red hat

Results 176 - 200 of 2297Sort Results By: Published Date | Title | Company Name
By: Gigamon     Published Date: Oct 25, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
     Gigamon
By: Infosys     Published Date: May 30, 2018
An acquisition can often lead to several structural and strategic changes at both the parent company and the acquired company. Leveraging the opportunity to modernize and adopt new technologies is something the acquirer company must consider in order to reduce the complexities of merging and managing two diverse environments. A leading motor manufacturer was trying to figure out the best way to integrate an acquired company’s infrastructure, and realized that application migration to cloud was the best option. See how Infosys helped and the five key takeaways from the project.
Tags : acquisition, opportunity, modernize, structural, management
     Infosys
By: IBM     Published Date: Jun 29, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
     IBM
By: Riverbed     Published Date: Jan 25, 2018
"Visibility into the live mix of network and application activity being hosted and delivered by the IT infrastructure has always is a 'must-have' for many aspects of IT planning and operations. But the greatest value and impact is achieved when those two viewpoints are blended together into one unified view. This paper reviews the primary challenges that IT teams face in establishing unified visibility, the key requirements that management solutions must meet to address those challenges, and examines a Riverbed solution that has been specifically designed to offer a path to success."
Tags : 
     Riverbed
By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
     Akamai Technologies Australia
By: Dell PC Lifecycle     Published Date: Aug 13, 2018
Your business may need to keep track of dozens of different initiatives—but that doesn’t mean you need dozens of separate storage solutions to get the job done. To reduce complexity, your business may consider storage solutions that can take care of multiple jobs at once without sacrificing performance. For example, if you operate a brick-and-mortar store and an online store, you should be able to retrieve customer data from both sources without compromising transactional database performance. The all-flash Dell EMC™ SC5020 storage array aims to be just such a solution.
Tags : 
     Dell PC Lifecycle
By: Dell PC Lifecycle     Published Date: Aug 13, 2018
Your business may need to keep track of dozens of different initiatives—but that doesn’t mean you need dozens of separate storage solutions to get the job done. To reduce complexity, your business may consider storage solutions that can take care of multiple jobs at once without sacrificing performance. For example, if you operate a brick-and-mortar store and an online store, you should be able to retrieve customer data from both sources without compromising transactional database performance. The all-flash Dell EMC™ SC5020 storage array aims to be just such a solution.
Tags : 
     Dell PC Lifecycle
By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
     Limelight Networks
By: Limelight Networks     Published Date: Mar 02, 2018
Your online audience expects fast, flawless, secure experiences on any device in any location, every time. But whether you are delivering videos, your website, music, software or games, ensuring engaging online experiences from an increasing variety of devices around the world is a huge challenge. Content delivery networks (CDNs) can significantly improve the user experience of your online audiences. But not all CDNs deliver the same level of service. Dos and Don’ts of Evaluating and Deploying a CDN provides tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs. Download this guide to learn: The four major performance factors that can affect user experience Why speed alone isn't an accurate measure of performance How a content audit can identify performance bottlenecks The role content storage can play in reducing costs and latency How to decide what features are most important to your business
Tags : content delivery network, cdn, web performance, web acceleration, digital content delivery, ddos protection, ddos, web application security, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
     Limelight Networks
By: Dell EMC & Intel     Published Date: Mar 16, 2018
Transforming IT to meet the emerging requirements of a rapidly advancing digital economy is a priority for most companies today. Market economies and quickly evolving digital interactions are driving new and increasing demands on IT infrastructure for organizations of all kinds – from small businesses to enterprises to public institutions. IT requirements to support a variety of digital use paradigms (personal devices, IoT, VMs, VDI) are changing quickly, and organizations need to respond in order to be competitive in this evolving digital world. The latest generation of PowerEdge servers powered by Intel® Xeon® processors can deliver differentiated business agility over older-generation infrastructure. IDC asserted that updating servers can help businesses deploy applications up to 22 percent faster and improve application performance up to 29 percent over outdated infrastructure. Intel Inside®. New Possibilities Outside.
Tags : 
     Dell EMC & Intel
By: Dell EMC & Intel     Published Date: Mar 16, 2018
The pace of business is lightning fast. Technology runs faster – and customers want service even faster still. To keep up with the demands of a company in this age, you need hardware infrastructure capable of supporting large amounts of work with a more responsive experience. Our work in the Principled Technologies datacenter showed that the 14th generation Dell EMC™ PowerEdge™ R720xd could deliver just that. Intel Inside®. New Possibilities Outside.
Tags : 
     Dell EMC & Intel
By: Dell EMC & Intel     Published Date: Mar 16, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
     Dell EMC & Intel
By: Dell EMC & Intel     Published Date: Aug 03, 2018
IDC interviewed organizations that have deployed Dell EMC VxRail and VxRack hyperconverged solutions powered by Intel® Xeon® Platinum processor to support their expanding IT and business operations. Study participants reported that Dell EMC HCI solutions serve as a foundation for innovation across their distributed organizations by providing a cost-effective, agile, and high-performing IT infrastructure foundation. The result is that these organizations are realizing a 619% five-year return on their investment in Dell EMC HCI solutions, which IDC puts at a value of $150,776 per 100 users per year, resulting in a six-month payback period.
Tags : 
     Dell EMC & Intel
By: gyro     Published Date: Sep 11, 2018
Although humor is featured in many of the most memorable ads of all time, it is still seldom seen in the world of business-to-business. Why? B-to-B professionals are afraid humorous ads may fall flat or — worse — damage brand image. In the first study of its kind, gyro and Research Now SSI have discovered that humor can be a powerful tactic for capturing attention and even prompting purchase consideration.
Tags : 
     gyro
By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
     Dome9
By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
     Dome9
By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
     Dome9
By: B Channels     Published Date: Apr 27, 2018
We understand how IIoT (IoT Segment) solutions are designed and delivered through discrete ecosystems, we are able to work with IIoT vendors to identify routes to market, align programs, and partner engagements. We identify, recruit and nurture IIoT ecosystems that drive IIoT sales and delivery
Tags : 
     B Channels
By: KPMG     Published Date: Jul 12, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now
Tags : 
     KPMG
By: Workday Spain     Published Date: Sep 19, 2018
People analytics is increasingly on the agenda for organisations. With the rise of workplace technology allowing leaders to track employees’ performance, productivity and wellbeing, we partnered with the CIPD to survey over 3,000 business professionals to understand how people analytics is being used. And the results are in. 65% of respondents who work in an organisation with a strong people analytics culture, say their business performance is strong compared to competitors. As well as outlining the key opportunities leaders can capitalise on, this report covers: - How different professions are using people data - The various types of people data that are being used - How people analytics adds value to organisations - What the future holds for people data
Tags : 
     Workday Spain
By: T Systems     Published Date: Nov 19, 2018
If only there was a whitepaper that could explain how digitalization is changing the retail landscape while advising retailers on how they can embrace this driving force to excel in the industry. Here at T-Systems, we have produced a whitepaper that provides a detailed look into what is required for your retail business to succeed in the digital age. Our ‘Shaping Retail’s Future, Understanding & Delighting Customers in The Digital Era’ provides you with the means to safely navigate and prosper from the effect that digitization is having upon the industry. In a retail world that demands engaging with an ever more sophisticated level of consumer, those whom exhibit less brand loyalty year-on-year – the window for error has become decisively small. Our whitepaper enables your business to identify your digital needs for more effective retail operations by asking critical questions to reveal and plug your capability gaps. We examine the importance of developing the right omnichannel strateg
Tags : retail, sales, whitepaper, t-systems, omnichannel, data analytics, touchpoints, digitization, iot
     T Systems
By: SAP Ariba     Published Date: Oct 11, 2018
Over the next 10 years, companies will face more opportunity and disruption than ever before. Digital transformation is already helping companies redefine their business models, operating processes, and work – and this trend will accelerate as powerful technologies mature. Given that up to 65% of the value of a company’s products or services is derived from its suppliers1, procurement will play a leading role in enabling this transformation.
Tags : 
     SAP Ariba
By: Preempt     Published Date: Nov 02, 2018
Enterprises and the threats that target them have all fundamentally evolved over the past decade. In response, the security industry has generated an enormous amount of point solutions and technologies to try and keep pace. However, for all of this innovation and change, the underlying enforcement architecture has remained largely unchanged. A new modern approach to preempting threats is required. One that augments the existing architecture instead of replaces it. This new approach brings full enterprise and business context to real-time enforcement decisions. Identity, behavior, devices, anomalies, and risk all play a real-time role. Just as importantly, enforcement and access options can be graded based on the risk to the business, and policies can actively seek out and adapt to new information.
Tags : 
     Preempt
By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
     Preempt
By: Dell EMC EMEA     Published Date: Nov 23, 2018
Enterprise PC Buying Patterns Are Changing As Buyers Look To Improve Both Security And The Employee Experience At Once As employee mobility increases globally and enterprise investments shift to tablets and laptops, organizations are assessing their ongoing investment in traditional PCs. One thing that remains clear is that enterprise PC buyers still value the security and performance offered by fixed computing solutions. They also say that new form factors like the micro PC help them deliver a better experience to employees, which they value at least as much as security. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell EMC EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com