs in this white paper by Bloor Research.
Tags : 
data, data integration, cloud, cloud-based integration, enterprise, application
    
Dell Software
Published By: Adobe     Published Date: Apr 13, 2015
The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : 
adobe, document security, cloud services, it research, global insights
    
Adobe
Published By: Riverbed     Published Date: Jul 11, 2017
Four Stages to Successful Cloud Adoption Forrester Research predicts 81% of companies expect to leverage the cloud for business-critical applications and services in the next two years. If you’re planning to move applications to the cloud, watch this webinar to learn how Asurion, an insurance provider with 280 million customers worldwide, undertook their cloud migration.
Tags : 
cloud, adoption, application, migration, performance
    
Riverbed
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.