appliance

Results 1 - 25 of 388Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Apr 18, 2017
In this report we’ll explore comparing the cost of an on-site hyperconverged solution with a comparable set up in the cloud. The on-site infrastructure is a Dell EMC VxRailTM hyperconverged appliance cluster and the cloud solution is Amazon Web Services (AWS).
Tags : 
cost, cloud, hyperconverged, hyperconverged infrastructure, aws, amazon web services, dell emc
    
Dell EMC
Published By: Intel Corp.     Published Date: Aug 08, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.
Tags : 
assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance, efficiency, data, storage, backup, storage
    
Intel Corp.
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets
    
CDW
Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Tags : 
watchguard technologies, anti spam, security, tco, xcs, anti-phishing, data loss prevention, encryption, email security appliances
    
WatchGuard Technologies
Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM Security as a leader in providing Intrusion Prevention Systems (IPS) appliances in the newly published Gartner Magic Quadrant for IPS technology.
Tags : 
ibm, security, network protection, ibm security network protection, intrusion prevention systems, ips, gartner
    
IBM
Published By: Menlo Security     Published Date: Nov 19, 2019
"Leading Secure Cloud Transformation as a Visionary in the Secure Web Gateway (SWG) Landscape Gartner has recognized Menlo Security as a Visionary again in the 2019 Magic Quadrant for Secure Web Gateways (SWG). Our vision of Secure Cloud Transformation powered by isolation provides the most secure way for enterprises to replace expensive, on-premises security appliances with a global security cloud. The Menlo Security Cloud Platform stands out in the industry since it is the only cloud security platform with an Isolation Core™. The Menlo Security Cloud Platform allows enterprises to embrace Secure Cloud Transformation. Powered by our patented isolation technology, the global platform provides secure direct access to an architecture designed for SaaS applications. This cloud-native architecture is elastic and auto scales security and throughput for seamless on-demand growth in the number of users, devices, and applications, while providing 100% protection from malware and phishing at
Tags : 
    
Menlo Security
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
security, opendns, cisco
    
Cisco Umbrella EMEA
Published By: Veritas     Published Date: Oct 03, 2016
Dieses Whitepaper fasst zusammen, warum Backup- und Wiederherstellungslösungen dringend modernisiert werden müssen und beschreibt wichtige Anforderungen an mögliche Lösungen sowie den einzigartigen Funktionsumfang der Veritas NetBackup™-Appliances für eine einfache, vollständige und kostengünstige Lösung.
Tags : 
    
Veritas
Published By: Veritas     Published Date: Oct 03, 2016
Contenu du livre blanc : les tendances qui ont fait de la modernisation de la sauvegarde et récupération une priorité urgente ; examen des besoins clés qui conduisent à envisager des offres de solutions ; récapitulation des fonctionnalités exclusives qui permettent aux appliances Veritas NetBackup™ de constituer une solution simple, complète et rentable.
Tags : 
    
Veritas
Published By: Dell EMC     Published Date: May 12, 2016
A remote or branch office is very different from a traditional data center. It needs converged appliances that offer manageability, performance, flexibility, and a unique form factor.
Tags : 
    
Dell EMC
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had just two choices for their integration needs, complex and expensive platforms like EAI or write custom code. Learn about the "hidden costs" of custom code and discover five reasons why companies are switching to Integration Appliances that use a simple “configuration, not coding” approach to integration.
Tags : 
integration, enterprise application integration, eai, application integration, castiron, cast iron
    
Cast Iron Systems
Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs, endpoint security, end point security, security hardware, kace
    
KACE
Published By: Dell     Published Date: Jul 30, 2012
This Executive Brief is one of five installments in this series that will examine trends you need to include in your IT planning in 2012.
Tags : 
disaster recovery, integrated management, service mangement, cloud computing, deskto virtualization, multivendor solutions, virtual appliances, virtualization, it planning, it strategy, windows 7, dell, dpack, vcenter, vmware
    
Dell
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
The average company uses more than 50 security vendors. Firewalls, Web proxies, SIEM, Appliances & Third-party intelligence. The list goes on — and sometimes you still find your stack coming up short when it comes to securing users anywhere they access the internet. Strengthening your security stack doesn’t mean a massive overhaul or a loss of customization and control. Check out these 6 ways to amplify and extend your stack with cloud security from Cisco Umbrella.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck.
Tags : 
    
Cisco Umbrella EMEA
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Cloud ist ein Servernetzwerk, das Daten, Software und Services umfasst. Auf Clouddienste wird für gewöhnlich über das Internet, und nicht lokal in einem Rechenzentrum, zugegriffen. Wenn es um Cybersicherheit geht, verlassen sich immer mehr Unternehmen auf die Cloud. Die zwei Hauptgründe: 1. Aufgrund der sich ständig ändernden Bedrohungslandschaft wird immer mehr Umfang, Genauigkeit, Erfahrung und kollektive Intelligenz benötigt. Diese Anforderungen können die meisten Unternehmen intern nicht erfüllen. 2. Lokale Appliances und Unternehmensrechenzentren haben prinzipiell ihre Grenzen, wenn es um Abwehrmechanismen gegen DDoS- (Distributed Denial of Service) und Webangriffe geht.
Tags : 
    
Akamai Technologies
Published By: IBM     Published Date: May 22, 2013
SOA appliances have matured considerably over the last few years. As they have established themselves more firmly in the SOA landscape, vendors have developed a better understanding of requirements, resulting in a level of commonality in some of the key underlying functions such as providing a secure gateway for accessing SOA services.
Tags : 
soa, ibm, soa appliances, software, requirements
    
IBM
Published By: Teradata     Published Date: May 02, 2017
A Great Use of the Cloud: Recent trends in information management see companies shifting their focus to, or entertaining a notion for the first time of a cloud-based solution. In the past, the only clear choice for most organizations has been on-premises data—oftentimes using an appliance-based platform. However, the costs of scale are gnawing away at the notion that this remains the best approach for all or some of a company’s analytical needs. This paper, written by McKnight Consulting analysts William McKnight and Jake Dolezal, describes two organizations with mature enterprise data warehouse capabilities, that have pivoted components of their architecture to accommodate the cloud.
Tags : 
data projects, data volume, business data, cloud security, data storage, data management, cloud privacy, encryption, security integration
    
Teradata
Published By: IBM     Published Date: Dec 15, 2016
Join this webcast to learn how IBM messaging solutions, like the IBM MQ Appliance and IBM Message Hub, can help your business make the most of all its opportunities, in the cloud and on-premise, and anywhere in between.
Tags : 
ibm, middleware, ibm mq appliance, ibm message hub
    
IBM
Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency, secure computing, securecomputing
    
Secure Computing
Published By: EMC Converged Platforms     Published Date: Feb 17, 2016
This solution brief describes how VxRail Appliances are the easiest, fastest, most affordable way to implement a VDI infrastructure.
Tags : 
vce, vdi, hyper converged appliances, solution brief, vdi infrastructure
    
EMC Converged Platforms
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
West Coast Labs performed a comparison test on a range of email solutions (appliances, software, and hosted service solutions) to measure their relative spam detection rates over a series of at least 100,000 genuine spam emails using West Coast Labs real-time spam feed.
Tags : 
saas, trend, trend micro, websense, barracuda, anti-spam, antispam, spam filter service, spam filter for exchange, hosted antispam, managed antispam, enterprise anti-spam, mcafee, ironport, fortinet, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: