resilience

Results 1 - 25 of 67Sort Results By: Published Date | Title | Company Name
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Creating a highly scalable, reliable, and efficient DNS infrastructure takes time, money, and expertise. You can accelerate your success and contain costs with a cloud-based service. Cloud-based DNS also exposes myriad opportunities to leverage the DNS infrastructure for global load balancing and traffic steering across hybrid environments.
Tags : 
dns, performance, reliability, network, global, anycast, customer, satisfaction, revenues, designing
    
Oracle Dyn
Published By: Oracle Dyn     Published Date: Dec 06, 2017
In this eBook, we’ll make the case for why you need to rethink DNS from several different and important perspectives. The first is to rethink your DNS choices. Choices around solutions, vendors and configurations that were made several years ago may no longer be optimal in today’s environment. The second is to rethink the importance of DNS for building digital resilience, including the need for a secondary DNS configuration. The third is to rethink the value of DNS as it has evolved to be so much more than simple domain name resolution. Modern DNS with intelligent response capabilities continues to open up new opportunities for traffic steering across hybrid resources.
Tags : 
scalability, dynamic network, dns, world wide, point of presence, pop, hardware, systems
    
Oracle Dyn
Published By: Mimecast     Published Date: Nov 28, 2017
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : 
email security, ransomware, spear-phishing, cyber resilience, symantec
    
Mimecast
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Navigating a turbulent cybersecurity climate can be hard – especially as threats like Petya and WannaCry continue to cripple organizations. Business disruption, downtime, technical failure and data loss are all real risk factors that can’t be ignored. The power of preparedness is in your hands. Get expert insight, tips and guidance from industry thought leaders on how to build a cyber resilience plan for email in this e-book.
Tags : 
cyber resilience, petya, wannacry, cybersecurity
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
An Email Security Risk Assessment conducted this year by Mimecast re-examined more than 40 million emails that had been OK’d by various security solutions, including Office 365. Of those, more than 19,000 were found to be “dangerous file types,” infected with malicious malware attachments or cleverly disguised impersonation attacks. This expert white paper explores how you can close Office 365 email security gaps. Learn considerations for evaluating security services that can bolster your email security.
Tags : 
office 365, email security, risk assessment, security services, malware, security solutions
    
Mimecast
Published By: Bell Micro     Published Date: Jun 14, 2010
In this Customer Solution Profile a Fortune five organization put the IBM XIV storage system through its paces in their Microsoft Exchange 2003 environment.
Tags : 
bell micro, microsoft exchange, ibm xiv storage system, resilience, performance, email system
    
Bell Micro
Published By: HPE APAC     Published Date: Jun 16, 2017
This white paper examines the various threats faced by mid-sized businesses and explains why a comprehensive approach to protection and resilience makes good business sense, and helps IT managers benchmark their company’s security posture against their peers’.
Tags : 
    
HPE APAC
Published By: Dell EMC     Published Date: Aug 17, 2017
This report highlights a unique approach to enabling IT to succeed in the digital age—a fully engineered converged infrastructure with richly supported capabilities for management, updates and configuration, security, and overall resilience. In particular, this report targets Dell EMC’s distinctive leadership in converged/hyper-converged infrastructure, while highlighting the many compelling benefits achieved in two real-world deployments: an enterprise and a global service provider.
Tags : 
it transformation, digital transformation, converged infrastructure, hyper-converged infrastructure, deployments
    
Dell EMC
Published By: Vision Solutions     Published Date: Aug 21, 2014
A report on research findings into the state of resilience and methods used companies to ensure their strength.
Tags : 
data management strategies, data protection, system migrations, data safeguarding
    
Vision Solutions
Published By: Kaminario     Published Date: Aug 23, 2016
Your three essential tips for building a smarter, more resilient storage strategy.
Tags : 
kaminario, flash, performance, storage, application performance, resilient
    
Kaminario
Published By: IBM     Published Date: Jun 26, 2013
Protect your applications quickly with a resilient cloud.
Tags : 
disaster recovery, cloud computing, resilience
    
IBM
Published By: IBM     Published Date: Jun 16, 2015
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, compliance requirements, it risk management strategies, it solutions, security breach, hacker vulnerability, risk management tools
    
IBM
Published By: IBM     Published Date: Jun 16, 2015
Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.
Tags : 
cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
This white paper describes the pervasive lack of resiliency planning in most cloud implementations today and discusses how better up-front assessment and planning can help organizations realize the enormous potential cloud offers for improved, more agile resiliency.
Tags : 
ibm, resilience, cloud, design, sustain
    
IBM
Published By: Oracle     Published Date: Nov 30, 2017
In this eBook, we’ll make the case for why you need to rethink DNS from several different and important perspectives. The first is to rethink your DNS choices. Choices around solutions, vendors and configurations that were made several years ago may no longer be optimal in today’s environment. The second is to rethink the importance of DNS for building digital resilience, including the need for a secondary DNS configuration. The third is to rethink the value of DNS as it has evolved to be so much more than simple domain name resolution. Modern DNS with intelligent response capabilities continues to open up new opportunities for traffic steering across hybrid resources.
Tags : 
scalability, dynamic network, dns, world wide, point of presence, pop, hardware, systems
    
Oracle
Published By: Oracle     Published Date: Nov 30, 2017
Creating a highly scalable, reliable, and efficient DNS infrastructure takes time, money, and expertise. You can accelerate your success and contain costs with a cloud-based service. Cloud-based DNS also exposes myriad opportunities to leverage the DNS infrastructure for global load balancing and traffic steering across hybrid environments.
Tags : 
dns, performance, reliability, network, global, anycast, customer, satisfaction, revenues, designing
    
Oracle
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: NetApp     Published Date: Feb 22, 2010
Meeting growing storage needs and improving data resilience, without adding complexity to the IT environment.
Tags : 
netapp, law enforcement, storage, data resilience, business continuity, application performance, data management
    
NetApp
Published By: Fugue     Published Date: Mar 27, 2017
Directed at cloud architecting concerns, this paper covers streamlining complexity at scale, knowing infrastructure state, and using easily repeatable patterns that bolster security, compliance, and disaster recovery. Get this white paper now.
Tags : 
cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration, devops, aws, amazon web services, cloud operations, cloud ops, continuous delivery, continuous integration, ci/cd, cicd, cloud automation, serverless, lambda
    
Fugue
Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
    
Symantec
Published By: IBM     Published Date: Jul 13, 2012
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. But this has introduced new challenges and opportunities. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Tags : 
ibm, technology, risk management, professionals, business, security management, emerging threats
    
IBM
Published By: IBM     Published Date: Jul 13, 2012
Learn how respondents, including nearly 400 senior executives from some of the world's largest enterprises, are incorporating holistic business resilience planning into their businesses through top-level findings and case studies. Download the research report here.
Tags : 
ibm, technology, risk management, global technology, technology, risk study
    
IBM
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: