public key

Results 1 - 25 of 82Sort Results By: Published Date | Title | Company Name
By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"IT needs to reach beyond the traditional data center and the public cloud to form and manage a hybrid connected system stretching from the edge to the cloud, wherever the cloud may be. We believe this is leading to a new period of disruption and development that will require organizations to rethink and modernize their infrastructure more comprehensively than they have in the past. Hybrid cloud and hybrid cloud management will be the key pillars of this next wave of digital transformation – which is on its way much sooner than many have so far predicted. They have an important role to play as part of a deliberate and proactive cloud strategy, and are essential if the full benefits of moving over to a cloud model are to be fully realized."
Tags : 
     Hewlett Packard Enterprise
By: effectual     Published Date: Dec 03, 2018
Multi-Cloud, hybrid strategies add complexity Nearly 60% of businesses say they're moving toward hybrid IT enviornments that integrate on-premises systems and public cloud resources and enable workloads to be pleaced according to performance, security and dependency requirements. Identifying the best execution venue is a key cloud hurdle.
Tags : cloud enablement, cloud optimization, digital transformation, cloud migration, cloud computing, cloud architecture
     effectual
By: Datastax     Published Date: Aug 27, 2018
Applications designed for the public sector rarely get the treatment and attention they need or deserve. That’s about to change. A new climate of data speed and readiness, spawned by the Right-Now Economy and the Right-Now Customer, has made unlocking the full potential of all data a key aspect to delivering powerful, mission-critical applications that enrich lives as much as they save them. Read this white paper to learn how it happens
Tags : 
     Datastax
By: Datastax     Published Date: Aug 07, 2018
Applications designed for the public sector rarely get the treatment and attention they need or deserve. That’s about to change. A new climate of data speed and readiness, spawned by the Right-Now Economy and the Right-Now Customer, has made unlocking the full potential of all data a key aspect to delivering powerful, mission-critical applications that enrich lives as much as they save them. Read this white paper to learn how it happens
Tags : 
     Datastax
By: DigiCert     Published Date: Jun 19, 2018
Code signing essentially relies on a Public Key Infrastructure, which means code signing certificates are made out of a pair of public and private key - the public key is signed by a trusted Certificate Authority such as DigiCert, and the private key is kept by the owner and used to sign the code to secure. Although the technology behind code signing certificates is proven, managing them - and by extension managing the private keys - is an activity that can be very complex, especially when the key owner(s) do not understand their value. In order to help customers to solve for the shortcomings in regard to the management of code signing private keys and user access, DigiCert has developed Secure App Service. Download this whitepaper to find out more about how this can help your business.
Tags : 
     DigiCert
By: TrendKite     Published Date: Jun 15, 2018
How can you plan more certainty into your PR practice? Break down silos, hone processes, and measure bottom-line business value. Public relations is entering an era of unprecedented challenge — and unprecedented opportunity. Digital technologies are rocking every boat, from consumer behaviors, to B2B decision-making, to the nature and reputation of media itself. Today, every discipline is being buffeted by continual change and performance pressure. But the convergence of key trends poses a particular set of challenges for public relations.
Tags : 
     TrendKite
By: Google Apigee     Published Date: Jun 08, 2018
A must-read for IT professionals that provides a comprehensive analysis of the API management marketplace and evaluates 22 vendors across 15 essential criteria. APIs are the de-facto standard for building and connecting modern applications. But securely delivering, managing and analyzing APIs, data and services, both inside and outside an organization, is complex. And it’s getting even more challenging as enterprise IT environments grow dependent on combinations of public, private and hybrid cloud infrastructures. Choosing the right APIs can be critical to a platform’s success. Likewise, full lifecycle API management can be a key ingredient in running a successful API-based program. Tools like Gartner’s Magic Quadrant for Full Life Cycle API Management help enterprises evaluate these platforms so they can find the right one to fit their strategy and planning. Apigee is pleased to offer you a complimentary copy of the Gartner report. Access in-depth evaluations of API managemen
Tags : 
     Google Apigee
By: McAfee EMEA     Published Date: Mar 14, 2018
Use of cloud computing services continues to grow rapidly as organizations migrate business applications and data to cloud-based software, platform and infrastructure services. Gartner estimates 2017 will see growth of 18% in spending on public cloud services and that cloud adoption will infuence more than 50% of IT spending through 2020. Deloitte Global predicts that by the end of 2022 more than half of all IT spending will go to IT-as-a-service providers. In the 2016 edition of this survey, 56% of the security professionals responding said limitations on access to collect incident response data and evidence for forensic analysis was a key challenge to securing the cloud. Sixty-two percent said they were concerned about unauthorized access by outsiders, and 59% said they worried about access by other cloud tenants. Of the 10% who reported being breached, half blamed stolen credentials or compromised accounts.
Tags : 
     McAfee EMEA
By: MuleSoft     Published Date: Jan 16, 2018
To achieve efficiencies in today’s turbulent economic climate, government entities need to integrate legacy applications with modern systems and web services. Orchestration between multiple systems across various departments and municipalities is needed to deliver quality public services. At the same time, public sector agencies face aggressive timelines and budget constraints, changing constituent needs, and open source policies. Learn how utilizing a lightweight, standalone Enterprise Service Bus (ESB) enables government entities to meet these key challenges and deliver vital public goods while cutting costs. Evalute important decisions: Achieving efficiencies in today’s turbulent budgetary environment Time to Delivery and Budget Constraints Constituent Needs and Public Value Open Source Policies & Initiatives The Software Architecture for Government Learn to deliver projects within tight schedules and fiscal constraints - download now.
Tags : 
     MuleSoft
By: SAP EMEA Global     Published Date: Dec 13, 2017
This IDC white paper examines the drivers behind the adoption of IoT technologies by public services organizations and why the IoT is becoming a key investment priority. Public services are comprised of a diverse set of organizations, including federal, regional and local governments and healthcare and social services providers. These all have mandates to improve the safety, health and quality of life of their constituents across a broad range of programs. This paper also provides market insights and describes examples of IoT implementations that highlight the diversity of scenarios in the public service sector. These diverse scenarios illustrate the impact IoT solutions can have across many citizen-centric services.
Tags : 
     SAP EMEA Global
By: Reputation.com     Published Date: Oct 02, 2017
The new year is underway, but your organization’s online reputation precedes you. It’s time to take a look at what’s influencing public perception to prepare for the year ahead. In this report, we examine four key trends guiding the direction of Online Reputation Management strategies in 2017, and provide recommendations for capitalizing on those trends moving forward.
Tags : 
     Reputation.com
By: CA Technologies     Published Date: Aug 21, 2017
Lured by opportunities to speed innovation, reduce costs and enhance agility, many business executives are opting to move their organization’s applications into public cloud environments. Whether or not organizations realize these advantages to the fullest extent possible will in part be dictated by the monitoring capabilities in place. This paper offers a detailed look at the monitoring challenges cloud environments can pose, and it examines the key approaches = organizations need to take to foster maximum service levels, efficiency and agility in the cloud.
Tags : 
     CA Technologies
By: DigiCert     Published Date: Jul 16, 2017
Best practices for SSL/TLS admins managing 100s or 1000s of certs
Tags : digicert, certificate management, public key infrastructure, ssl, network security, certificate lifestyle
     DigiCert
By: Cox Business     Published Date: May 31, 2017
For cybersecurity professionals, 2016 presented a year of distributed denial of service (DDoS) attacks that were unprecedented. Week after week, the public was inundated with news of hacks, attacks, and data leaks. It didn’t take long for everybody to realize the old axiom of cybersecurity still holds true - there are two types of companies: those who are hacked and know about it, and those who are hacked and soon will find out. As a key player in the war against DDoS attacks, Neustar has been on the front line, detecting, alerting, and mitigating strikes to keep companies and their customers safe.
Tags : 
     Cox Business
By: Entrust Datacard     Published Date: May 10, 2017
Entrust Datacard provides customers with a commercial security public key infrastructure (PKI) solution that addresses authentication and data protection needs for enterprise and government customers
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: May 10, 2017
The rapid rise of digital business is moving public key infrastructure (PKI) into the spotlight. Once commonly viewed as a deep-weeds technology reserved for niche applications, PKI is now emerging as a core technology for securing cloud, mobile and Internet of Things (IoT) initiatives.
Tags : digital, cloud, cloud computing, internet of things, intrastructure
     Entrust Datacard
By: Cloudamize     Published Date: Apr 04, 2017
As you think about migrating to the public cloud, it’s challenging to know where to start. This guide discusses 10 key considerations to address as you think about moving to the cloud and serves as a framework to help you understand which critical decisions you need to make.
Tags : moving to the cloud, cloud computing cost, cloud cost analysis, tco cloud, cloud calculator, cost of cloud computing, cloud computing cost calculator, cloud cost management, cloud migration strategy, migrating to the cloud, cloud migration tools, cloud migration, cloud cost comparison, cloud tco, cloud cost, cloud management, cloud optimization, public cloud, cloud provisioning, capacity planning
     Cloudamize
By: DigiCert     Published Date: Mar 16, 2017
Learn Why this Scalable Solution Works. Download now!
Tags : security, medical, medical devices, security solution
     DigiCert
By: IBM     Published Date: Dec 07, 2016
This IBM Redguide™ publication introduces Cloud Brokerage and highlights the business value of the solution. It provides a high-level architecture, identifies key components of the architecture, and discusses the hybrid cloud implementation framework, which includes other IBM product offerings. The guide describes example scenarios that use Cloud Brokerage to resolve common business problems.
Tags : ibm, cloud, broker, ibm cloud brokerage, broker software, enterprise applications
     IBM
By: Viavi Solutions     Published Date: Sep 30, 2016
Organizations planning to migrate all or a portion of their applications or services to a public cloud environment will benefit from the experiences of early adopters. As a leader in hybrid IT monitoring, Viavi Solutions® has been involved at all stages of the cloud-migration life cycle: during assessment, implementation, and after deployment. Based on Viavi’s and our technology partners’ experience and many conversations with customers, prospects, and others in the industry, this white paper offers insight into 6 key questions regarding cloud adoptions: 1. Why Migrate 2. What to Migrate 3. What are the Steps to Cloud Migration 4. When to Migrate 5. Where to Migrate 6. Who to Ask for More Help
Tags : 
     Viavi Solutions
By: Oracle HCM Cloud     Published Date: Aug 02, 2016
Maintaining a smooth, user-friendly, and even fun talent acquisition process is imperative to aligning a retailers employer brand with a positive corporate public identity. Find out how savvy retailers are balancing cutting-edge technologies with the basics to juggle three key talent initiatives: quickly hiring seasonal talent, engaging and retaining younger and older associates alike, and expanding their presence into new locations.
Tags : aberdeen talent inquisition, corporate public identity, key talent initiatives, hiring talent, retailers introduction
     Oracle HCM Cloud
By: SAP     Published Date: Jul 18, 2016
People on the frontlines of public-sector fraud management have considerable need to detect, monitor and prevent fraud in real time. They recognize that speed in analysis, detection, investigations and simulations is the key to minimizing taxpayer dollars lost to fraud. Read the report to learn more.
Tags : 
     SAP
By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
     AlienVault
By: Avi Networks     Published Date: Mar 24, 2016
This buyer’s guide for load balancers is based on research, best practices, and conversations with network administrators and IT operations teams at over 110 Global 2000 enterprises. It presents guidelines for choosing application services that mirror the needs of modern data centers and public cloud initiatives. The guide is organized in sections, starting with a pre-assessment of your current application delivery capabilities. With data gathered from your pre-assessment, you can review the considerations involved in creating a software-defined application services strategy; identify opportunities to improve automation of application services and operations. Finally, use the software-defined application services checklist at the end of the guide to identify key priorities in your choice of application service solutions for your enterprise.
Tags : avi networks, best practices, application services, modern data centers, public cloud initiatives, load balancer, load balancing, application delivery, application delivery controller, adc, software-defined networks, sdn, networking, it management
     Avi Networks
By: Akamai Technologies     Published Date: Mar 15, 2016
Manufacturers, in an effort to succeed with digital transformation, are relying on the Internet and public cloud to deliver key enterprise applications and processes. As manufacturers continue to become more digital enterprises, their network architecture must as well. Read this paper to learn key considerations for architects to create a holistic network that takes today’s, and tomorrow’s, requirements into consideration.
Tags : network management, manufacturing, network optimization, network applications, cloud services, enterprise applications
     Akamai Technologies
Start   Previous   1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com