cloud container

Results 1 - 25 of 28Sort Results By: Published Date | Title | Company Name
Published By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
    
Oracle APAC
Published By: Juniper Networks     Published Date: Oct 25, 2017
The primary purpose of containerized applications is to improve the effectiveness of software teams, making it easier for people to work together while lowering the communications overhead. In large enterprises, applications such as ERP or CRM software suites often begin as simple projects, but as time passes, they quickly become clunky and inefficient, with a monolithic code base that slows progress for development teams.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Oct 10, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Oracle IaaS     Published Date: Feb 01, 2018
Nicht zuletzt gab es durch den Megatrend Cloud Computing einen rasanten Fortschritt für die moderne Applikationsentwicklung. Das Zusammenspiel von Microservices und Containern ermöglicht es, Entwickler-Software schneller zu erstellen und freizugeben. Mehr in unserem ePaper von Oracle und Intel®: so können Sie Time-to-Market von neuen Projekten durch Cloud-native Application Development verkürzen, Operations und Data Security effizienter managen sowie den ROI in der IT verbessern.
Tags : 
entwickeln, schneller, kosteneffizienter, cloud, native, application, development
    
Oracle IaaS
Published By: VMware     Published Date: Oct 12, 2018
Since Hyper Converged Infrastructure (HCI) emerged as a breakthrough technology, it has continued to gain taction as it has truly delivered on its promise. It has helped organizations optimize resources, reduce complexity, lower costs, increase agility and accelerate development cycles, as well as provide a seamless path to hybrid cloud. These are just a few of the key benefits causing IT leaders pay close attention to HCI and look at ways to use it to power key initiatives such as digital transformation. As IT leaders continue to embrace HCI and the market is expected to grow at a compound annual rate of 42% through 2023, the future is happening now. Submit the form to read our latest whitepaper and discover 5 powerful HCI case studies around Business critical applications, Hybrid Cloud/Multicloud, Disaster recovery, Edge computing, Container and App Development.
Tags : 
    
VMware
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations using machine data platforms like Splunk recognize the importance of consolidating disparate data types for top-down visibility, and to quickly respond to critical business needs. Machine data is often underused and undervalued, and is particularly useful when managing infrastructure data coming from AWS, sensors and server logs. Download “The Essential Guide to Infrastructure Machine Data” for: The benefits of machine data for network, remote, web, cloud and server monitoring IT infrastructure monitoring data sources to include in your machine data platform Machine data best practices
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Microsoft     Published Date: Nov 22, 2016
Find out how your organisation can gain access to technologies that re-invigorate the apps they run today and set them up to build groundbreaking new applications using containers and microservices architectures.
Tags : 
hybrid cloud, microsoft, applications, cloud architecture, cloud container, cloud computing
    
Microsoft
Published By: Microsoft     Published Date: Nov 22, 2016
Die Zukunft der IT-Verwaltung ist bereits da. Wie gut sind Sie darauf vorbereitet, die explosionsartig zunehmenden Apps, Daten und Plattformen zu verwalten? Beantworten Sie diese fünf Fragen um einzuschätzen, ob Sie bereit sind.
Tags : 
hybrid cloud, microsoft, cloud platform, public cloud, cloud container, cloud computing
    
Microsoft
Published By: Citrix     Published Date: Jun 15, 2018
The world of IT is undergoing a digital transformation. Applications are growing fast, and so are the users consuming them. These applications are everywhere—in the datacenter, on virtual and/or microservices platforms, in the cloud, and as SaaS. More and more apps are now being moved out of datacenters to a cloud-based infrastructure. In order for an optimized and secure delivery of these applications, IT needs specific network appliances called Application Delivery Controllers (ADCs). These ADCs come in hardware, virtual, and containerized form factors, and are sized by Network Administrators based on the current and future usage of applications. The challenge with this is that it’s hard to foresee sizing or scalability requirements for these ADCs since users are constantly increasing, and applications are consistently evolving, as well as moving out of datacenters. Complicating matters, most ADCs are fixed-capacity network appliances that provide zero or minimum expansion capability
Tags : 
    
Citrix
Published By: Oracle     Published Date: Feb 21, 2018
Get Started with Oracle Cloud for Free $300 in free credits Build production-ready workloads by using a variety of cloud services including databases, compute, containers, IoT, big data, API management, integration, chatbots, and many more
Tags : 
    
Oracle
Published By: Puppet     Published Date: Nov 08, 2016
Information technology is racing ahead with a Moore’s law-like inexorability and compounding rate. While it’s impossible to know what’s next, it's possible to get out of reactive mode and get ahead of the game. And that doesn’t mean simply focusing on practices like DevOps or technologies like cloud adoption and container stack selection.
Tags : 
    
Puppet
Published By: Juniper Networks     Published Date: Aug 08, 2017
Large enterprises are exploring the possibilities enabled by emerging container technologies such as Docker. At Juniper, we see this trend as a milestone in data center innovation, offering significant gains in efficiency, productivity, and agility for large enterprises that offer cloud as a service.
Tags : 
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: May 29, 2018
In time, containers will be the means by which all workloads are deployed on server platforms. It makes too much sense. Constructing fake machines around virtual workloads, just to make them portable across servers, was not the architecturally rational thing to do. It was the expedient thing to do, because cloud platforms had not yet evolved to where they needed to be. This book presents a snapshot of the emerging approaches to container monitoring and distributed systems management that engineers and their customers are building together.
Tags : 
    
CA Technologies EMEA
Published By: Tenable     Published Date: Feb 07, 2018
"Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure and protect your enterprise. By reading this ebook you’ll learn what’s working – and what’s not – from 29 global infosec leaders, representing a diverse array of industries and perspectives. Download your copy today for insights and lessons learned about: - Securing a dynamic IT environment - Rethinking security for cloud environments - Moving security to the application layer - Focusing on data security - Automating security testing and controls"
Tags : 
secure devops, web application security, attack surface, cloud, container security, ciso, cyber, experts, ebook
    
Tenable
Published By: Riverbed     Published Date: Nov 02, 2016
In its quest to increase agility and reliability, IT is adopting cloud services and related technologies like PaaS, micro-services, and containers to rapidly deliver applications that scale to real-world conditions. Application topology is often transient and unpredictably interrelated with countless other applications and services. This poses a serious challenge for performance monitoring since most techniques are still rooted to tiers or servers. During this webinar, discover: • The benefits and challenges of deploying apps across hybrid environments • Techniques that expose major, but often undiagnosed problems • Real-world examples where major performance issues were resolved"
Tags : 
    
Riverbed
Published By: MuleSoft     Published Date: Oct 13, 2015
Learn the recommendations to meet the following challenges: Financial services firms are deploying private clouds and PaaS to improve IT manageability and to empower developers, but still need to manage and monitor legacy environments and third party applications Many firms are adopting PaaS to manage microservices and break down legacy applications into discrete components, resulting in many more endpoints to make discoverable, secure, connect, manage and monitor Applications and container technologies deployed on the PaaS may lack the ability to generate “machine data”--detailed information on memory utilization, system resources, endpoint analysis and other critical monitoring statistics
Tags : 
financial services paas, private clouds, disparate environments, memory utilization, it manageability
    
MuleSoft
Published By: Tenable     Published Date: Jun 19, 2018
CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers
Tags : 
cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
    
Tenable
Published By: Tenable     Published Date: Apr 30, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Dell Cloud Marketplace     Published Date: Jan 07, 2015
This report provides a detailed overview of the Linux container ecosystem. It explains the various components of container technology and analyzes the ecosystem contributions from companies to accelerate the adoption of Linux-based containers.
Tags : 
dell cloud marketplace, linux container ecosystem, cloud services, cloud computing, cloud, data center design and management, infrastructure
    
Dell Cloud Marketplace
Published By: Rackspace     Published Date: Jan 19, 2016
Containers are certainly a hot topic. The OpenStack® User Survey indicates over half of the respondents are interested in containers in conjunction with their OpenStack clouds for production uses. Thanks to new open source initiatives, primarily Docker, containers have gained signicant popularity lately among Developer and Ops communities alike.
Tags : 
rackspace, containers, openstack, cloud, data, security, data center
    
Rackspace
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.