cloud applications

Results 1 - 25 of 643Sort Results By: Published Date | Title | Company Name
Published By: RagingWire Data Centers     Published Date: Sep 08, 2015
Business and IT are no longer separate silos. Your application is your business, and software development is the glue that holds it together. But how can you develop your business and the applications that support it at the same time? How far can you push one before the other breaks? An increasingly large swath of businesses are realizing that the cloud-plus-data-centers model really provides the best of both worlds, and integrating the public virtual cloud with the physical data center is the best way to cost effectively scale, secure, and serve modern production workloads.
Tags : 
    
RagingWire Data Centers
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA Tier 3 ABM
Published By: CA Technologies     Published Date: Sep 25, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cloud applications, infrastructure, optimization, automation tools, administrative power, ca technologies
    
CA Technologies
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Intel Inside®. Intel otwiera nowe mozliwosci. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi y Xeon Inside son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: CA Technologies     Published Date: Aug 24, 2017
L’économie des applications oblige les entreprises à se transformer. Pour saisir de nouvelles opportunités de croissance, elles s’ouvrent sur l’extérieur et partagent des données et applications sélectionnées avec des développeurs, des partenaires, des appareils mobiles, le Cloud et l’Internet des objets. Cette transformation contribue à redonner de la valeur aux données héritées : dans l’économie des applications, une organisation qui parvient à exploiter ces données d’une nouvelle manière pourra faire émerger de nouvelles opportunités de revenus.
Tags : 
    
CA Technologies
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM
Published By: IBM     Published Date: Sep 28, 2017
Welcome to the era of the digital enterprise, where digital is your journey and cognitive is your destination. As business leaders, you are under growing pressure to use information to its fullest potential, delivering new customer experiences as fuel for business growth. The digital economy is changing the way we gather information, gain insights, reinvent our businesses and innovate both quickly and iteratively A hybrid cloud environment, combining traditional IT systems and public cloud, enables you to extend business processes beyond the walls of your organization. For example, many organizations use public cloud as a collaborative development environment to create innovative applications that can then be ported to an on-premises or hybrid production environment.
Tags : 
cognitive era, digital, database, hybrid cloud environment, public cloud
    
IBM
Published By: Epicor     Published Date: Nov 07, 2017
Every manufacturing company has aspirations to grow. Growth is exciting, yet it can also be challenging. Arm yourself with the right enterprise applications and technology, and consider cloud ERP software as an important component of your arsenal as you strive for growth and battle for market share. This report from Mint Jutras—an independent research and advisory firm that specializes in analyzing the business impact of enterprise solutions—highlights how cloud applications allow businesses to grow by: • Quickly expanding into new territories • Tightening compliance and governance • More effectively implementing standard processes • Achieving greater visibility into the enterprise Download the Mint Jutras report today to learn how cloud ERP from Epicor can help your business grow.
Tags : 
erp software, cloud erp, manufacturing, epicor erp, cloud applications
    
Epicor
Published By: Oracle Hardware     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle Hardware
Published By: Oracle Hardware     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle Hardware
Published By: Oracle Hardware     Published Date: Oct 20, 2017
Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements many companies are turning to cloud computing. To remain competitive companies need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. A complete cloud strategy will likely include both private and public clouds because some applications and data might not be able to move to a public cloud. Moving to the cloud should not create information silos but should improve data sharing. Any cloud strategy should make sure that it is possible to integrate on-premises, private cloud and public cloud data and applications. Furthermore, any on-premises cloud deployments must be able to easily migrate to public cloud in the future
Tags : 
    
Oracle Hardware
Published By: Oracle Hardware     Published Date: Oct 20, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most compani
Tags : 
    
Oracle Hardware
Published By: Oracle Hardware     Published Date: Oct 20, 2017
Oracle’s new cloud platform, included a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in memory and can prevent hacking explo
Tags : 
    
Oracle Hardware
Published By: Oracle Hardware     Published Date: Oct 20, 2017
On Thursday June 30th, we announced Oracle’s new cloud platform, including a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in
Tags : 
    
Oracle Hardware
Published By: Oracle Hardware     Published Date: Oct 20, 2017
On Thursday June 30th, we announced Oracle’s new cloud platform, including a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in
Tags : 
    
Oracle Hardware
Published By: Oracle Hardware     Published Date: Oct 20, 2017
For the past several years IBM has been divesting its hardware business. At the same time, Oracle has continued to invest in IT infrastructure and cloud innovation. Oracle SPARC servers offer you greater performance and efficiency compared to IBM Power systems, with additional security and lower costs, along with the flexibility to run your applications on-premises or in the Oracle Cloud. Download this whitepaper to completely understand the value of the Oracle SPARC and the 5 reasons to choose Oracle SPARC over IBM Power.
Tags : 
    
Oracle Hardware
Published By: Juniper Networks     Published Date: Aug 08, 2017
Cloud, social, big data, and the Internet of Things (IoT) are increasingly central to business decisions as the pace of digitization accelerates. The impact of software-defined networking (SDN), virtualization, and converged and hyperconverged infrastructure within the datacenter is substantial. These technologies add complexity but offer enticing opportunities for new business models, revenue streams, operating efficiencies, and agility that organizations must pursue if they want to remain competitive and viable. This pursuit requires businesses to keep up with current and emerging technologies and applications and transform the ways in which they conduct business. At the core of "keeping up" is an organization's datacenter strategy — with an associated technology and services strategy that will either create industry laggards or accelerate innovators.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Business evolution and technology advancements during the last decade have driven a sea change in the way data centers are funded, organized, and managed. Enterprises are now focusing on a profound digital transformation which is a continuous adjustment of technology management resources to deliver business results, guided by rapid review of desired outcomes related to end clients, resources, and budget constraints. These IT transitions are very much part of the competitive landscape, and executed correctly, they become competitive differentiators and enable bottom line growth. These outcomes are driving data centers to virtualization, service-oriented architectures, increased cybersecurity, “big data,” and “cloud,” to name a few of the key factors. This is completely rethinking and retooling the way enterprises handle the applications, data, security, and access that constitute their critical IT resources. In essence, cloud is the new IT.
Tags : 
    
Juniper Networks
Published By: Oracle Hardware     Published Date: Nov 16, 2017
Two trends are pushing all lines of business—across all industries—toward cloud IT. First, IT is being stretched more than ever. IT organizations are expected to expand services and meet tighter SLAs while having fewer resources, personnel, and skills to work with. With the IT queue growing longer than ever, both IT and LOB leaders are interested in using the cloud to quickly deploy the services users need. For most IT organizations, the current way of doing business does not map to growth or enable the flexibility to compete in the digital age. Rigid and periodic hardware-refresh cycles cannot adequately scale, and applications built for on-premises resources using traditional development and management tools are no longer flexible enough to deliver the agility businesses need to grow or compete.
Tags : 
    
Oracle Hardware
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The pressures of speed, efficiency, and cost will push more applications and data outside the trusted network and into a service provider’s clouds, where those benefits can be realized. The growth of cloud services and movement of sensitive data between private and public clouds means that those services will become increasingly valuable as targets of attack. As enterprises cloud-enable their operations, gaps in control, visibility, identity, and security are the most likely paths to data breaches. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
cloud, optimization, speed, efficiency, costs, applications, data, services, sensitive data
    
McAfee EMEA
Published By: Citrix     Published Date: Oct 26, 2017
Now that your organization is deploying apps on premise and in the cloud, you need an ADC that can manage, monitor, and troubleshoot applications across your entire hybrid and multi-cloud landscape. How do you select a solution that can help you deploy and monitor your application infrastructure end-to-end?
Tags : 
    
Citrix
Published By: Entrust Datacard     Published Date: Mar 20, 2017
Microsoft® Office 365™ continues to lengthen its lead as the world’s top enterprise cloud service. Nearly one-in-four employees in Fortune 500 companies are active on Office 365 — and more than 90% of those large enterprises currently have more than 100 active users. Users are clearly becoming more reliant on Office 365, as usage grew at a rate of more than 300% in 2016.
Tags : 
    
Entrust Datacard
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
These are no longer capitally strained organizations building an application on a one-off basis, with the cloud this is enterprise transition, this is enterprise applications being shifted to the cloud, new applications being developed in the cloud, and this requires a completely new way of building and consuming IT services for the enterprise. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com