san

Results 301 - 325 of 1191Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Mar 10, 2015
Sichern Sie Ihre Unternehmensanwendungen für Cloud-Umgebungen und mobile Umgebungen sowie für das offene Web.
Tags : 
    
CA Technologies
Published By: HGST     Published Date: Feb 23, 2015
Learn how to best understand flash-based architectures and see how with this webcast you will learn the pros and cons of relevant flash technologies, while also learning how to choose from among the many alternatives.
Tags : 
flash, hgst, flash architecture, sans, it management
    
HGST
Published By: NetApp     Published Date: Mar 05, 2018
"Get performance rankings for all-flash storage arrays and a comparison of top vendors. Read this report by an independent analyst and learn about: • Top all-flash vendors and how they ranked in raw performance, best value, and performance consistency • Recommendations for entry-level to enterprise-class storage solutions • New storage software capabilities "
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
Migrating to a flash storage solution does much more than simply save you money. Read this ebook and learn the top three things to know about modernizing your SAN. Find out how you can accelerate your most important apps by up to 20 times compared to traditional storage—while minimizing downtime.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
To keep pace with an increasingly digital world, enterprises are transforming their data infrastructures using all flash storage. As a leading all flash storage provider, NetApp simplifies your infrastructure to improve economics, while accelerating performance and increasing availability to enhance your company’s competitiveness. NetApp future-proofs your IT investments, allowing you to grow with confidence. NetApp® all flash storage reduces your storage footprint, power, and cooling by up to 10x; doubles performance at half the latency of leading competitors; and lets you migrate confidently from your existing SAN with a pathway to the cloud. With NetApp, all flash arrays, your business is prepared to take on anything and everything the future can throw at it: rapid growth, new technology, or a shift in the industry. Cut fear out of the equation. Be data ready to bring on the future.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
New innovations in storage technology are changing the game for data centers, and NetApp is working to help our customers capitalize on them. The introduction of faster and faster media types and more efficient mechanisms to access those media across well-defined SAN and Ethernet infrastructures will unlock unprecedented speeds, lower latencies, and dramatic improvements in system and application efficiency.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Sep 26, 2018
Get practical advice from IT professionals on how to successfully deploy all-flash arrays for Oracle, SAP and SQL Server workloads in a SAN environment. You'll explore topics such as transaction processing speed, storage management, future requirements planning, workload migration and more.
Tags : 
netapp, flash, san, workload, netapp
    
NetApp
Published By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
    
MobileIron
Published By: Aternity     Published Date: May 18, 2015
This whitepaper provides an overview of Aternity Virtual Desktop Monitoring and how it monitors end user experience in a VDI environment. Aternity goes well beyond traditional Virtual Desktop Infrastructure assessment tools that are primarily focused on planning and testing virtual deployments. Aternity provides in-depth monitoring of end user experience in a production environment spanning tens of thousands of business users.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring, end user experience management, infrastructure monitoring, it performance analytics, it service management, it service optimization, mobile application management, mobile end user experience, mobile user experience, sla management, mobile app monitoring, virtual desktop monitoring, vdi
    
Aternity
Published By: Okta     Published Date: May 11, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
    
Okta
Published By: VISANOW     Published Date: Mar 16, 2016
Employers are placing substantial value on the role of foreign nationals within their organizations — investing considerable time and money in order to bridge the skills gap and remain competitive in today’s global environment, according to the VISANOW Immigration Trends 2016 survey.
Tags : 
visanow, hiring, international, visa, talent management, immigration
    
VISANOW
Published By: Cisco     Published Date: Apr 11, 2016
A través de los años, todos hemos escuchado hablar de soluciones simples y aparentemente mágicas que permiten resolver problemas de seguridad, incluido el uso exclusivo de la tecnología de sandboxing para combatir el malware avanzado y las amenazas dirigidas.
Tags : 
    
Cisco
Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security
    
Akamai Technologies
Published By: AWS     Published Date: Jun 15, 2016
Cloud in the enterprise has grown up. It’s no longer just a sandbox for developers, or a sneaky backdoor way for business units to get more IT resources fast. Now, IT leaders are seeing the big picture: cloud as the de facto model for delivering the whole of IT to the whole of the business. Increasingly, they’re adopting a Cloud-First mindset.
Tags : 
    
AWS
Published By: Skillsoft     Published Date: Dec 13, 2016
Skillsoft has created an entirely new business skills portfolio based on in-depth research with end-users and eLearning enterprise buyers. The end result is a content pipeline of over one thousand, 3-5 minute micro-videos, packaged into over 240 new courses. Multi-dimensional and micro-sized, the new courses are flexible training and development solutions that target the need of diverse populations, at all stages of their career. The courses feature purposeful application of video treatments, including: • Well-acted, interactive scenarios • High-end animations • “TED-talk” style presentations • “How-to” videos • Whiteboard tutorials Watch a sample scenario-based course, Mobilizing Your Team to Take Action.
Tags : 
business skills, training and development, knowledge management
    
Skillsoft
Published By: Epicor Software Corporation     Published Date: Nov 03, 2016
Download the latest ERP Selection Guide designed based on our experience working with thousands of growing businesses all over the world.
Tags : 
erp, erp system, enterprise resource planning, erp selection, erp evaluation, business system, epicor, tco, roi, customer support, erp vendor, finance software, manufacturing software, scm, accounting software, business intelligence, crm
    
Epicor Software Corporation
Published By: Globalscape     Published Date: Nov 14, 2016
Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is “no,” then your sensitive data may be vulnerable. In this guide from Globalscape, you’ll learn: • What shadow IT is and the drawbacks • Signs of a shadow IT problem • How to reduce shadow IT
Tags : 
globalscape, shadow it, data transfer methods, data breach, security, enterprise applications, business technology
    
Globalscape
Published By: Sprinklr     Published Date: Nov 22, 2016
You’ll learn some handy information in this guide, including: - Why your company should be thinking about LinkedIn ads. - How HSBC and Nissan are running successful campaigns on LinkedIn. - Actionable advice for taking your first steps, courtesy of thought leaders who live and breathe LinkedIn.
Tags : 
social ads, social advertising, social media advertising, linkedin ads, linkedin advertising.
    
Sprinklr
Published By: Progress     Published Date: Mar 06, 2017
Formerly, buyers were limited in the ways they could gather product information. But because of the web and social media, buyer behaviors have changed. Because buyer interactions can number in the thousands or millions, businesses must use automated tools to personalize the buyer’s online experience and drive them toward a purchase decision.
Tags : 
data driven marketing, buyer behavior, buyer interactions, web content management, content management systems
    
Progress
Published By: Progress     Published Date: Oct 09, 2017
Formerly, buyers were limited in the ways they could gather product information. But because of the web and social media, buyer behaviors have changed. Because buyer interactions can number in the thousands or millions, businesses must use automated tools to personalize the buyer’s online experience and drive them toward a purchase decision.
Tags : 
    
Progress
Published By: Google     Published Date: Aug 05, 2019
Migrating to the cloud can be complex, time consuming, and risky, especially when you have hundreds or thousands of existing workloads to move. Make your journey fast and smooth by planning ahead and using tried and tested best practices. This 4-step guide from Google Cloud also includes a detailed checklist of key milestones, ensuring that you complete every step and always know what’s next.
Tags : 
google cloud, workloads, migration, cloud management, cloud infrastructure
    
Google
Published By: Lenovo - APAC     Published Date: Jan 23, 2019
Headquartered in Chicago, Bean Suntory owns over 70 premium spirit brands from whiskey and rum, to vodka, cognac, tequila, and gin. Beam Suntory generates $4 billion in annual revenues. But that revenue was in danger. The company’s production software, Wonderware, which controls embedded systems driving almost every critical production process, was underpinned by ageing hardware. If it failed, production would come to a grinding—and expensive—halt.Every hour of downtime results in lost production, which can amount to millions of dollars in losses,” says Sanjay Kirtikar, Director Digital Technologies, Beam Suntory. To ensure Wonderware never failed, Beam Suntory implemented hyperconverged clusters integrated with Nutanix Enterprise Cloud Platform software The results were instant and outstanding. Beam Suntory expects a 25-35% cost benefit from lower support and maintenance efforts, and a 50% reduction in power usage.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Gigamon     Published Date: Mar 26, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.