cloud control

Results 226 - 250 of 331Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since last year’s SANS cloud security survey, “Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.” To learn more, get the full SANS report.
Tags : cloud security, cloud data center, sans survey
     McAfee
By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
     McAfee
By: Sponsored by HP and Intel®     Published Date: May 10, 2013
Cloud computing has emerged as one of the prevailing IT trends today. By providing greater levels of provisioning and automation, cloud computing can help organizations become more nimble, reduce operating costs, improve application performance, and better allocate their compute resources. It enables organizations to more flexibly scale their IT infrastructure while reducing the administrative burden on IT organizations. But IT departments determined to take advantage of these benefits are at risk of losing control of their infrastructure. Read this white paper to understand how the HP CloudSystem Matrix is an integrated IT infrastructure solution that meets this challenge head-on, enabling organizations to simplify their IT infrastructure, reduce their management burden, and streamline operating costs. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other count
Tags : delivering, cloud, integrated infrastructure, hp cloudsystems, operating costs, enabling organizations, it management, enterprise applications, data management
     Sponsored by HP and Intel®
By: Internap     Published Date: Dec 29, 2011
Performance plays a vital role in the success of your online applications and web-based content - whether you are processing millions of transactions, delivering business-critical software or servicing a massive gaming community. Research shows that even one second of delay on a typical website can result in 7% fewer customer conversions. For many businesses, that means lost revenue and damage to their brand. As cloud is becoming an increasingly viable infrastructure choice for enterprise applications, it is essential to select a high-performance cloud service that will support the best possible experience for your end users. Determining the right cloud solution for your needs also necessitates thorough analysis of the level of security, control, customization and support your business requires. In this webcast, thought leaders from Gartner and Internap outline the performance factors that affect your cloud decision-making process and discuss how to optimize your IT Infrastructure to create satisfied end users.
Tags : enterprise cloud, cloud computing, technology, cloud solution
     Internap
By: Box.net     Published Date: Jun 27, 2012
How macro trends are changing enterprise collaboration and content sharing requirements and expectations.
Tags : cloud content, active content, macro trends, enterprise collaboration, content sharing
     Box.net
By: Mimecast     Published Date: May 20, 2009
Mimecast delivers Software-as-a-Service based enterprise email management including archiving, discovery, continuity, security and policy. By unifying disparate and fragmented email environments into one holistic service that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email.
Tags : mimecast, saas, software as a service, rto, email archive, seamless, medium-size business, zhara, compliance, esg, webmail, storage capacity, storage
     Mimecast
By: GoToWebinar     Published Date: Aug 01, 2011
Watch this on-demand webinar to hear pioneer presentation innovator Nancy Duarte, CEO of Duarte Design, demonstrate how to apply the methods in her book, Resonate: Presenting Visual Stories That Transform Audiences, to build meaningful connections with audiences that compel them to action. Her groundbreaking work details a new way of structuring presentations that helps the presenter create a human connection with audiences.
Tags : gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
     GoToWebinar
By: GoToWebinar     Published Date: Aug 02, 2011
This new white paper identifies strategies for maximizing your webinar program, uncovers key trends related to the benefits and use of webinars and provides valuable insights from survey respondents and other industry experts.
Tags : gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
     GoToWebinar
By: GoToWebinar     Published Date: Aug 02, 2011
This Webinar Success white paper provides guidelines on how to produce and manage successful Webinars - from the first (and most important) step of defining purpose and expectations to quantifying results after the event.
Tags : gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
     GoToWebinar
By: GoToWebinar     Published Date: Aug 02, 2011
This eBook explores how organizations can connect and nurture relationships with prospects and customers by effectively leveraging social media and real-time collaboration tools.
Tags : gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
     GoToWebinar
By: GoToWebinar     Published Date: Aug 02, 2011
A recent MarketingSherpa Webinar on the topic of high-conversion content uncovered five burning questions from participants about specific types of content. This brief explores these questions and offers advice and strategies for content creation and distribution.
Tags : gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
     GoToWebinar
By: GoToWebinar     Published Date: Aug 02, 2011
This new eGuide outlines best practices for creating and delivering a successful Webinar series that gives your organization a solid competitive edge.
Tags : gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
     GoToWebinar
By: GoToWebinar     Published Date: Aug 02, 2011
This MarketingSherpa white paper explores how to optimize your lead nurturing campaign with five steps to boost conversions and includes a case study that reveals how one company was able to revive a cold prospect list.
Tags : gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
     GoToWebinar
By: Silver Peak     Published Date: Jun 24, 2013
Enterprises are relying on WANs to carry more data than ever. With cloud computing, offsite disaster recovery and big data on the rise, it's more important than ever for IT professionals to boost application performance across the WAN. However, times are changing. Instead of deploying a physical WAN optimization appliance to improve application performance, the industry is moving to a better approach - virtual WAN acceleration software. It can be downloaded in minutes, runs almost anywhere, and controlled with the click of a mouse for maximum flexibility. In this report we not only explore the requirements for virtual WAN optimization but compare how Silver Peak's virtual WAN acceleration stacks up against Riverbed's physical Steelhead appliance.
Tags : enterprises, cloud computing, offsite disaster recovery, big data, technology, virtual wan, software, optimization, application, security, storage
     Silver Peak
By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security
     Intralinks
By: Cisco Systems     Published Date: Dec 23, 2013
Faced with trends like cloud and the rapid rise of mobile devices, IT needs a new, simpler model of building networks to support and optimize applications. In this Lippis Report, learn how the Cisco ISR Application Experience Router helps you improve application speed, security, and control. Read Now
Tags : cisco, lippis, centric networking, cloud computing, network engineers, bandwidth, wan, wide area networks, mobile devices, network building, networking, enterprise applications
     Cisco Systems
By: Dyn     Published Date: Jul 29, 2015
In this O'Reilly report, author Andy Still points out: • How the advantages of using cloud-based systems outweigh the disadvantages • How you can closely monitor system elements that you don’t control, with Real User Monitoring (RUM) and other tools • How to use a CDN and cache data as close to users as possible • How to architect your systems to gracefully handle potential cloud service failures
Tags : optimization, cloud, infrastructure, web operations, cloud migration, real user monitoring, cdn, cloud service failures
     Dyn
By: Dyn     Published Date: Nov 10, 2015
Read this O’Reilly report to learn the latest rules and recommendations to architecting your cloud instance, debunk the common fears to cloud adoption and discover how to gain back control in areas you didn’t realize you could.
Tags : dyn, performance optimization, cloud, o'reilly report, web experience, data management, data center
     Dyn
By: HP Enterprise Services     Published Date: Mar 25, 2014
HP helped plan and deliver secure, next generation infrastructures for Kraft Foods Inc.’s launch as two independent public companies. Read how this fast-paced drive toward business agility through client virtualization and a versatile cloud architecture lowered operational costs, increased efficiencies, and improved resource control; giving the two giant “start-ups” the ability to be immediately productive.
Tags : disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security, enterprise applications
     HP Enterprise Services
By: Aerohive Networks     Published Date: May 27, 2014
Learn about two approaches for efficient WLAN design and see how you can seamlessly integrate 802.11ac into your WLAN in order to lay the foundation for the future of high-speed technologies.
Tags : aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access, software development, it management
     Aerohive Networks
By: Aerohive Networks     Published Date: May 27, 2014
Learn about the 10 requirements needed for optimizing your network for mobility and see the potential issues IT faces in a mobile-first enterprise and the advantages of framing the problems properly for long-term success and effectiveness.
Tags : aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access, it management
     Aerohive Networks
By: Aerohive Networks     Published Date: May 27, 2014
Learn how a controller-less wireless architecture will provide significant benefits over the traditional-controller-based model in terms of deployment simplicity, ongoing management, and cost..
Tags : aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access, it management
     Aerohive Networks
By: Soonr     Published Date: Sep 03, 2014
Business happens at the speed of “right now” across departmental, physical, geographical and organizational lines. Secure, anywhere, anytime access to the most up-to-minute business content ensures that employees, partners and customers can do business faster. Neither remote VPN access nor cloud-only sharing solutions provide the flexibility, security, and universal access required to support today’s business. What’s needed is a solution that offers the benefits of cloud-based file access along with the control and manageability of local file systems. Discover the Soonr Hybrid Cloud Sync and Share Solution that preserves existing file server infrastructure, while delivering complete mobile file sharing and collaboration capabilities.
Tags : soonr, cloud, sync and share, security, solutions, business support, vpn access, cloud sharingsoonr, network storage, file sharing, cloud file sharing, hybrid cloud, mobile file sharing, efss, it management, hybrid it, sync and share, vpn access, networking
     Soonr
By: VMware AirWatch     Published Date: Dec 08, 2016
Today’s workforce accesses corporate content from the office, home, and everywhere in between. They utilize non-Windows devices including iOS, Android and Mac, and demand that IT support the specialized apps they need to get the job done. Savvy organizations have embraced desktop and application virtualization to meet these demands. Download this asset to learn how Horizon Cloud with on-premises infrastructure represents a new approach to building, delivering and managing virtual workspaces. This radically simple and scalable service unifies the management of on-premises virtual workspace services (desktops and applications) through a centralized cloud control plane, enabling delivery of virtual desktops and apps for as little as $0.50/user.
Tags : 
     VMware AirWatch
By: OKTA     Published Date: Mar 30, 2018
"The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling access to applications becomes increasingly important. CIOs and their teams have a whole new set of identity management challenges; their role is also fundamentally changing. As the steward of these new services, IT must provide insight and advice about Software-as-a-Service (SaaS) products to ensure the company gets the highest business value of their investments. Read this eBook to learn eight main identity and access management (IAM) challenges of adopting and deploying cloud applications. And, most importantly, best practices for addressing each of them."
Tags : 
     OKTA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com