phi

Results 1 - 25 of 1898Sort Results By: Published Date | Title | Company Name
Published By: FORTRUST     Published Date: Aug 14, 2015
Companies rely on their data center to provide the foundation for much of their business. Because of that, a thorough evaluation of the key geographical factors related to risk mitigation and data center site selection is critical. This white paper examines several of the major criteria to use in geographic data center site selection, and provides an overview of the FORTRUST facility as it relates to those criteria.
Tags : 
    
FORTRUST
Published By: CyrusOne     Published Date: Jul 02, 2016
Even through challenging economic times, the need for physical data center capacity continues to grow. For some businesses, the driver is expansion into new markets or geographies. For others, it's the need to deal with growing amounts of data generated by applications with high-capacity demands, evolving end-user abilities, or regulatory bodies that demand ever-increasing quantities of meticulous documentation. The "build-or-buy" decision between construction and colocation should be weighed carefully, as the choice will affect your company and your bottom line quite literally for decades. This executive report will review six key factors that affect that choice, some of which extend beyond a basic TCO analysis.
Tags : 
    
CyrusOne
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
    
Cisco EMEA
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Nuance EMEA     Published Date: Jun 04, 2019
New market entrants are shifting the way the financial sector operates, new business models are changing customer expectations, and ever-changing client demographics are forcing businesses to adapt the way they work. As we move into a decade of artificial intelligence (AI) and digital innovation, huge opportunities are opening up for the financial sector to combat these changes. But with this comes new challenges, and exponential increases in available information must be accompanied by smart tools and processes to make sense of it, ensure regulatory compliance, and add real value to clients. To find out more, download this ebook!
Tags : 
    
Nuance EMEA
Published By: Dell EMC     Published Date: May 08, 2019
Greater performance, agility and security are the new imperatives of the modern data center, and according to the Edison Group, Dell EMC PowerEdge servers outperform HPE servers. PowerEdge servers?with Intel® Xeon® Scalable processors? have customer-centrice innovation that is better able to meet the advance demands of IT Transformation, today and tomorrow. Download this infographic to learn the 5 reasons why.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Data security is a top priority and a daunting challenge for most organizations. Costly data breaches are incresing in number and sophiscation, and a growing list of regulations mandate that personal data be protected. At the same time, security technologies must not impede user productivity by creating obstacles or slowing performance, otherwise users might disable or circumvent them. A robust security strategy that includes authentication, encryption and advanced malware prevention enables an organization to keep data safe while enabling the way people work. Dell has conceived and executed an innovative securtiy strategy that provides date protection and threat prevention across an extensive line of products. Download this white paper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: HP Inc.     Published Date: May 29, 2019
With a couple of swipes, a like and a share, what’s in today is gone tomorrow. Graphic design trends are changing rapidly, based on a fast- spreading global pop culture that determines what’s hot, and what’s not, almost instantly. In such a connected world, keeping pace with the right look and feel is essential. While a picture was once worth a thousand words, it’s now worth much more. If you don’t want your audience to bounce, basic is not enough.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: May 29, 2019
HP SmartStream Designer is a powerful, easy-to-use variable data printing (VDP) tool enabling users of HP Indigo and other HP digital presses to create sophisticated high-value jobs and personalized campaigns. A software plug-in for Adobe® InDesign® or Adobe Illustrator®, HP SmartStream Designer makes it possible to personalize any job with images, text and designs, for maximum impact. It has an easy to-use interface and can be easily integrated with over a dozen third-party dynamic applications. It also features rich database logic and preflight capabilities.
Tags : 
    
HP Inc.
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 13, 2019
Organizations are digitally transforming to take advantage of new ways of working. Download this infographic to learn how.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 13, 2019
With Citrix and Google Cloud secure digital workspace solutions, there’s nothing to stop your organization from moving forward. Download this infographic to learn more!
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Schneider Electric     Published Date: Jun 03, 2019
The demands of modern IIoT applications increases the complexity of systems infrastructure and puts additional pressure on IT and OT security. As the frequency and sophistication of cyber-attacks increase, operations must leverage industry standards to achieve consistent protection. This paper will address how IEC62443 can be applied to industrial control systems and help readers understand the various priorities and steps required to help mitigate cyber threats.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, ecostruxture plant, process automation, profitable safety, defence in depth
    
Schneider Electric
Published By: Gigamon     Published Date: Jun 10, 2019
Need to deliver secure customer experiences and high application performance? View our new infographic, “Digital Transformation: Seeing Through the Clouds to the Journey Ahead” to learn how to get the breadth and depth of network and application visibility needed to effectively monitor and secure your digital applications.
Tags : 
    
Gigamon
Published By: Rackspace     Published Date: May 28, 2019
Don’t let the end of support for SQL Server and Windows Server 2008 sneak up on you. Check out this infographic for a snapshot of the preparation that needs to be done, and learn how to avoid business disruptions by adopting the most current security and innovation technologies.
Tags : 
end of support, disruption, sql server, windows server, azure
    
Rackspace
Published By: Intel     Published Date: Feb 28, 2019
Keeping the lights on in a manufacturing environment remains top priority for industrial companies. All too often, factories are in a reactive mode, relying on manual inspections that risk downtime because they don’t usually reveal actionable problem data. Find out how the Nexcom Predictive Diagnostic Maintenance (PDM) system enables uninterrupted production during outages by monitoring each unit in the Diesel Uninterrupted Power Supplies (DUPS) system noninvasively. • Using vibration analysis, the system can detect 85% of power supply problems before they do damage or cause failure • Information processing for machine diagnostics is done at the edge, providing real-time alerts on potential issues with ample of lead time for managers to rectify • Graphic user interface offers visual representation and analysis of historical and trending data that is easily consumable
Tags : 
    
Intel
Published By: Rackspace     Published Date: Jun 14, 2019
Don’t let the end of support for SQL Server 2008 and Windows Server 2008 sneak up on you. Check out this infographic for a snapshot of the preparation that needs to be done, and learn how to avoid business disruptions by adopting the most current security and innovation technologies.
Tags : 
end of support, disruption, sql server, windows server, azure
    
Rackspace
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenüber ihren Kunden und Aktionären verp?ichtet, Daten zu schützen und ihre Gefährdung nicht nur gegenüber externen Angreifern, sondern auch gegenüber Mitarbeitern zu minimieren. Die im Jahr 2017 am häu?gsten genutzte Methode für Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenverstößen im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: Über 80% der erfolgreichen Cyber-An
Tags : 
    
Infinidat EMEA
Published By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
    
Forcepoint
Published By: Domo APAC     Published Date: Mar 04, 2019
Cisco’s marketing team has invested massively in technology over the past two years. This $50 million investment in software has put Cisco at the leading edge of B2B technology marketing. 40 new applications have been put in place, creating one of the most sophisticated marketing technology stacks in the industry, resembling the more consumeroriented Amazon, Google, and Facebook. This investment has earned Cisco’s marketing team plaudits and several industry awards View Domo’s privacy policy
Tags : 
    
Domo APAC
Published By: DataCore     Published Date: Apr 23, 2019
On average in 2018, organizations managed 9.7 PB of data. That is a growth of 569% when compared to 1.45 PB of data in 2016. With all of this data, it's important to consider how data temperature is driving data placement decisions — and ultimately, overall storage costs. Download this infographic and see how you can use data temperature to gauge it’s worth.
Tags : 
storage tiering, auto tiering, all-flash array, ssd, software defined storage, hyperconverged, data migration, storage migration
    
DataCore
Published By: DataCore     Published Date: Jun 06, 2019
More than 54% of companies have experienced a downtime event that lasted more than 8 hours – one full work day – in the past 5 years. And the risk of major disruptions to business continuity practices looms ever larger – primarily due to the troubling dependencies on the location, topology and suppliers of data storage. Download this infographic and see how you can preserve proven Business Continuity practices despite inevitable changes to your data storage infrastructure.
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure
    
DataCore
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing
    
Coyote Point Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
Help your teams be even more productive. By giving them a secure, reliable connection with high-definition access to the apps and data they need, they'll be able to keep projects moving forward seamlessly — even across low bandwidth or high-latency networks. What's more, IT will be able to manage it all efficiently. Download our white paper. You'll discover how Citrix Workspace offers a high-definition (HDX) virtualized experience that rivals that of a local PC, and: Decreases your demand for bandwidth Increases your user density per hosting server Supports voice, video, and display—even 3D professional graphics!
Tags : 
    
Citrix Systems
Published By: Recorded Future     Published Date: Apr 18, 2019
A very high level look into managing third-party risk in infographic format
Tags : 
    
Recorded Future
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com