premise

Results 51 - 75 of 660Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 04, 2019
Description Zendesk is a customer service software company that serves over 125,000 organizations around the world. Wanting to create better experiences for its end users and their customers, Zendesk realized that operating on-premises made it difficult for their developers to provision the resources needed to innovate. To simplify the developer experience, Zendesk migrated to AWS and used containers to bolster portability between on-premises and the cloud. Now operating a massive, distributed container-based environment, Zendesk needed an all-in-one monitoring solution that matched their environment's scale and agility.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 04, 2019
Description Zendesk is a customer service software company that serves over 125,000 organizations around the world. Wanting to create better experiences for its end users and their customers, Zendesk realized that operating on-premises made it difficult for their developers to provision the resources needed to innovate. To simplify the developer experience, Zendesk migrated to AWS and used containers to bolster portability between on-premises and the cloud. Now operating a massive, distributed container-based environment, Zendesk needed an all-in-one monitoring solution that matched their environment's scale and agility.
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 24, 2019
Some organizations are reluctant to migrate to the cloud because they believe they will be forced to learn new skills, start using new tools, and adopt new processes. However, by deploying VMware Cloud on AWS, your organization can continue to leverage existing, familiar VMware investments. This on-demand service delivers a powerful hybrid cloud solution, combining an industry leader in virtualization, VMware, with the largest cloud provider, Amazon Web Services (AWS). One of the first solution providers to achieve the VMware Solution Competency and a participant in the AWS Partner Initiative for VMware Cloud on AWS, RoundTower is uniquely qualified to help your organization adopt and optimize VMware Cloud on AWS. Watch this webinar to see how they can extend your on-premises data center to AWS, enabling you to gain increased flexibility, a rapidly scalable environment, and faster time to innovation. Download our webinar to learn How to take advantage of flexible consumption models t
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 25, 2019
What you'll learn in this webinar: Modernize your databases and applications by migrating to Amazon Aurora. Take advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS) to optimize your operations. TekStream, an AWS Partner Network (APN) Advanced Consulting Partner, specializes in migrating legacy on-premises databases to AWS. Watch this webinar to learn how TekStream helps you break free from commercial database licenses, such as Microsoft and Oracle, and move your databases to the cloud in order to focus on your core business. Watch our webinar to learn how TekStream can help you: Understand your options when migrating your databases to Amazon Aurora Reduce the annual maintenance and support costs associated with commercial database licenses See how the combination of business consultation and technology implementation can markedly improve operations
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 01, 2019
As organizations choose to leverage Kubernetes on-premises and in the cloud, the complexity of management is a growing challenge, due to the lack of consistency and different tools needed across hybrid deployments. With the Cisco Hybrid Solution for Kubernetes on AWS, you can easily set up and manage your on-premises and Amazon Elastic Kubernetes Service (Amazon EKS) clusters with one solution. Download the eBook to learn how this comprehensive offering can help you quickly deploy Kubernetes clusters with consistency and supports the full lifecycle of containerized and non-containerized apps.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 01, 2019
Containers have become the new infrastructure standard for development teams. While the “DIY container approach” (un-orchestrated containers) still has its use cases (e.g. low latency, longer compute jobs, predictable traffic), production-grade deployments require orchestration. DevOps teams are increasingly leveraging the benefits of Kubernetes and accelerating its adoption, taking it from a 27% adoption rate in 2018 to a 48% adoption rate in 2019 according to the RightScale “2019 State of the Cloud Report,” from Flexera. The same report also positions Amazon Elastic Kubernetes Service (Amazon EKS) as one of the fastest-growing managed Kubernetes offerings available, with a 44% adoption rate. Previously, containers were a technology deployed by individual teams – and were typically used for “application testing” in the enterprise world. Today, many organizations are now not only seeing the benefits of operationalizing containers to deploy production applications, but also re-positioni
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 01, 2019
Informatica is a leader in Enterprise Cloud Data Management, providing solutions that help organizations optimize, transform, and analyze their data. Informatica’s Intelligent Data Platform is built on a microservices architecture, helping organizations ensure their data is trusted, secure, governed, accessible, timely, relevant, and actionable on-premises or on the cloud.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 01, 2019
By 2020, Gartner predicts 100% of new entrants to IT – and 80% of historical vendors – will offer subscription-based business models to their customers. These organizations are prioritizing the cloud over on-premises data centers and legacy software, so they can more efficiently deliver highly available, scalable, and cost-effective service offerings. To remain competitive, you need to modernize your approach to .NET development – and Amazon Web Services (AWS) is the ideal place to start. This whitepaper will explore best practices for containerizing your Windows workloads on AWS, including how to design your containers, which AWS services to leverage, and how to modernize your existing .NET applications for the cloud.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
DigiCert implemented Imperva to protect their hybrid environment. They were already using Imperva’s WAF on-premises to defend against Layer 7 attacks, known threats, and zero-day attacks to rapidly identify the threats that required investigation. By expanding their usage of Imperva, DigiCert was able to extend protection to AWS and maintain their security posture both during and after migration. Imperva’s sophisticated threat detection technology draws upon vast experience in the WAF market. As traffic passes through their network, advanced client classification technology (together with crowdsourcing and IP reputation data) automatically analyzes it to identify and block web application attacks. These include SQL injection, cross-site scripting, illegal resource access, comment spam, site scraping, malicious bots, and other top threats. Granular filters and controls reduce false positives and prevent access from unwanted visitors, while IP address shielding hides the web server’s IP
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Armor provides a managed Security-as-a-Service (SECaaS) solution that helps strengthen and unify your AWS, on-premises, and hybrid security to enable rapid detection, prevention, and response to cyberthreats in real time—typically with a lower TCO. Armor’s protection can be deployed quickly to help boost application availability. This can also play a role in increasing the visibility and overall security awareness across all your apps, no matter where they reside, because they are always operational. This solution also puts the tools—like a Web Application Firewall—in place to provide appropriate protection while being managed from a single pane of glass. Your organization can also continue using your existing security resources because Armor provides the integration to unify their offerings with the tools you already have in place. In addition, Armor’s Security Operation Center (SOC) is incorporated to reduce high threat dwell times (the amount of time a threat has undetected access t
Tags : 
    
AWS
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Visibility and control of endpoint devices are critical to securely manage your workloads in the Amazon Web Services (AWS) environment. Ideally, teams want to gain real-time visibility and control without having to deploy an additional agent onto the Amazon Elastic Compute Cloud (Amazon EC2) instance. They want a tool that allows them to span physical, virtual and cloud environments of their existing on-premises endpoints and Amazon EC2 instances. CrowdStrike® Falcon Discover™ platform allows you to identify unauthorized systems and applications in real time and quickly remediate issues, ensuring the integrity of your data. Download this datasheet to learn the key benefits of cloud-native CrowdStrike Falcon Discover, including: • Visibility and control over their endpoints whether they are running on-premises or as Amazon EC2 instances • The ability to scale easily to match the dynamic nature of Amazon EC2 instances "
Tags : 
    
AWS - ROI DNA
Published By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BigCommerce     Published Date: May 30, 2018
To find the right ecommerce platform, Freund Containers spent years of research and hours evaluating a wide variety of qualifiers on different platforms. To solve their problems, they created an on-premise-like customizations for their B2B business saving money and time. “The open API and the use of custom fields makes BigCommerce extremely flexible and the platform can do virtually anything you want it to do.” Chris Hiller, General Manager, Freund Container Read their story.
Tags : 
    
BigCommerce
Published By: BigCommerce     Published Date: May 30, 2018
When was the last time you evaluated SaaS? With some big decisions ahead for your online store as the ecommerce landscape is changing, we designed a SaaS Ecommerce Benefits Checklist to easily evaluate the latest features powering SaaS ecommerce platforms. You’re no longer limited to the complexities of an on-premise solution. Find out how you can save your business from complexity without sacrificing performance in this checklist.
Tags : 
    
BigCommerce
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.