direct

Results 1 - 25 of 1323Sort Results By: Published Date | Title | Company Name
Published By: NTT Ltd.     Published Date: Aug 15, 2019
As businesses are driven to digital transformation by changing market forces and customer expectations, many are looking to new technologies, including new infrastructure environments, as enablers. As a result, we are seeing a near-universal appetite for hybrid outcomes as business functions are executed across multiple on-premises and external infrastructure environments in pursuit of agility, cost, performance and other business benefits. Hybrid IT has become a key strategic imperative for a large portion of enterprises, impacting their IT objectives and expectations, and likely leading to new engagements with service provides for help designing, building and operating hybrid environments.
Tags : 
    
NTT Ltd.
Published By: Gigamon     Published Date: Sep 03, 2019
Network operations teams can no longer ignore the application layer. Application experience can make or break a digital enterprise, and today most enterprises are digital. To deliver optimal performance, network operations tools must be application-aware. However, application-awareness in the network and security tool layer is expensive and difficult to scale. Enterprises can mitigate these challenges with a network visibility architecture that includes application-aware network packet brokers (NPBs). EMA recommends that today’s network operations teams modernize their approach with full application visibility. EMA research has found that network teams are increasingly focused on directly addressing security risk reduction, service quality, end-user experience, and application performance. All of these new network operations benchmarks will require deeper application-level visibility. For instance, a network team focused on service quality will want to take a top-down approach to perfo
Tags : 
    
Gigamon
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
As networks become decentralized and users connect directly to SaaS applications, backhauling traffic to apply security policies just isn’t efficient. Plus, backhauling internet bound traffic is expensive, and it adds latency. More and more branch offices are migrating to direct internet access (DIA). Find out how to quickly and easily secure this traffic.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
In 2018, the Enterprise Strategy Group (ESG) completed a research survey of 450 cybersecurity, IT, and networking security professionals with knowledge of or responsibility for the policies, processes, and controls used for remote office/branch office (ROBO) security. This report is the summary of ESG's conclusions from the study.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Grab a cup of coffee and tune in to hear Alan Meirzon, Director – Chief Information Security Office at Deutsche Bank share his experience using Cisco Umbrella. Alan discusses how his team uses Umbrella as the first line of defense against threats on the internet. He shares best practices and the outcomes his team has seen using DNS-layer security to protect users wherever they access the internet. View this video to hear security best practices and lessons learned from Alan, a security veteran.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe it’s time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: Jun 14, 2019
Reinventing the Yellow Pages Directory: How YellowAPI Became an Engine for Digital Transformation
Tags : 
    
TIBCO Software
Published By: Group M_IBM Q3'19     Published Date: Aug 12, 2019
IBM rarely, if ever publicly, talks about the future of IBM Z. When IBM's sales managers have a oneon-one client conversation (under NDA), they might inform the customer about the next processor, but the company rarely talks about the mid- to long-term future publicly. An obvious reason for this is not to disrupt sales, but at the same time, IBM believes that it is sometimes working on problems that the market might not know it has yet. IBM felt that it was doing a disservice to its current and future customers by not being more open, which is why Tarun Chopra, director, Product Management for IBM Systems, and Ross Mauri, general manager, IBM Z, agreed to talk to IDC about the future of IBM Z. In these conversations, IBM was not putting a date on any of the topics it was willing to discuss. But the company was willing to talk about where it is investing R&D dollars and skills.
Tags : 
    
Group M_IBM Q3'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
Infrastructure efficiency and effectiveness directly support profit and growth as competition increases in the cloud and managed service provider (xSP) market. Savvy service providers understand that storage choices have a profound impact on not only their profit and growth, but also on their customer experience and retention. They also know that storage challenges in all those areas increase exponentially with scale. Infinidat storage platforms allow service providers to build and scale differentiated, profitable solutions without worrying about storage. Infinidat technology enables unprecedented efficiency, performance, and resiliency, while flexible business models make it easy for service providers to operationalize those platform advantages—including unique co-branding and promotional opportunities as part of the Powered by Infinidat program. Cloud providers worldwide trust their businesses to Infinidat storage. This paper explores a path for service providers to unlock greater sc
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Infinidat has developed a storage platform that provides unique simplicity, efficiency, reliability, and extensibility that enhances the business value of large-scale OpenStack environments. The InfiniBox® platform is a pre-integrated solution that scales to multiple petabytes of effective capacity in a single 42U rack. The platform’s innovative combination of DRAM, flash, and capacity-optimized disk, delivers tuning-free, high performance for consolidated mixed workloads, including object/Swift, file/Manila, and block/Cinder. These factors combine to cut direct and indirect costs associated with large-scale OpenStack infrastructures, even versus “build-it-yourself” solutions. InfiniBox delivers seven nines (99.99999%) of availability without resorting to expensive replicas or slow erasure codes for data protection. Operations teams appreciate our delivery model designed to easily drop into workflows at all levels of the stack, including native Cinder integration, Ansible automation pl
Tags : 
    
Infinidat EMEA
Published By: Dell EMC     Published Date: Aug 01, 2019
Software might run the world, but software still runs on hardware. It’s a misperception that hardware has little value anymore. Every application, every workload, every data set runs on physical servers. Read “Hardware Does Matter: Global Server Brands are Perceived as Superior for Driving Digital Business,” a Frost & Sullivan report of 500 IT decision makers, on the value of global server brands vs. commodity servers. Look beyond commodity status to discover: • Key server purchase criteria • How top brands directly compare • How to choose based on workload Server brands very significantly, and a commodity brand may not provide the outcomes you need, especially for new and next-generation applications. Download this analyst report from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Cisco and NVIDIA Corporation     Published Date: Sep 09, 2019
Application performance and delivery have changed. Should your network change too? Cloud is changing the fundamentals of how IT teams deliver applications and manage their performance. Applications are increasingly deployed farther from users, crossing networks outside of IT’s direct control. Instead of enterprise data centers, many apps now reside in public and hybrid cloud environments. There are even new breeds of applications, built upon microservices and containers. Today, IT needs modern solutions that: ? Extend on-premises networks, apps, and infrastructure resources to the cloud. ? Maintain high levels of performance, user experience, and security across all applications, including microservices based apps. ? Sustain operational consistency across on-premises and cloud environments. ? Move away from the expense, complexity, and poor performance of traditional networking methods. These solutions are available for apps running on Google Cloud Platform (GCP) through the allia
Tags : 
    
Cisco and NVIDIA Corporation
Published By: TIBCO Software     Published Date: Sep 16, 2019
Por años, los fabricantes han estado tratando de optimizar sus procesos y cadenas de suministro asociadas creando mercados, intercambios estandarizados, y sistemas monolíticos. En muchos casos, estas soluciones no logran su objetivo, lo que da origen a procesos fragmentados y frágiles, y en los que compartir datos es complicado. Blockchain, la tecnología que está detrás de Bitcoin y otras criptomonedas, puede resolver estos problemas. Compartir información mediante una red distribuida confiable con una lógica de negocio integrada ofrece muchos beneficios al sector manufacturero, especialmente cuando se combina con las comunidades de IoT y de IA. Vea este webinar titulado Blockchain y Manufactura: Una Manera Inteligente de Elevar la Eficiencia en las Cadenas de Suministro de Semiconductores y Electrónica, conducido por Nelson Petracek, director de Tecnología de TIBCO Software. Entre los temas que se abordan se incluye: • Blockchains empresariales • Casos de uso en el sector manufactur
Tags : 
    
TIBCO Software
Published By: Shape Security     Published Date: Sep 16, 2019
Starbucks’ Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large.
Tags : 
    
Shape Security
Published By: Iovation     Published Date: Aug 02, 2019
Aite Group’s second Payment Services Directive (PSD2) Research Report, commissioned by iovation, a TransUnion Company, provides an in-depth analysis of how those in the payment services and e-commerce market should prepare to handle the new strong customer authentication (SCA) requirements under PSD2. See the results of the actual market status in Europe regarding the main changes that PSD2 will bring to the e-commerce payments market. This complimentary, custom report, PSD2: Advent of the New Payments Market in Europe, will teach you what Aite Group concluded after interviewing 20 payments executives from European banks, other PSPs, merchants, payment networks and industry experts.
Tags : 
payment services directive, psd2 regulation
    
Iovation
Published By: Iovation     Published Date: Aug 02, 2019
Learn about the second Payment Services Directive (PSD2), and its expected impacts on the payment services and e-commerce market. Find out what you need to prepare to handle the new strong customer authentication (SCA) requirements under the PSD2.
Tags : 
what is psd2, sca requirements, data privacy, privacy by design, pseudonymization
    
Iovation
Published By: Infosys     Published Date: Aug 20, 2019
Transformation Propelled By Digital Maturity: Incumbent organizations (as opposed to digital natives) fall into 3 clusters determined by their progress along the digital transformation journey. Watchers: Who regard technology as an efficiency enabler and are trying to build a foundation for digital transformation. Explorers: Those who regard technology as enabler for select functions that directly impact CX. Visionaries: Rather, place technology at the heart of their business models and culture.
Tags : 
    
Infosys
Published By: Infosys     Published Date: Sep 05, 2019
In today's hyperconnected and digitized world, cybersecurity has become an important strategic imperative owing to the sophistication of cybercrime. Digital businesses require complex and distributed interactions among people, applications and data - on premise, off-premise, on mobile devices and in the cloud. The result is an increase in the attack surfaces that are hard to protect and defend. As the perimeter continues to diminish, visibility into the environment gets tougher. Operational Technology (OT) and the Internet of Things (IoT) massively expand the scope of security strategy and operations. When a massively distributed fleet of autonomous devices that can make decisions is combined, directly affecting the physical state of people and things, there is a considerable risk to manage. This issue is not limited to the chief information security officer (CISO) but needs the involvement and sponsorship of the leadership and the board.
Tags : 
    
Infosys
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Simba by Magnitude     Published Date: Jul 12, 2019
Today’s C-level executives expect data and analytics to provide them with speed and agility to deliver competitive advantage and to disrupt new markets. But, in today’s complex data environment exists a near paradox between these expectations, that companies will be able to rapidly deliver value using data and analytics--and the complexities of the data landscape, making it more difficult to find, govern, connect to and access the data needed to deliver that value. Once thing is clear: if management expectation is to be met, simplifying connectivity is a must.In this white paper, veteran analyst Mike Ferguson, Managing Director of Intelligent Business Strategies explores how simplifying data access –connectivity –aligns expectations with data realities thus decreasing time to value.
Tags : 
    
Simba by Magnitude
Published By: 123Together     Published Date: Dec 04, 2008
Microsoft Exchange Server has been a crucial technological breakthrough in advanced corporate communication systems. Companies who utilize an enterprise-class email server like Exchange believe that email is mission critical, and value the productivity it enables. But an in-house migration to Exchange 2007 from an earlier version of Exchange or another email program will not be an easy task. Complexity, time and cost issues loom large over the IT department and are causing IT directors to search for an alternative solution.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, migration, osterman, collaboration, mobile services
    
123Together
Published By: Extensis     Published Date: Apr 18, 2008
In 2006, Direct Wines Ltd identified a need for a solution that would manage the thousands of wine related images they had collected. The main use of the images, which range from images of wineries and wine makers to those of grapes, is inclusion in the company's direct mail campaigns and on the Direct Wines website.
Tags : 
extensis, direct wine, portfolio server, images, dam, solutions
    
Extensis
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery
    
AppAssure Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.