configurations

Results 76 - 100 of 126Sort Results By: Published Date | Title | Company Name
Published By: ThousandEyes     Published Date: Nov 17, 2016
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings. Watch this video short now!
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Mar 14, 2017
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings.
Tags : 
    
ThousandEyes
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
    
Qualys
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities
    
Qualys
Published By: Lumension     Published Date: Oct 20, 2014
Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
Lumension
Published By: Lumension     Published Date: Oct 20, 2014
Sit in on an expert panel discussion about the concerns of cyber security for businesses.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
Lumension
Published By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
    
AWS
Published By: IBM Corporation     Published Date: Sep 20, 2010
IBM Software Group performed a study that compared the performance of several WebSphere deployment configurations on Intel hypervisor environments.
Tags : 
ibm caching and cloud, test environment, websphere virtual enterprise, static cluster, wve
    
IBM Corporation
Published By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : 
tripwire, iso, iso 27001, security, compliance, comply, isms, information security
    
Tripwire
Published By: Tripwire     Published Date: Jul 08, 2008
Configuration assessment lets businesses proactively secure their IT infrastructure and achieve compliance with important industry standards and regulations. Learn why configuration assessment is so important, why organizations find it difficult to control system configurations, and what types of configuration assessment solutions are available.
Tags : 
tripwire, configuration, compliance, infrastructure
    
Tripwire
Published By: Tripwire     Published Date: Jun 30, 2009
Learn how Tripwire can help you deploy a comprehensive configuration assessment and control solution that: a) reduces the time and resources required to verify compliance and prepare for audits; and b) maintains continuous compliance by allowing IT to immediately identify any exceptions and trigger remediation of configurations that do not conform to policy.
Tags : 
tripwire, automate, fisma, compliance, configuration, assessment, solution, audit
    
Tripwire
Published By: IBM     Published Date: Oct 06, 2014
While traditional B2B sales channels are still the most influential, the explosive growth of B2B ecommerce is forcing B2B organizations to dedicate resources and budget to the on-line sales channel. While B2B organizations can learn from B2C in terms of user experience, B2B selling is much more complex and requires a centralized commerce platform that fully supports sophisticated workflows, pricing, product configurations, approvals and more. In this paper, we explore the impact of the on-line channel and examine five key components required to achieve B2B commerce effectiveness.
Tags : 
b2b sales channels, b2b ecommerce, user experience, centralized commerce platfrom
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
In this webinar, you will learn about the availability of SAP HANA across the entire IBM Power Systems line with pre-sized IBM POWER8 configurations that are optimised for SAP HANA, highly available/disaster recovery options for SAP HANA on Power Systems deployments, and systems management solutions to maintain the SAP HANA systems. You will also hear client use cases on why they chose to implement their SAP HANA solution on IBM Power Systems..
Tags : 
ibm, sap, sap hana, suse, ibm power systems
    
IBM
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"DBAs need help with tackling significant issues, including doing more with fewer resources, quickly responding to upgrade and patch needs, while reducing the time spent on cloning databases. Finally, they need help eliminating the time they spend integrating, testing, and deploying full-stack cloud solutions. How can DBAs reconcile these competing demands? Learn more about expanded offerings in a database appliance that are delivering numerous advantages. These new configurations have the potential to help IT derive new benefits in its efforts to serve the business. "
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: IBM     Published Date: Apr 04, 2013
IBM PureFlex Systems combine advanced IBM hardware and software with “patterns of expertise” and integrate them into three optimized configurations that are simple to acquire and deploy. Read the data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : 
ibm pureflex, system configurations, database configurations, patterns of expertise, integrate
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
IBM PureFlex Systems combine advanced IBM hardware and software with “patterns of expertise” and integrate them into three optimized configurations that are simple to acquire and deploy. Read the data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : 
ibm, ibm pureflex system, pureflex system configurations, pureflex system express, compute, storage, networking
    
IBM
Published By: Metalogix     Published Date: Oct 16, 2013
Microsoft SharePoint sites can play a critical role in just about every business workflow.Originally embraced to streamline internal employee collaboration, today SharePointsystems support customer-facing services and enable information sharing with partners.
Tags : 
metalogix, ebook, microsoft sharepoint, microsoft sharepoint collaboration, governance and compliance, configurations
    
Metalogix
Published By: igus     Published Date: Aug 28, 2019
Cable carriers, sometimes referred to as cat tracks, drag chains or energy chains, can be manufactured in many ways. They can be made with different materials, such as steel or plastic, and they can have simple lightweight designs or complex multi-axis configurations. But how do you know which carrier is best for your application? Choosing the right energy chain is crucial because it offers the following benefits: Longer service life for cables and hoses Improved machine safety Reduced operating costs Read this basics guide to discover a range of cable carrier design and material options, as well as tips for selecting the ideal energy chain. You can also review installation guidelines for maximizing the service life of your cable carrier and the energy supply system it protects.
Tags : 
    
igus
Published By: Symantec     Published Date: Apr 09, 2012
This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Jun 29, 2012
Securing Multiple Web Server and Domain Configurations
Tags : 
licensing, symantec, multiple server, ssl acceleration, hosting configurations
    
Symantec
Published By: Cisco     Published Date: Nov 18, 2015
Cisco engaged Miercom to conduct a competitive analysis of its Catalyst 2960-X switch versus two comparable Hewlett-Packard switches from the 2920 and 5120 product families. Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that are critical for reliable functioning of enterprise networks. The test methodology focused on specific areas in which Cisco believed there were key competitive differentiators between the products. Test results validated include throughput, latency, energy efficiency, stacking, LACP load balancing and Quality of Services (QoS) performance. Miercom found that the Cisco Catalyst 2960-X demonstrated superior performances against the competitive switches in the tests featured in this report. We tested the following switch-configurations of the Cisco Catalyst 2960-X, HP 2920 and HP 5120 product families.
Tags : 
competitive, analysis, deployed, methodology
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics
    
Cisco
Published By: HPE     Published Date: Aug 26, 2014
One thing is clear: the old way of running IT just won’t work in the new business environment.Truth is, preparing your IT department (and your company) to be agile, cost-efficient, metrics-driven, and flexible will require a change in how you operate. To support new business processes, you would do well to turn to a converged system, like HP ConvergedSystem for Virtualization. In this paper, we look at the greatest challenges faced by IT departments, and how traditional configurations, processes, and organizations are poorly-equipped to handle today’s workplace. We discuss the benefits of converged systems that are engineered to handle virtualized workloads. Finally, we look at HP ConvergedSystem for Virtualization as a simple and effective way for businesses to optimize their data center infrastructure and processes to better meet business needs.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution
    
HPE
Published By: HP     Published Date: Aug 26, 2014
Start or expand your virtualization efforts quickly and affordably. HP and VMware provide a portfolio of virtualization reference configurations designed for growing businesses like yours. Based on HP ProLiant Gen8 servers, the HP Flex-Bundles for VMware, provide predefined virtualization solutions that include everything you need to reduce application downtime by 30 percent, slash diagnostics and problem resolution time by 26 percent, boost VMware capacity utilization by 40 percent, and increase consolidation ratios by 37 percent. Discover how.
Tags : 
productivity, secure, safe, servers, processor, email, calendar, solution
    
HP
Start   Previous    1 2 3 4 5 6    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.