deployment

Results 1 - 25 of 1489Sort Results By: Published Date | Title | Company Name
Published By: Intel     Published Date: Mar 14, 2019
One of the challenges of introducing Network Functions Virtualization (NFV) is the complexity of implementation and integration at three points.
Tags : 
    
Intel
Published By: Zscaler     Published Date: May 15, 2019
There’s no denying that Office 365 is a big deal. It’s a big part of the Microsoft Intelligent Cloud strategy. It’s big in terms of its user base. And it has a big impact on your network. Fully deployed, Office 365 will quickly become your greatest consumer of bandwidth and slayer of firewalls. Office 365 is unlike any other SaaS app and, even with careful planning, it’s fair to say that deployment doesn’t always go without a hitch. To help you get on the road to success, we’ve pulled together an overview of the most common pitfalls organizations make pre-deployment—and what you can do to avoid them.
Tags : 
    
Zscaler
Published By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
IBM Cloud Private for Data is an integrated data science, data engineering and app building platform built on top of IBM Cloud Private (ICP). The latter is intended to a) provide all the benefits of cloud computing but inside your firewall and b) provide a stepping-stone, should you want one, to broader (public) cloud deployments. Further, ICP has a micro-services architecture, which has additional benefits, which we will discuss. Going beyond this, ICP for Data itself is intended to provide an environment that will make it easier to implement datadriven processes and operations and, more particularly, to support both the development of AI and machine learning capabilities, and their deployment. This last point is important because there can easily be a disconnect Executive summary between data scientists (who often work for business departments) and the people (usually IT) who need to operationalise the work of those data scientists
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
One of the biggest changes faces organizations making purchasing and deployment decisions about analytic databases -- including relational data warehouses -- is whether to opt for a cloud solution.
Tags : 
    
Group M_IBM Q2'19
Published By: Workday     Published Date: Apr 24, 2019
Watch this webinar replay to hear IRSC’s end-to-end deployment story and learn more about how a single system for student data can help everyone on your campus succeed.
Tags : 
    
Workday
Published By: Forcepoint     Published Date: May 14, 2019
Modernizing the Distributed Enterprise Network Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Modernizing the Distributed Enterprise Network Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Modernizing the Distributed Enterprise Network Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network
Tags : 
    
Forcepoint
Published By: Blue Prism     Published Date: Mar 15, 2019
Blue Prism, the inventor of the term Robotic Process Automation (RPA) and the market leader in enterprise RPA, recently engaged Knowledge Capital Partners (KCP) to survey their client deployments. We used proprietary KCP research tools, and this report summarizes our findings. Based on finalized quantitative survey results as well as our ever-growing library of qualitative case investigations, the report analyzes the management practices and behaviors that underpin the exceptional value achieved by Blue Prism customers as outlined in our January 2018 report “Robotic Process Automation: Benchmarking the Client Experience.”
Tags : 
    
Blue Prism
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, infrastructure, load balancing, servers, green computing
    
Coyote Point Systems
Published By: Rackspace     Published Date: May 15, 2019
Coupling recommendations from the Rackspace DevOps Accelerator engagement with expert advice from Rackspace applications specialists, TotalTrax deployed Fanatical Support for AWS and integrated cloud-based containers to manage customer deployments faster and automate processes.
Tags : 
    
Rackspace
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Feb 23, 2010
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.
Tags : 
asg, cmdb, virtualization, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: Big Bang LLC     Published Date: May 31, 2012
Cost-effective and fully automated device driver management for Microsoft SCCM with the Universal Imaging Utility System Deploy Plug-in. The UIUSD completely eliminates the need for SCCM admins to manage and package drivers.
Tags : 
    
Big Bang LLC
Published By: StoryDesk     Published Date: Mar 28, 2012
How can you use the iPad in your organization? What's the formula for a successful iPad deployment? What do you need to know about regulatory requirements, security, HTML5, and custom apps?
Tags : 
    
StoryDesk
Published By: SAP     Published Date: Feb 03, 2017
As the global business world shifts to all digital, real-time operations, the legacy two-tier ERP architecture so many businesses have relied on to bridge headquarters with subsidiaries can no longer compete effectively. A simple and comprehensive answer exists in SAP S/4HANA. Available in cloud and on-premise, SAP S/4HANA gives organizations the ability to utilize the same product family across a multi-tier deployment.
Tags : 
    
SAP
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: HPE APAC     Published Date: Jun 20, 2017
This white paper shows IT architects, administrators, and DevOps developers how to deploy Docker hosts and execute containerized applications on bare-metal infrastructure.
Tags : 
infrastructure, bare--metal infrastructure, it transformation, business opportunities, operations
    
HPE APAC
Published By: Cisco     Published Date: Dec 20, 2018
Cisco® Collaboration Flex Plan gives you access to Cisco’s collaboration products, allowing you to mix and match buying models and deployment models in a single subscription depending on your buying needs. One subscription covers entitlement and technical support for: (a) the cloud services Cisco Webex® Meetings, Cisco Webex Calling, Cisco BroadCloud Calling, and Cisco Webex Teams and (b) the software Cisco Unified Communications Manager and Cisco Meeting Server.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 22, 2019
Hyperconverged infrastructure solutions are making substantial inroads into a broader set of use cases and deployment options, but limitations exist. I&O leaders should view HCI solutions as tools in the toolbox, rather than panaceas for all IT infrastructure problems.
Tags : 
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.