HIT Consultant Insightful coverage of healthcare innovation
 

stack

Results 201 - 225 of 332Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Aug 14, 2014
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking
    
McAfee
Published By: VMTurbo     Published Date: Jul 08, 2015
This E-Book covers a brief history of the OpenStack cloud operating system, its releases and projects, significant enterprise adoptions, and the function and contributions VMTurbo.
Tags : 
cloud strategy, cloud operating systems, enterprise adoption, database management, business integration, web interface, application management, software licensing
    
VMTurbo
Published By: Intel Security     Published Date: Jan 20, 2015
It's important to identify the right features for your enterprise when evaluating next generation firewalls. Key points include ease of use, centralized management, integrated VPN, high availability, and the ability to stop advanced, sophisticated attacks. Read this latest SANS report as they look in depth at the McAfee Next Generation Firewall as see how it stacks up against demanding enterprise requirements.
Tags : 
sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall
    
Intel Security
Published By: Intel Security     Published Date: Jan 20, 2015
Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking
    
Intel Security
Published By: Dell EMC     Published Date: May 29, 2015
If you are considering Hybrid Cloud, tune in to this revealing conversation with EMC’s Chad Sakac and Wikibon Analysts, Dave Vallente and Stu Miniman. Great insight on virtualization, Openstack, and the future of cloud computing plus informative details on EMC Enterprise Hybrid Cloud
Tags : 
hybrid cloud, hardware, software, hardware, service center, application integration, business intelligence, data quality, productivity, cloud computing
    
Dell EMC
Published By: Dell EMC     Published Date: Jul 27, 2015
If you are considering Hybrid Cloud, tune in to this revealing conversation with EMC’s Chad Sakac and Wikibon Analysts, Dave Vallente and Stu Miniman. Great insight on virtualization, Openstack, and the future of cloud computing plus informative details on EMC Enterprise Hybrid Cloud.
Tags : 
wikibon, emc, virtualization, hybrid cloud, cloud computing
    
Dell EMC
Published By: Cherwell Software     Published Date: Jan 28, 2019
The Twelve ITSM Providers that Matter Most—and How they Stack Up Forward-thinking IT teams know that to maintain a seat at the table, their approach to service management must transcend traditional silos. In Forrester's report, you’ll receive valuable analyst insight into which of the twelve market-leading service management tools can best support not only your current ITSM requirements, but also your initiatives to extend and improve service delivery across the business.
Tags : 
    
Cherwell Software
Published By: QuickPivot     Published Date: Jan 28, 2016
As our framework for channels and devices continues to broaden, so, too, does the strategy and technology stack needed to deliver the right content.
Tags : 
quickpivot, iot, content strategy, omnichannel, multichannel, marketing solutions
    
QuickPivot
Published By: QuickPivot     Published Date: Aug 02, 2016
How to evaluate vendor technology and services to make your organization stronger
Tags : 
quickpivot, marketing, social media, campaigns, partner strategy, vendors, business objectives, marketing strategy, big data, marketing technology stack, customer experience, personalization, predictive analytics
    
QuickPivot
Published By: CDW-Lenovo     Published Date: Oct 15, 2015
This document is the Lenovo reference architecture (RA) for OpenStack from Red Hat Enterprise Linux OpenStack Platform. The RA focuses on achieving optimal performance and workload density using Lenovo hardware while minimizing procurement costs and operational overhead. The document shows different operational models using a variety of Lenovo servers and networking products with design considerations and guidance on how to size each part of the solution. Some examples of different reference designs are provided together with an appendix containing the hardware bill of materials.
Tags : 
    
CDW-Lenovo
Published By: Avi Networks     Published Date: Mar 25, 2016
This white paper examines the challenges of guaranteeing application performance in OpenStack-based cloud environments and looks at new alternatives to traditional application delivery solutions.
Tags : 
avi networks, openstack, application delivery, cloud computing services
    
Avi Networks
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: ThousandEyes     Published Date: Nov 17, 2016
The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services has increased the complexity application delivery. Online Operations and Site Reliability teams in firms of all types are now responsible for many parts of the application delivery chain. When things go wrong, no matter where, they’re expected to react quickly to minimize the impact on their customers. The challenge for application providers is that users may often experience service degradation when the application stack seems to be working perfectly fine, making troubleshooting extremely difficult. Download now to learn more!
Tags : 
    
ThousandEyes
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: Carbonite     Published Date: Feb 22, 2017
Download Research Now’s summary to see how competing cloud backup providers stack up against one another in business customer satisfaction.
Tags : 
backup and recovery, backup survey, business backup, computer backup, cloud backup, cloud recovery, data backup, data recovery, data protection, disaster recovery, hybrid backup, hybrid data protection, hyper-v backup, on-site backup, on-premises backup, recovery plan, remote backup, vm backup
    
Carbonite
Published By: NodeSource     Published Date: Nov 10, 2017
Digital transformation is “the use of technology to radically improve performance or (business) reach. But for digital-native businesses that have never needed to make that shift — e-commerce, social media, web-based services — it involves a sharpening of that focus combined with an ongoing evolution of process and infrastructure.
Tags : 
nodesource, xml, software development, digital transformation, open source, web applications, web development, java, .net, soap
    
NodeSource
Published By: Adverity     Published Date: Jun 15, 2018
A Beginner's Guide to Marketing Data Analytics Marketing Data is big & highly fragmented Big data is messy. It’s scattered across platforms, it’s diverse, and in its raw form, it’s practically unusable. We know, it’s a painful truth. The fact of the matter is that having a lot of data doesn’t necessarily mean that you have the answers to your most pressing questions. Looking for the most relevant bits in your pile of big data is like looking for a needle in a haystack. But don't you worry - we are here to help. This handy e-book will give you a short overview what quality matters, why data is so important and what you need to pay attention to. Best thing is: getting this ebook is super easy. Just fill out the form to the right and voilá - your download is ready. Enjoy this read!
Tags : 
marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics, marketing reports, roi reporting, reporting generator, automated reporting tool, marketing dashboard, marketing data, marketing intelligence, report software, marketing reporting, marketing metrics, performance marketing, marketing performance
    
Adverity
Published By: Oracle     Published Date: Aug 19, 2016
In this white paper, Oracle shows its intent to compete on all fronts.
Tags : 
    
Oracle
Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing, data breach, breach
    
Rapid7
Published By: Engagio     Published Date: Jun 28, 2018
ooking for an Account Based Marketing solution? Read The Forrester New Wave™: ABM Platforms, Q2 2018 2018 Forrester Wave Report to learn why Engagio was named a strong performer. Customers praised Engagio’s ability to orchestrate marketing and sales motions as well as the breadth and depth of its analytics and assessment capabilities. Read to discover: - The 14 ABM providers that matter the most and how they stack up - How to select the right technology partner for your ABM needs - The Forrester ABM platform evaluation criteria used - Why Engagio was named a Strong Performer
Tags : 
    
Engagio
Published By: Sponsored by HP and Intel®     Published Date: May 13, 2013
Learn more about this offering that includes a self-service infrastructure portal for quick auto-provisioning, along with built-in infrastructure lifecycle management to optimize infrastructure, manage the resource pools, and help ensure uptime. CloudSystem Matrix is integrated by design with broad support of heterogeneous environments, including VMware, Microsoft® Hyper-V, and KVM through OpenStack as an enabling technology that manages and provisions virtual machines to the Red Hat KVM hosts.
Tags : 
    
Sponsored by HP and Intel®
Published By: Tealium     Published Date: Feb 20, 2015
Unify Your Marketing Technology and Data–It’s Easy Download our free guidebook, “Build Your Own Marketing Cloud™,” to learn how to maximize your technology investments and drive superior cross-channel experiences.
Tags : 
tealium, marketing, technology, cloud, tag management, stack, data, advertising, digital
    
Tealium
Published By: Tealium     Published Date: Feb 20, 2015
Marketing Complexity Got You Down? Download our new guidebook: “How to Tame the Digital Marketing Beast™.”
Tags : 
tealium, marketing, technology, cloud, tag management, stack, data, advertising, digital
    
Tealium
Published By: Tealium     Published Date: Jun 15, 2015
Marketing nirvana is all about driving consistent, real-time customer interactions across all digital touch points. See how Ancestry.com is using Tealium to make this long-held goal a reality.
Tags : 
tealium, marketing, technology, cloud, tag management, stack, data, advertising, digital, fragmented data, unification
    
Tealium
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.