HIT Consultant Insightful coverage of healthcare innovation
 

enterprise environment

Results 101 - 125 of 420Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Get enterprise-class encryption to help meet regulatory demands and secure data in on-premises, cloud and hybrid cloud environments.
Tags : 
encryption, regulatory demands, ibm encryption
    
Group M_IBM Q1'18
Published By: Lenovo - APAC     Published Date: Oct 11, 2018
Lenovo’s VMware vSAN-based hyperconverged solution reduces TCO by 40% within the datacenter. VMware-based hyperconverged solutions from Lenovo come with a set of certified components that can be deployed to create platforms that support a broad array of workloads, performance, and budgetary requirements. With VMware vSAN pre-installed, pre-configured, and pre-tested, Lenovo’s VMware-based hyperconverged solutions help improve productivity, and cut complexity quickly and easily. VMware-based hyperconverged solutions from Lenovo represent proven solutions that are enterprise-class and are already being leveraged within mission-critical environments around the world. Download IDC’s Infobrief on “The Real-World Value of Hyperconverged Infrastructure” and learn how you can: • Cut the cost of scaling infrastructure • Reduce time spent on infrastructure provisioning • Improve application performance • Eliminate complexity and cost related to refreshing traditional infrastructure
Tags : 
    
Lenovo - APAC
Published By: NetApp     Published Date: Sep 24, 2013
"As IT continues to implement advanced capabilities, as well as traditional services such as server virtualization, storage systems become more complex. The complexity only increases because of the rapid growth of data that needs to be managed. View this resource to learn the results of ESG Lab hands-on evaluation of NetApp storage systems with a focus on those enterprise-class capabilities required to manage increasingly large and complex storage environments."
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, non-disruptive operations
    
NetApp
Published By: NetApp     Published Date: Sep 24, 2013
"Flash technology is becoming more prominent in the storage industry. Offering superior speed and reliability when compared to traditional hard disk drives – flash storage is a flexible and increasingly cost-effective technology that can be used to optimize enterprise storage environments. This ebook explores the many uses and benefits of flash storage technology in the enterprise. Check it out to discover and learn all you need to: * Optimize storage performance * Leverage server flash as storage cache * Reduce the footprint of your storage infrastructure in the data center "
Tags : 
flash technology, storage industry, superior speed, cost effective, cloud, optimization, storage cache, data center
    
NetApp
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in mobile and cloud security innovation for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. We ensure customers can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data, app security
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in EMM innovation and mobile security for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. Our goal is to ensure organizations can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data, application protection, app security
    
MobileIron
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Lookout     Published Date: Dec 11, 2018
There are three key statements enterprises must hear in order to move forward in protecting corporate resources from leakage and attack: The perimeter has disappeared. Legacy security technologies do not work. Devices cannot be trusted. A new security architecture is needed to protect data as employees and devices connect to corporate resources in the cloud, all over the world. That architecture is post-perimeter security. Read this whitepaper to: Learn why perimeter security is not longer viable Understand the new, necessary security architecture: post-perimeter security Learn how phishing attacks are thwarting traditional firewalls Find out how Lookout enables enterprises to embrace post-perimeter security in their own environments
Tags : 
    
Lookout
Published By: Commvault ABM Oct     Published Date: Feb 15, 2018
Enterprises and managed service providers (MSPs) have some similar challenges in the realm of data protection. Both have to deal with expansive environments—with enterprises protecting distributed offices/geographies, and MSPs protecting many independent subscribers. Both also have been seeing production data storage and secondary protection storage demands rising. Enterprises and MSPs alike should therefore be looking for data protection architectures that have scale-out capabilities built into their core foundation.
Tags : 
data protection, msps, data storage, scale out data protection
    
Commvault ABM Oct
Published By: IBM APAC     Published Date: Jul 19, 2019
According to IDC, SDS is transforming the IT deployment and consumption of storage resources creating peace of mind. So, deploying SDS is not a matter of “if” but a matter of “when”! SDS survey showed that 75% of enterprises have deployed or are considering to deploy SDS in their environment. This white paper looks at how 61% of enterprises that deployed SDS have realized tangible benefits, such as: • Reduction in CAPEX/OPEX costs • Ease of management • Reduction in provisioning time
Tags : 
    
IBM APAC
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
Published By: Amazon Web Services     Published Date: Oct 09, 2017
Enterprise customers can take advantage of the many benefits provided by Amazon Web Services (AWS) to achieve business agility, cost savings, and high availability by running their SAP environments on the AWS Cloud. Many Enterprise customers run SAP production workloads on AWS today; including those that run on NON-SAP DBs (Oracle, MS SQL, DB2) or on SAP DBs (SAP HANA, SAP ASE). To support the demand of high memory instances, AWS have disclosed their SAP HANA instance roadmap (8TB and 16TB in 2018) and just made 4TB x1e instances available. A few examples of how AWS helped SAP customers cut costs, improve performance and agility include BP reducing 1/3 of their SAP infrastructure cost, Zappos successfully migrating to SAP HANA on AWS in less than 48 hours and enabling a major Healthcare and Life Science company to run BW on HANA with 30% better performance vs. on premise. This guide is intended for SAP customers and partners who want to learn about the benefits and options for running SAP solutions on AWS, or who want to know how to implement and operate their SAP environment effectively on AWS.
Tags : 
storage, networking, management, aws, sap, infrastructure, lower tco, capex, opex
    
Amazon Web Services
Published By: Lenovo and Microsoft     Published Date: Aug 13, 2013
Microsoft has announced that it will end active support and “end of life” Windows XP on April 8, 2014. Now, as that date fast approaches, the highly negative consequences of continuing to use Windows XP in enterprise environments are becoming much clearer. After that date, IT security risks and compliance issues from continued use will be magnified. This white paper examines three aspects that can potentially create a “nightmare” for your organization.
Tags : 
windows xp, compliance, risk, windows upgrade, enterprise, end-user computing
    
Lenovo and Microsoft
Published By: Panaya     Published Date: May 31, 2018
When it comes to investing in ERP systems, improving the efficiency and responsiveness of business processes is a top concern for SAP customers. However, among IT professionals, safe delivery is of higher priority than ERP digitalization or starting an IT agility transformation. With SAP S/4HANA, this no longer needs to be a compromise. When moving to SAP S/4HANA, IT professionals need to implement not only the technical upgrade of SAP S/4HANA but also the required customizations, which necessitate an intensive amount of business collaboration and software delivery. And for that to happen, IT needs an enterprise agile delivery solution to gather and implement the business requirements to SAP S/4HANA as quickly as possible without business disruption. Read this white paper to discover how you can transition to SAP S/4HANA and achieve true enterprise agile delivery — a new standard to deliver changes to your SAP environment. Topics include: › Sync business and IT to ensure your ERP solu
Tags : 
    
Panaya
Published By: Veritas     Published Date: Dec 08, 2016
The latest version - Veritas NetBackup Platform 8.0 - delivers unified data protection for organizations of all sizes, with proven enterprise-class scale, high performance, extensive workload integration, and self-service. No matter where data resides, NetBackup is trusted today in small to the largest and most complex heterogeneous environments.
Tags : 
cloud, cloud computing, data management
    
Veritas
Published By: Microsoft     Published Date: Oct 24, 2016
This report explores the four elements of an enterprise mobility strategy and how to address the challenges that your enterprise may face in a mobile environment.
Tags : 
enterprise mobility management, mobility, mobile devices, bring your own device
    
Microsoft
Published By: NetApp     Published Date: Feb 19, 2015
VMware Horizon View is an enterprise-class desktop virtualization solution that delivers virtualized or remote desktops and applications to end users through a single platform. Horizon View is a tightly integrated, end-to-end solution built on the industry-leading virtualization platform, VMware vSphere. Although Horizon View enables levels of availability and agility of desktop services unmatched by traditional PCs, the complexity of deploying and managing thousands of virtual desktops in a VMware environment can be daunting without the right tools. Storage is often the leading cause of end-user performance problems. The NetApp all-flash FAS solution with the FAS8000 platform solves the performance problems commonly found in VDI deployments. In this reference architecture, NetApp tested VMware Horizon View user and administrator workloads to demonstrate how the NetApp all-flash FAS solution eliminates the most common barriers to virtual desktop adoption. The testing covered common
Tags : 
    
NetApp
Published By: NetApp     Published Date: Feb 19, 2015
Flash Storage for Dummies, NetApp 2nd Special Edition, describes the many uses and benefits of flash storage technology in the enterprise. From flash-accelerated storage to all-flash arrays, flash technology improves performance and increases reliability in storage infrastructures. The book examines various elements of flash storage: how it evolved, and why you should consider it for your storage infrastructure. The book explores key differences in NetApp’s flash storage solutions: NetApp Flash Cache, Flash Pool, all-flash FAS, and the EF-Series. You’ll also learn five strategies for using Flash in your next storage project. In that classic For Dummies style, you’ll get some useful tips on how to best incorporate flash in your IT environment.
Tags : 
    
NetApp
Published By: Google Apigee     Published Date: Jun 08, 2018
A must-read for IT professionals that provides a comprehensive analysis of the API management marketplace and evaluates 22 vendors across 15 essential criteria. APIs are the de-facto standard for building and connecting modern applications. But securely delivering, managing and analyzing APIs, data and services, both inside and outside an organization, is complex. And it’s getting even more challenging as enterprise IT environments grow dependent on combinations of public, private and hybrid cloud infrastructures. Choosing the right APIs can be critical to a platform’s success. Likewise, full lifecycle API management can be a key ingredient in running a successful API-based program. Tools like Gartner’s Magic Quadrant for Full Life Cycle API Management help enterprises evaluate these platforms so they can find the right one to fit their strategy and planning. Apigee is pleased to offer you a complimentary copy of the Gartner report. Access in-depth evaluations of API managemen
Tags : 
    
Google Apigee
Published By: IBM     Published Date: Jan 27, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business.
Tags : 
    
IBM
Published By: IBM     Published Date: Sep 28, 2017
For increasing numbers of organizations, the new reality for development, deployment and delivery of applications and services is hybrid cloud. Few, if any, organizations are going to move all their strategic workloads to the cloud, but virtually every enterprise is embracing cloud for a wide variety of requirements. This paper outlines what readers should consider when making a strategic commitment to a database platform that will act as a bridge from legacy environments to the cloud.
Tags : 
bridging the cloud, database, hybrid cloud, cloud organization, strategic commitment
    
IBM
Published By: IBM     Published Date: Sep 28, 2017
Welcome to the era of the digital enterprise, where digital is your journey and cognitive is your destination. As business leaders, you are under growing pressure to use information to its fullest potential, delivering new customer experiences as fuel for business growth. The digital economy is changing the way we gather information, gain insights, reinvent our businesses and innovate both quickly and iteratively A hybrid cloud environment, combining traditional IT systems and public cloud, enables you to extend business processes beyond the walls of your organization. For example, many organizations use public cloud as a collaborative development environment to create innovative applications that can then be ported to an on-premises or hybrid production environment.
Tags : 
cognitive era, digital, database, hybrid cloud environment, public cloud
    
IBM
Published By: Oracle     Published Date: Jan 28, 2019
For more than a decade, Oracle has developed and enhanced its ZFS Storage Appliance, giving its users a formidable unified and enterprise-grade storage offering. The latest release, ZS7-2, boasts upgraded hardware and software and is a timely reminder that more users might do well to evaluate this offering. It has a trifecta of advantages: (1) It’s notable performance, price-performance, and flexibility are all improved in this new release (2) There is a surprisingly inclusive set of functionalities, including excellent storage analytics that were developed even before analytics became a contemporary “must-have” (3) There’s a compelling group of “better together” elements that make ZFS Storage Appliance a particularly attractive choice for both Oracle Database environments and users that want to seamlessly integrate a cloud component into their IT infrastructure. Given the proven abilities of Oracle’s prior models, it’s also safe to assume that the new ZS7-2 will outperform other m
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.