visibility

Results 1 - 25 of 727Sort Results By: Published Date | Title | Company Name
Published By: FORTRUST     Published Date: Aug 12, 2015
Data Center Infrastructure Management (DCIM) has become more vital than ever to data center operations as efficiency and technology advancement cycles move at an increasingly rapid pace. The insight provided by these essential systems has historically only been accessible to the data center operations team, not the end user or for that matter – the colocated customer. Now that the technology sector as a whole is becoming increasingly user friendly, transparent and hands on, it makes sense for colocation data centers to offer a higher level of insight and transparency into their clients’ individual environments.
Tags : 
    
FORTRUST
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
As the use of cloud solutions in government increases, both business and IT leaders are recognizing that the safety and success of their business depend on finding ways to take full advantage of cloud innovation while ensuring consistent service levels, data management and privacy, and user experiences. Hybrid IT management includes aligning the organization around service levels, cost control, security, and IT-enabled innovation.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Big Data is not just a big buzzword. Government agencies have been collecting large amounts of data for some time and analyzing the data collected to one degree or another. Big data is a term that describes high volume, variety and velocity of information that inundates an organization on a regular basis. But it’s not the amount of data that’s important. It’s what organizations do with the data that matters. Big data can be analyzed for insights that lead to better decisions and better services.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
IoT has proven its value in the private sector. Ever since the 1980’s, US manufacturing has undergone a dramatic transition based on IoT. Machines that where once manually calibrated and maintained began to be controlled by specialized computers. These computers were able to quickly recalibrate tools which allowed manufactures to produce smaller batches of parts, but were also often locked into proprietary computing languages and architectures.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Too often we hear that people want to move everything to the cloud. Unfortunately cloud is not the easy button, and it will not fix every problem that you have with IT today. We have seen a large number of customers who do the math after moving to the cloud only to realize that it was more expensive to run in an offsite cloud than onsite IT. These customers then move away from offsite cloud for workloads that never should have left the building. The cloud in its many varieties is a good tool that can help organizations, but it needs to be thought out. This document is intended to help you move the right workloads to the right clouds in the best way possible and avoid the yoyo effect of moving twice and paying for the privilege of the experience.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Sage BMS Enterprise     Published Date: Dec 04, 2017
The more you know about your people, the more you can enable them to do their best work. And in turn, the greater the chance of business success. Yet, a rapidly changing world of work makes it difficult for companies to achieve this. There is a growing global skills crisis, and it’s getting worse. A shortage of skilled people makes it tough to find and attract the people you need — and it’s even tougher to get them through the door once you find them. To win the war for talent, you need to understand and engage with your candidates better than ever before.
Tags : 
data, reporting, analytics, insights, science, sage, solutions
    
Sage BMS Enterprise
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
traffic, dns, internet, visibility, programming, interfaces, optimization, routing
    
Oracle Dyn
Published By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : 
healthcare, electronic medical records, access management solutions, identity protection, medical data
    
IBM
Published By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : 
mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
    
Lookout
Published By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
    
Lookout
Published By: Amazon Web Services     Published Date: Nov 28, 2017
So you’re thinking about moving to the cloud. Which means you’ve got some new (and some old) security issues to think about. Where do you start? What should you look for when you’re planning your cloud migration or expansion, and what features do you need to tick off your list when you compare partners for the project? At AWS, we’ve worked with millions of cloud users in 190 countries, from all kinds of industries – large enterprise, start-ups, non-profits, education and government. Every organisation's needs are different, but we’ve identified the top features of any successful cloud security initiative. Here are six must-haves for cloud security confidence.
Tags : 
integration, security, compliance, visibility, control, privacy, data, marketplace
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Nov 28, 2017
You know that moving to the cloud is a huge opportunity for your business do great things. Be more agile, be more responsive, do things better. But convincing everyone in your business isn’t easy, especially your security and compliance people who may well see the cloud as too big a risk. This eBook is about answering those security questions – and communicating the six core benefits a data secure cloud will bring to your organisation.
Tags : 
cloud, aws, security, organizations, visibility, control, networks, platforms
    
Amazon Web Services
Published By: Concur ENT Q4 `17     Published Date: Nov 07, 2017
T&E solutions need to drive measurable improvements to the bottom line. With the right tools, anyone can become a T&E leader with increased visibility, compliance, and cost savings. An integrated, end-to-end T&E solution, which eliminates disparate systems, offers significant benefits for businesses and their travellers. Aberdeen recommends following the Leaders in their adoption of T&E technologies.
Tags : 
enterprise, compliance, corporate travel policies, trip cost, corporate budgets, concur
    
Concur ENT Q4 `17
Published By: AppDynamics     Published Date: Dec 08, 2017
This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Dec 08, 2017
This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges
Tags : 
    
AppDynamics
Published By: Trintech EMEA ABM Pilot     Published Date: Nov 03, 2017
While being the backbone of many organization’s Offices of Finance and Accounting, it is now commonly acknowledged that this overreliance on Excel spreadsheets coupled with the lack of visibility associated with its use represents a very real risk. With automation available to improve both process efficiency and effectiveness, the challenge many companies face isn’t why they should transform their process but how. The key to overcoming this challenge is creating a strong business case for investment. One that not only sets out the objectives of the project but is also underpinned by a robust financial analysis, in the form of qualitative and quantitative ROI, and a thorough understanding of risk.
Tags : 
account reconciliation, accounting automation, finance shared services, finance transformation program, finance transformation strategy, financial close, financial close process, reconciliation software, adjusting journal entries, recuing journal entries
    
Trintech EMEA ABM Pilot
Published By: Epicor     Published Date: Nov 07, 2017
Enterprise resource planning (ERP) software is the backbone of modern manufacturing information systems, enabling the digital transformation that’s changing operations and customer expectations. As the movement toward a digital workplace evolves, your ERP system must keep pace. Epicor commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) of deploying Epicor ERP. Several manufacturers using Epicor ERP found: • Faster access to data and improved real-time visibility enabled better decision-making • Improved multi-company operational efficiency • Increased competitiveness with faster turnaround of customer quotes and improved pricing accuracy • Increased versatility with the Epicor ERP cloud offering • Access to deep expertise in manufacturing best practices Read the study to find out how else Epicor ERP has helped manufacturers.
Tags : 
    
Epicor
Published By: Epicor     Published Date: Nov 07, 2017
Every manufacturing company has aspirations to grow. Growth is exciting, yet it can also be challenging. Arm yourself with the right enterprise applications and technology, and consider cloud ERP software as an important component of your arsenal as you strive for growth and battle for market share. This report from Mint Jutras—an independent research and advisory firm that specializes in analyzing the business impact of enterprise solutions—highlights how cloud applications allow businesses to grow by: • Quickly expanding into new territories • Tightening compliance and governance • More effectively implementing standard processes • Achieving greater visibility into the enterprise Download the Mint Jutras report today to learn how cloud ERP from Epicor can help your business grow.
Tags : 
erp software, cloud erp, manufacturing, epicor erp, cloud applications
    
Epicor
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: UPS     Published Date: Sep 05, 2017
Our active and actively aging population is the dichotomy fueling significant growth for implantable medical devices. Innovations focused on mobility, engagement and quality of life are directly targeting this growing population. The implantable medical device industry is poised to capitalize on these unique needs, while simultaneously meeting unprecedented cost pressures. It is time for manufacturers to seek expertise in inventory management and logistics for greater visibility, control and profitability. For implantable medical device manufacturers to be as active and healthy as the patients they serve, their future depends on the ability to differentiate products — not only by price, but through cost, service and documented outcomes. New trends in personal health tracking keep patients moving, and data collection will similarly improve the health of your business.
Tags : 
medical devices, inventory management, logistics, clinical outcomes data, ups
    
UPS
Published By: UPS     Published Date: Aug 29, 2017
Manufacturers who want to link machines, sensors, processes, and people together face a daunting challenge. Here are three things that can help you improve supply chain visibility, mitigate risk and grow into new markets.
Tags : 
ups, industrial buying dynamics, industrial distribution, industrial products, industrial products wholesale
    
UPS
Published By: Riverbed DE     Published Date: Oct 16, 2017
Is your IT organization taking the proper steps toward successful cloud adoption? Legacy networking technology is hampering IT agility. Cloud providers have initiated an agility revolution but secure inter- and intra-cloud network connectivity are still very challenging. Easier alternatives are either expensive, worsen application performance and/or hamper network efficiency. Riverbed’s unique SD-WAN solution helps unlock agility across the complete enterprise network allowing for easier deployment and management of cloud-centric networks. This cloud adoption Use Case outlines challenges and solutions for cloud-centric enterprise architectures including: ·       Unlocking cloud agility through simple workflows in the WAN such as single-click secure connectivity to cloud and branch networks ·       The importance of bandwidth reduction and application acceleration to ensure cloud adoption ·       Distinguishing between application and network problems through enhanced visibility
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Riverbed DE
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com