deployment

Results 201 - 225 of 1571Sort Results By: Published Date | Title | Company Name
Published By: CDW - NetApp     Published Date: Apr 07, 2016
Cloud computing is increasingly being adopted as a way for IT organizations to decrease costs, improve efficiency, and enhance business agility. NetApp has been helping companies succeed in cloud deployment to achieve tangible results since long before the term cloud entered the popular lexicon. NetApp has the people, technologies, and partnerships in place to help organizations evolve existing IT infrastructure into an efficient cloud-based service delivery model. The NetApp® Unified Storage Architecture and clustered Data ONTAP® operating system integrate all storage capabilities into a single, easy-to-use platform. By choosing NetApp when making the transition to a private cloud or a hybrid cloud, organizations will be able to meet their storage business needs now and in the future.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
    
CDW - NetApp
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Traditional security solutions can’t keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter today’s evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.
Tags : 
user protection, security, cloud, endpoint, application, network
    
CDW-Trend Micro
Published By: CenTrak     Published Date: Aug 17, 2012
Learn how Mission Hospital successfully leverages CenTrak RTLS to significantly improve hospital asset management and realize a substantial ROI This reduces rental equipment costs, improved equipment management, and eliminates all asset shrinkage.
Tags : 
technology, healthcare, centrak, asset tracking, asset management deployment, asset, management, mission hospital
    
CenTrak
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation
Published By: Chatsworth     Published Date: Oct 22, 2016
As data centers deploy virtualization and consolidate equipment for more efficient computing, the average rack power density is constantly rising. To learn more download this white paper.
Tags : 
data center energy, power, power management, rack power, virtualization
    
Chatsworth
Published By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
    
CheckMarx
Published By: Cisco     Published Date: Feb 05, 2013
Whether being considered to support an organization's initial private cloud deployment or help an organization recover from a false start, an entry-level private cloud automation solution can enable IT teams to quickly demonstrate the value of IaaS.
Tags : 
private cloud, automation, cloud, entry level, roi, server, network
    
Cisco
Published By: Cisco     Published Date: Nov 08, 2012
This white paper addresses technical professionals who want to increase the efficiency and flexibility of their data center and are considering deployment of private cloud or delivery of IT as a service (ITaaS).
Tags : 
business agility, data center, unified data centers, cloud computing, cisco, virtualization, automation, itaas
    
Cisco
Published By: Cisco     Published Date: Nov 08, 2012
This document discusses the importance of the network to cloud computing, why the network must change, and what Cisco is doing to lead these changes.
Tags : 
networking, cloud, it infrastructure, deployment, cloud infrastructure, cisco
    
Cisco
Published By: Cisco     Published Date: Nov 08, 2012
Forrester Consulting delivers a 2012 summary of trends and survey results from organizations with 100-1500 employees.
Tags : 
byod, bring your own device, cisco, mobility, workplace mobility, byod deployment
    
Cisco
Published By: Cisco     Published Date: Jul 15, 2013
From cloud-based voice and video to comprehensive BYOD and mobility support to deployment costs, this report highlights six key areas to evaluate in collaboration offerings.
Tags : 
cisco mobility, cisco, collaboration, enterprise collaboration, mobile enterprise, mobile workers, collaboration, byod platforms
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2014
Firewall and IPS Deployment Guide
Tags : 
cisco, firewall, security, ips deployment guide, ips
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2014
With maturity comes clarity, and the choice between public, private or hybrid cloud deployments is a prime example. According to a recent IDG Research Survey, private and hybrid cloud adoption is gaining strength at organizations of all sizes, and has the power to serve as a competitive advantage. However IT leaders must address certain barriers to fulfilling the promise of a private or hybrid cloud initiative.
Tags : 
cisco, private cloud, idg research survey, hybrid cloud
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2014
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
cisco, cvds, vpn wan
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Start planning your deployment of the Cisco Unified Computing System (Cisco UCS), powered by the Intel® Xeon® processor, with this useful, step-by-step design guide. The Cisco UCS Technology Design Guide simplifies the steps to a successful deployment. Four modules guide you through a Cisco engineer-tested framework that addresses typical data center and server issues.
Tags : 
design guide, deployment, computing, servers, data, innovative, data center, architecture
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Optimize benefits from your Cisco ASA 5500-X Series Next-Generation Firewall, and better secure your network from malicious activity, with a proven firewall and IPS design guide. Use this guide for faster, more reliable, and more predictable deployment.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2014
Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
Cisco
Published By: Cisco     Published Date: Sep 25, 2014
IT leaders are likely to need multiple UC vendors; however, changing expectations and product development are closing the gap between best-of-breed and good-enough technology. Assess your UC practices to see whether the features offered by your UC vendor are good enough for a single-vendor approach.
Tags : 
quadrant, unified, communications, solutions, operate, enterprises, practices, markets
    
Cisco
Published By: Cisco     Published Date: Sep 25, 2014
The midsize and large enterprise UC markets are now considered by Gartner to be in the early mainstream adoption phase, and the best practices for deployment and end-user adoption are maturing. However, most enterprises currently operate with non-unified-communications solutions.
Tags : 
quadrant, unified, communications, solutions, operate, enterprises, practices, markets
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The Cisco UCS solution provides all management and configuration services at the centrally located Fabric Interconnects, so you can manage large-scale deployments from a single location. This method lets you consolidate hardware and streamline management. The IBM Flex System solution uses a distributed management model with chassis-level control. This method adds to the complexity to the hardware configuration, which can increase management needs.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.