file servers

Results 1 - 25 of 34Sort Results By: Published Date | Title | Company Name
By: AppSense     Published Date: Oct 30, 2006
Terminal servers, file servers, print servers, database servers, email servers and application servers. Dr. Bernhard Tritsch explores how to manage servers effectively within the dynamic enterprise.
Tags : servers, server environments, server hardware, server management, network management, database server, appsense, platforms
     AppSense
By: AppSense     Published Date: Nov 26, 2012
Download this case study to learn how Chandler Macleod's CIO was able to utilize the AppSense solution to remove the possibility of any users introducing an executable file to their network while reducing the number of their servers by 25%.
Tags : appsense, license compliance, security, application licensing, application security, reduce servers, application management
     AppSense
By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : arcserve, unified data protection, software download, bandwidth, deduplication, it management, enterprise applications
     Arcserve
By: BlueArc Corporation     Published Date: Apr 24, 2008
BlueArc’s Titan Architecture creates a revolutionary step in file servers by creating a hardware-based file system that can scale throughput, IOPS and capacity well beyond conventional software-based file servers. With its ability to virtualize a massive storage pool of up to 4 petabytes of usable, tiered storage, Titan can scale with growing data requirements and provide a competitive advantage for business processes by consolidating applications while ensuring optimal performance.
Tags : bluearc, storage, titan
     BlueArc Corporation
By: Box     Published Date: Jun 11, 2014
Midsize learning technology company sought to move all files to the cloud for disaster-recovery reasons and to boost employee productivity. Added Box to their existing cloud stack for all employees. Streamlined IT operations; in the process of replacing servers with Box.Technology industry, midsize company, midmarket, global, server replacement, cloud stack, NA, APAC.
Tags : box, rosetta stone, midmarket, midsize companies, disaster recovery, server replacement, employee productivity, it management
     Box
By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : ciso, cybersecurity, esg, it/security, it architecture, it management
     Box
By: Box     Published Date: Jun 22, 2018
• When it comes to the cloud, most businesses have moved from wait-and-see to a "how do we make it happen now?" approach. • But the complexities of moving valuable content from legacy systems to the cloud is still a daunting challenge. That's why some businesses are putting off the move even though they're painfully aware of the limitations of legacy infrastructure like network shares, enterprise content management systems and general purpose file servers. • The good news is the upside of migrating away from legacy infrastructure to a Cloud Content Management platform is far greater than the effort to get there. All you need is a plan. • Our new eBook, From legacy infrastructure to the cloud: A migration journey in 5 steps, gives you a clear, methodical process for migrating your organization to a Cloud Content Management solution.
Tags : 
     Box
By: Carbonite     Published Date: Jul 18, 2018
© 2018 Carbonite, Inc. All rights reserved. Case study Diamond Foods’ Diamond of California® nuts are household staples for shoppers across the U.S. But constantly filling grocery store shelves with snacks requires intricate supply chain management that relies on critical business data, including complex spreadsheets and enterprise resource planning files, to keep production and deliveries on schedule. “If our critical servers go down or we lose important data on employee laptops, it has a direct impact on our bottom line,” says Kentrell Davis, Senior Client Support Services Analyst at Diamond Foods.
Tags : 
     Carbonite
By: Cohesity     Published Date: May 04, 2018
Cohesity provides the only hyper-converged platform that eliminates the complexity of traditional data protection solutions by unifying your end-to-end data protection infrastructure – including target storage, backup, replication, disaster recovery, and cloud tiering. Cohesity DataPlatform provides scale-out, globally deduped, highly available storage to consolidate all your secondary data, including backups, files, and test / dev copies. Cohesity also provides Cohesity DataProtect, a complete backup and recovery solution fully converged with Cohesity DataPlatform. It simplifies backup infrastructure and eliminates the need to run separate backup software, proxies, media servers, and replication. This paper specifically focuses on the business and technical benefits of Cohesity DataPlatform for the data protection use case. It is intended for IT professionals interested in learning more about Cohesity’s technology differentiation and advantages it offers for data protection - (i) Elim
Tags : 
     Cohesity
By: Dell     Published Date: May 13, 2016
Businesses using outdated servers for email, database, and file and print workloads stand to benefit greatly by replacing them. The Dell PowerEdge VRTX with two Dell PwerEdge M630 blase servers, both powered by the Intel Xeon processor E5-2650 v3, can provide the performance, scalability, and high availability your business needs to keep running and meet increased demand.
Tags : 
     Dell
By: Dell EMC     Published Date: May 12, 2016
Businesses using multiple outdated servers for email, database, file and print workloads can benefit greatly by consolidating these workloads onto a single new server and running them in virtual machines. Read this paper and learn how the latest servers powered by Intel® Xeon® processors, can help you free up data center space, reduce power consumption and lower TCO.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: May 12, 2016
Businesses using outdated servers for email, database, and file and print workloads stand to benefit greatly by replacing them. The Dell PowerEdge VRTX with two Dell PwerEdge M630 blase servers, both powered by the Intel® Xeon® processor E5-2650 v3, can provide the performance, scalability, and high availability your business needs to keep running and meet increased demand.
Tags : 
     Dell EMC
By: Dell Software     Published Date: May 10, 2013
Moving server files to a new server with permissions intact can be an awful, manual-intensive process. There is a better approach that puts you in control. Learn about suite of three products that can provide a complete solution to this and other permission-based problems and challenges.
Tags : dell quest, server migration, security permissions, file servers, manual-intensive process, securely migrate files
     Dell Software
By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 and Data Domain have joined their respective solutions, forming a partnership designed to assist customers in deploying and realizing the benefits of tiered storage. By combining F5’s tiered storage policy engine with Data Domain deduplication storage systems, mutual customers can realize the benefits of deploying tiered storage and, importantly, see dramatic reductions in the costs of storage.
Tags : data domain, curb storage costs, file servers, tiered storage, deduplication storage systems, storage
     F5 Networks Inc
By: Group M_IBM Q119     Published Date: Mar 01, 2019
The velocity of technology infrastructure change continues to accelerate, putting serious stress on Security Operations (SecOps). This has forced security folks to face the fact that operations has never really been their forte. That’s a bit harsh, but denial never helps address problems. The evidence is fairly strong that most organizations are pretty bad at security operations. How many high-profile breaches could have been avoided if one of many alerts was acted upon? How many attacks were made possible by not having properly patched servers or infrastructure? How many successful compromises resulted from human error?
Tags : 
     Group M_IBM Q119
By: HP     Published Date: Aug 03, 2009
The usual cure for exploding file volumes is to add more general purpose file servers. That strategy eventually leads to server sprawl, which brings with it more management complexity, stranded disk capacity, wildly differing storage utilization rates and slower file access. Network-attached storage (NAS) appliances can add file serving capacity that's more easily managed, shareable, more scalable and more efficient than a sprawl of general purpose servers. Read this online article to learn about three basic considerations that can help simplify your NAS buying decision.
Tags : nas, network-attached storage, servers, storage
     HP
By: HP and Intel® Xeon® processors     Published Date: Oct 04, 2012
Get help evaluating your next purchases and accelerate the business value of IT as your datacenter continues to evolve. Download this Technical Adoption Profile on How Blade Servers Impact Datacenter Management and Agility from Forrester Research.
Tags : blade servers, datacenter, agility, intel, data center
     HP and Intel® Xeon® processors
By: IBM     Published Date: Jul 02, 2012
Many organizations move a wide variety of sensitive information with file transfer protocol (FTP), and these servers are proving to be easy targets for thieves. Read this paper to learn more about IBM Sterling Managed File Transfer that helps you manage and control the critical information flows in your company's dynamic business networks.
Tags : ibm, ftp, secure file transfer, file, business, business network, technology, business technology
     IBM
By: Intel     Published Date: Apr 16, 2012
Get help evaluating your next purchases and accelerate the business value of IT as your datacenter continues to evolve. Download this Technical Adoption Profile on How Blade Servers Impact Datacenter Management and Agility from Forrester Research.
Tags : cloud, cloud computing, myths, infrastructure, services, it executives, data, intel
     Intel
By: Ipswitch     Published Date: Mar 14, 2014
In this case study, you’ll learn how Rochester General Hospital leveraged MOVEit’s point and click simplicity to set up, manage and track more than 70 different file transfer operations between hospital servers and the systems used by payers and outside healthcare providers.
Tags : ipswitch, moveit, sensitive data, managed file transfer solution, file transfer, file transfer systems, records management, data security
     Ipswitch
By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the new LANDesk® Antivirus solution, available as an add-on to LANDesk® Management Suite and LANDesk® Security Suite, provides a competitively priced, front-line malware and malicious code defense for all network endpoints, including workstations, file servers, mail systems and Internet gateways.
Tags : network security, security, anti virus, virus, viruses, antivirus, anti-virus, malware
     LANDesk
By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks
     Lumension
By: Microsoft Dynamics     Published Date: Jul 09, 2007
J.D. Byrider's franchisees experienced a high level of frustration due to an old system running on Linux using dBase files. Byrider made the decision to switch their development environment to Intel-based servers in a Microsoft SQL Server and ASP development environment. Download this paper to read about their results.
Tags : application integration, financial, finance, accounting, accounting software, enterprise software, business management, workflow
     Microsoft Dynamics
By: Nasuni     Published Date: Apr 28, 2011
How Cloud Enabled Virtual Filer is Protected.
Tags : nasuni, virtual filer, storage switzerland, backup, file server, data protection, cloud storage provider, virtualization
     Nasuni
By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : cloud computing, cloud applications, best practices, applications, access management
     Okta
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com