validation

Results 1 - 25 of 213Sort Results By: Published Date | Title | Company Name
By: Aberdeen Group     Published Date: Apr 12, 2011
This research brief looks at the role of EV SSL Server Certificates in providing end-users with a higher level of assurance of a legitimate web site, and in increasing their confidence in the security of conducting online transactions.
Tags : aberdeen, ev ssl server certificate, extended validation, key management solution, encryption, security investment, scg, ssl, certificate, ecommerce
     Aberdeen Group
By: Aberdeen Group     Published Date: Jun 01, 2011
Aberdeen's research and analysis indicates that the strongest near-term growth for EV SSL Server Certificates will come from Small businesses (<$50M in annual revenue), particularly in the EMEA and Asia / Pacific geographies.
Tags : aberdeen, ssl server certificates, ev ssl server certificates
     Aberdeen Group
By: Acronis     Published Date: Dec 28, 2011
Taneja Group recently carried out a competitive assessment to put Acronis vmProtect 6 against Veeam in a head to head shoot-out. vmProtect 6 delivered across the board - demonstrating better simplicity, higher performance, and lower resource consumption.
Tags : virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, p2v, vmware data recovery, backup virtual server, virtualization backup, virtual backup, server migration, migrate from physical to virtual, v2v, migrate from virtual to virtual, acronis, veeam, vmprotect, acronis vmprotect, vm protection
     Acronis
By: BlackLine     Published Date: Aug 06, 2018
When did reconciliations become a living nightmare? Demanding deadlines. Strict requirements for review and supporting documentation. Endless piles of reconciliations to approve?that were due yesterday. Reconciliations are one of the most labor-intensive, yet critical controls processes within any organisation. Even the smallest mistake can compromise the integrity of your balance sheet and create discrepancies in your financial close. There is a simpler way to perform your reconciliation process that allows you to focus on analysis, risk mitigation, and exception handling. Join us for this webinar to find out what this is. You will learn how to: Automate daily reconciliations for continuous control and validation Gain better visibility into the quality, accuracy, and timeliness of a reconciliation Develop a seamless and streamlined workflow for preparation, approval, and review
Tags : 
     BlackLine
By: Bulldog Solutions     Published Date: Jul 20, 2009
If you’re under increasing pressure to be as efficient as possible with your marketing spend, you need to avoid wasting resources on strategies and messages targeted at the wrong audience. This white paper is a step-by-step guide on creating buyer personas to help focus your marketing efforts.
Tags : audience, bds, bulldog solutions, client list, pain points, motivators, validation, map, mapping, audience development, resources, buyer personas, sales development, sales leads, in-person environment, audience segmentation, promotion planning, audience, b2b, btob
     Bulldog Solutions
By: CA Technologies     Published Date: Aug 22, 2017
The Payment Card Industry Data Security Standard (PCI DSS) was first introduced in 2004 to increase controls over credit card holder data and to reduce the chances of credit card fraud. Validation is required annually and over the years, it has evolved with new revisions periodically. The latest one, version 3.2 came into force in April 2016. Until the end of January 2018, PCI DSS and Payment Application Data Security Standards (PA-DSS) are considered best practice to implement, and starting February 1, 2018, are considered a requirement.
Tags : 
     CA Technologies
By: Cisco     Published Date: Jun 21, 2016
The demands on IT today are staggering. Most organizations depend on their data to drive everything from product development and sales to communications, operations, and innovation. As a result, IT departments are charged with finding a way to bring new applications online quickly, accommodate massive data growth and complex data analysis, and make data available 24 hours a day, around the world, on any device. The traditional way to deliver data services is with separate infrastructure silos for various applications, processes, and locations, resulting in continually escalating costs for infrastructure and management. These infrastructure silos make it difficult to respond quickly to business opportunities and threats, cause productivity-hindering delays when you need to scale, and drive up operational costs.
Tags : 
     Cisco
By: Cisco EMEA     Published Date: May 15, 2018
Miercom was engaged by Cisco Systems to independently configure, operate and validate the performance and feature of the new Catalyst 9000 switches. The switches tested- the Catalyst 9300, 94000 and 9500- represent the next generation of Cisco's Catalyst switch line. Although this report does not focus on Software- Defined Access (SD- Access), it is worth nothing that the Catalyst 9000 switches are the best platform for Cisco's SD- Access solution.
Tags : 
     Cisco EMEA
By: Compliance Associates     Published Date: Jun 29, 2015
Are you feeling the pressure to meet FDA guidelines on Quality by Design (QbD) principals for Process Validation? Existing manufacturing, LIMS, ERP and document management tools are lacking integration and on demand view of your processes. They have hidden costs, risks and create delays to scalable product manufacturing and revenue. Since the FDA is demanding scientific arguments to support process and product development activies and a lifecyle approach, consider the value of a purpose built app for Process Validation. This new class of APP will bring your products to market faster and lower the risk of costly delays. Download the Primer to learn more.
Tags : regulatory compliance services, validation services, regulatory compliance, fda rulings, validator, validation, validation consultants
     Compliance Associates
By: CrowdStrike     Published Date: Feb 05, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries,investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence, Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security pos
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries, investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence: Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security post
Tags : 
     CrowdStrike
By: DataCore Software     Published Date: Jun 20, 2011
This ESG Lab Validation documents the results of hands on testing of DataCore SANsymphony-V R8 Storage Virtualization Software.
Tags : storage virtualization, sansymphony-v, datacore software, virtual desktop, thin provisioning
     DataCore Software
By: DataFlux     Published Date: Jan 07, 2011
This white paper addresses data profiling techniques that can help the analyst understand the empirical truth associated with enterprise data.
Tags : dataflux, data profiling, enterprise data, analyst, data rule validation, metadata compliance
     DataFlux
By: Datastax     Published Date: Aug 03, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Datastax     Published Date: Aug 15, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Datastax     Published Date: Aug 27, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Datastax     Published Date: Aug 27, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Datastax     Published Date: Aug 28, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Dell EMC     Published Date: Mar 18, 2016
This report documents hands-on testing and validation of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system, with a focus on the ease of integration, efficiency, scalability, and backup/restore performance.
Tags : emc, lab validation, data protection, avamar virtual edition, data domain
     Dell EMC
By: Dell EMC     Published Date: May 13, 2016
This report documents hands-on testing and validation of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system, with a focus on the ease of integration, efficiency, scalability, and backup/restore performance.
Tags : emc, vmware, data protection, data domain, backup, data management
     Dell EMC
By: Dell EMC     Published Date: Jun 29, 2016
IDC believes that EMC Isilon is indeed an easy to operate, highly scalable and efficient Enterprise Data Lake Platform. IDC validated that a shared storage model based on the Data Lake can in fact provide enterprise-grade service-levels while performing better than dedicated commodity off-the-shelf storage for Hadoop workloads.
Tags : storage, data, enterprise, best practices, platform
     Dell EMC
By: Dell EMC     Published Date: Aug 22, 2017
This Lab Validation Report documents the results of recent hands-on testing of Dell EMC Isilon All-Flash storage. Testing focused on the platform’s performance and scalability and how it enables organizations to support more applications and workloads with flash based on their ever-increasing volumes of unstructured data.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 04, 2016
As organizations continue to virtualize their infrastructures to gain higher levels of operational efficiency, VM sprawl and resource utilization are two key factors that can quickly create havoc for IT admins. In resource-siloed infrastructures, where multiple administrators are in charge of different pieces of the infrastructure, complexity continues to grow as mission-critical data sets and organizations grow. This is especially true in dynamic, mission-critical environments, where one wrong move or lack thereof could significantly impact an application, the end-user experience, or worst case, company revenue. The impact of hyper-converged infrastructures on IT has been profound. In fact, 85% of respondents to a recent ESG survey already use or plan to use a hyper-converged solution in the coming months. Though that number appears high, it is not all that surprising. ESG also asked organizations to identify which factors drove them to deploy or considering deploying a hyper-conv
Tags : ubuntu, performance, windows, hyper-convergence
     Dell EMC
By: Dell EMC     Published Date: Mar 27, 2019
The automotive industry is in the midst of a highly competitive transitional period, with the ultimate goal of fully autonomous or “driverless” vehicles likely to be realized within a decade. The scale and intensity at which OEMs and Tier 1 suppliers must bring innovations to market – while containing costs, mitigating risks, managing product complexity and maintaining compliance – is challenging. The emergence of Advanced Driver Assistance Systems (ADAS), designed to enhance passenger, vehicle and road safety, introduces disruptive requirements for engineering IT infrastructure – particularly storage, where even entrylevel capacities are measured in petabytes. This paper will explore the infrastructure challenges facing OEMs and Tier 1 suppliers in developing and validating ADAS technologies, and propose a storage solution that is optimized for such workloads, delivering high performance, high concurrency and massive scalability.
Tags : 
     Dell EMC
By: Dell EMC Storage     Published Date: Mar 27, 2019
The automotive industry is in the midst of a highly competitive transitional period, with the ultimate goal of fully autonomous or “driverless” vehicles likely to be realized within a decade. The scale and intensity at which OEMs and Tier 1 suppliers must bring innovations to market – while containing costs, mitigating risks, managing product complexity and maintaining compliance – is challenging. The emergence of Advanced Driver Assistance Systems (ADAS), designed to enhance passenger, vehicle and road safety, introduces disruptive requirements for engineering IT infrastructure – particularly storage, where even entrylevel capacities are measured in petabytes. This paper will explore the infrastructure challenges facing OEMs and Tier 1 suppliers in developing and validating ADAS technologies, and propose a storage solution that is optimized for such workloads, delivering high performance, high concurrency and massive scalability.
Tags : 
     Dell EMC Storage
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com