deployment model

Results 1 - 25 of 129Sort Results By: Published Date | Title | Company Name
By: Alight Solutions     Published Date: Jul 17, 2018
As much as moving to the Cloud has been a hot trend over the past several years with Human Capital Management systems, in today’s world, financial management systems are not far behind. We’re starting to see the activity significantly ramp up within the financial management system space. So much so, that according to research done by Gartner, the Cloud is expected to become the dominant deployment model across all areas of financial management applications by 2025. Spending on cloud or SaaS-based applications will increase from 30% of the total market spend in 2015 to 47% by 2020. So which financial systems are organizations shifting to the cloud model and why is this happening—aside from following the trend in HR? Download now to learn more -
Tags : 
     Alight Solutions
By: AppDynamics     Published Date: Dec 10, 2014
As the APM market landscape continues to change, older legacy solutions are losing stake to newer, more efficient APM solutions.
Tags : application performance, it leaders, delivery and deployment models, analytics, saas delivery
     AppDynamics
By: Arbor     Published Date: Mar 13, 2014
All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.
Tags : arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud, cloud migration, high-bandwidth attacks, volumetric attacks, deployment, multi-vector threat, ips solutions, deployment models, security
     Arbor
By: Avaya     Published Date: Mar 22, 2019
Infusing communications into business processes is not a simple task, as legacy deployment models for unified communications and the contact center are far too rigid to offer the required agility for digital organizations. To achieve success in the digital era, businesses must evolve their communications to a cloud delivery model. Dive into this white paper from ZK Research to discover the best path forward on your cloud transformation journey.
Tags : 
     Avaya
By: AWS     Published Date: Oct 07, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
     AWS
By: CA Technologies EMEA     Published Date: Sep 11, 2018
The ‘80s Called… … And they don’t want their enterprise Project and Portfolio Management (PPM) tools back. If your Project Management Office (PMO) is still relying on the same or similar processes and systems used when neon and mullets were trending, it will never keep pace with today’s market demands or shifts in technology. Six-month deployment schedules and command and control models of yesteryear are actively being replaced with continuous delivery methods and practices like agile and lean—all in the interest of driving greater customer engagement.
Tags : 
     CA Technologies EMEA
By: CDW     Published Date: Apr 04, 2016
Cloud computing is increasingly being adopted as a way for IT organizations to decrease costs, improve efficiency, and enhance business agility. NetApp has been helping companies succeed in cloud deployment to achieve tangible results since long before the term cloud entered the popular lexicon. NetApp has the people, technologies, and partnerships in place to help organizations evolve existing IT infrastructure into an efficient cloud-based service delivery model. The NetApp® Unified Storage Architecture and clustered Data ONTAP® operating system integrate all storage capabilities into a single, easy-to-use platform. By choosing NetApp when making the transition to a private cloud or a hybrid cloud, organizations will be able to meet their storage business needs now and in the future.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology, storage management, data management
     CDW
By: CDW - NetApp     Published Date: Apr 07, 2016
Cloud computing is increasingly being adopted as a way for IT organizations to decrease costs, improve efficiency, and enhance business agility. NetApp has been helping companies succeed in cloud deployment to achieve tangible results since long before the term cloud entered the popular lexicon. NetApp has the people, technologies, and partnerships in place to help organizations evolve existing IT infrastructure into an efficient cloud-based service delivery model. The NetApp® Unified Storage Architecture and clustered Data ONTAP® operating system integrate all storage capabilities into a single, easy-to-use platform. By choosing NetApp when making the transition to a private cloud or a hybrid cloud, organizations will be able to meet their storage business needs now and in the future.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology, storage management, it management, data management
     CDW - NetApp
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Traditional security solutions can’t keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter today’s evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.
Tags : user protection, security, cloud, endpoint, application, network, networking, it management
     CDW-Trend Micro
By: Cisco     Published Date: Jan 05, 2015
The Cisco UCS solution provides all management and configuration services at the centrally located Fabric Interconnects, so you can manage large-scale deployments from a single location. This method lets you consolidate hardware and streamline management. The IBM Flex System solution uses a distributed management model with chassis-level control. This method adds to the complexity to the hardware configuration, which can increase management needs.
Tags : datacenter, data management, collaborations, business capabilities
     Cisco
By: Cisco     Published Date: Apr 10, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases. There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : cisco, byod, wifi, wireless, wlan, productivity, productivity
     Cisco
By: Cisco     Published Date: May 14, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, cisco
     Cisco
By: Cisco     Published Date: Aug 27, 2015
Learn about the latest top unified communication trends and how others are planning for the future.
Tags : unified communication, communication trends, midsize business, byod, bring your own device, mobility, it management, workforce management, telecommunication, deployment models, cloud integration, security requirements
     Cisco
By: Cisco     Published Date: Nov 18, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : cisco, design summary, byod, network, networking, enterprise applications
     Cisco
By: Cisco     Published Date: Dec 04, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : cisco, design, byod, deployment, networking, it management
     Cisco
By: Cisco     Published Date: Dec 07, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : cisco, design, byod, deployment, networking, software development
     Cisco
By: Cisco     Published Date: Feb 23, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : business models, development, business solutions
     Cisco
By: Cisco     Published Date: Jun 21, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : 
     Cisco
By: Cisco     Published Date: Dec 21, 2016
This part of the CVD describes design considerations to implement a successful BYOB solution and different deployment models to address diverse business cases
Tags : 
     Cisco
By: Cisco     Published Date: Dec 11, 2018
WAN edge infrastructure is changing rapidly as I&O leaders responsible for networking face dynamic business requirements, including new application architectures and on-premises and cloud-based deployment models. I&O leaders can use this research to identify vendors that best fit their requirements. By year-end 2023, more than 90% of WAN edge infrastructure refresh initiatives will be based on virtualized customer premises equipment (vCPE) platforms or software-defined WAN (SD-WAN) software/appliances versus traditional routers (up from less than 40% today).
Tags : 
     Cisco
By: Cisco     Published Date: Dec 11, 2018
You need to be ready to host any application anywhere. Our solution adapts to support all of your applications with the simplicity of hyperconvergence. If your IT organization is like most, you are stretched thin to support your developers as they create multicloud-native applications that they deploy across public and private clouds. And you still need to support line-of-business managers with traditional applications as they use both monolithic and cloud deployment models. I would like to receive email communications about products & offerings from Cisco & its Affiliates. I understand I can unsubscribe at any time. For more information on how Cisco collects and uses personal information, please see the Cisco Online Privacy Statement.
Tags : 
     Cisco
By: Cisco     Published Date: Dec 20, 2018
Cisco® Collaboration Flex Plan gives you access to Cisco’s collaboration products, allowing you to mix and match buying models and deployment models in a single subscription depending on your buying needs. One subscription covers entitlement and technical support for: (a) the cloud services Cisco Webex® Meetings, Cisco Webex Calling, Cisco BroadCloud Calling, and Cisco Webex Teams and (b) the software Cisco Unified Communications Manager and Cisco Meeting Server.
Tags : 
     Cisco
By: Darktrace     Published Date: Sep 04, 2019
Michael Sherwood, CIO of City of Las Vegas, explains how implementing Darktrace’s Enterprise Immune System with its autonomous defense capability fundamentally transformed his team’s cyber security posture. Whether upstream, midstream, or downstream, Darktrace can be deployed to protect oil and gas production and transportation. Remote deployments on rigs can include local modeling and analysis, as well as central correlation for security monitoring of all assets. Darktrace appliances can support low-bandwidth and inhospitable environments through the use of ruggedized industrial probes. With Darktrace’s Industrial Immune System, the entire infrastructure is visualized and protected, including Industrial IoT and ICS.
Tags : 
     Darktrace
By: Dell     Published Date: Oct 20, 2008
Dell has improved PC deployment activities through patent-pending automation technology and offers an array of services from planning a Windows Vista migration to post-deployment management.
Tags : dell, deploying vista, dell deployment framework, dell deployment model, deployment automation toolset, optimized deployment, security, software development, platforms
     Dell
Start   Previous   1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com