physical infrastructure

Results 1 - 25 of 85Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: Acronis     Published Date: Dec 28, 2011
Virtualization platforms are different from physical platforms. The virtualization benefits extend to management and support for tightly integrated backup and recovery solutions. Solutions designed exclusively for virtual infrastructure backup provide a host of key benefits and should be leveraged whenever possible.
Tags : 
virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, backup hyper-v, p2v, vmware data recovery, backup virtual server, virtualization backup, virtual backup, server migration, migrate from physical to virtual, v2v, migrate from virtual to virtual, acronis
    
Acronis
Published By: VMTurbo     Published Date: Mar 25, 2015
An Intelligent Roadmap for Capacity Planning Many organizations apply overly simplistic principles to determine requirements for compute capacity in their virtualized data centers. These principles are based on a resource allocation model which takes the total amount of memory and CPU allocated to all virtual machines in a compute cluster, and assumes a defined level of over provisioning (e.g. 2:1, 4:1, 8:1, 12:1) in order to calculate the requirement for physical resources. Often managed in spreadsheets or simple databases, and augmented by simple alert-based monitoring tools, the resource allocation model does not account for actual resource consumption driven by each application workload running in the operational environment, and inherently corrodes the level of efficiency that can be driven from the underlying infrastructure.
Tags : 
capacity planning, vmturbo, resource allocation model, cpu, cloud era
    
VMTurbo
Published By: NetApp     Published Date: Sep 24, 2013
Many organizations have adopted virtualization as a standard for server workloads. But virtualization has not proven to be the “game changer” many organizations had envisioned. IT departments face huge challenges related to server sprawl, which has actually increased with virtualization. Although virtualization has brought benefits beyond the physical paradigm of one operating system per server, the true optimal infrastructure for organizations comes with adopting a private cloud infrastructure. Check out this white paper to learn the benefits of a private cloud and discover how deploying one private cloud solution can provide: Consolidated resources Flexible services Easy provisioning of new environments And more
Tags : 
best practices, private cloud, netapp, cloud, technology, windows server
    
NetApp
Published By: CDW     Published Date: Mar 31, 2015
A wireless network is a platform for enabling enterprise-wide access to an organization's applications and data. Wireless infrastructure allows users to take the office with them wherever they go. The wireless network provides employees and guest workers with untethered access to voice, video, data and applications regardless of their physical location. With the influx of mobile devices and increase in Wi-Fi connections, organizations are already starting to see a paradigm shift to "wireless by default" and "wired by exception." Watch this video to see how our solution architects upgraded the Shawnee Mission School District's aging network infrastructure.
Tags : 
wireless network, networking, applications, data, infrastructure, update
    
CDW
Published By: IBM     Published Date: Jan 27, 2017
For more and more organizations, the new reality for development, deployment and delivery of applications and services is hybrid cloud. Few, if any, organizations are going to move all their strategic workloads to the cloud, but virtually every enterprise is embracing cloud for a wide variety of requirements. In fact, hybrid cloud is the new norm for IT. IDC says more than 80% of enterprise IT organizations will commit to hybrid cloud by 20171, and 70% of IT decision-makers say they will always have a mix of traditional IT and cloud architectures.2 With important applications and workloads architected across both on-premises and hybrid, public and private cloud environments, business and IT stakeholders must be able to access data with equal efficiency, reliability and speed—regardless of physical location, infrastructure type or time frame.
Tags : 
    
IBM
Published By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : 
continuity requirements, vmturbo, virtualization, workload portability, data replication
    
VMTurbo
Published By: Carbonite     Published Date: Aug 02, 2017
Carbonite Cloud Migration Powered by DoubleTake is an online service that enables migrations from any physical, virtual or cloud-based environment into VMware vSphere, vCloud Director, OpenStack, Amazon Web Services EC2 or Microsoft Azure infrastructure as a service (IaaS) cloud environments. The webbased console provides automated, centralized migration to the cloud. This document provides a detailed technical briefing on the functionality and use of Carbonite Cloud Migration and assumes that the reader will have at least a basic understanding of infrastructure as a service (IaaS).
Tags : 
carbonite, cloud, cloud-based environment, iaas. cloud migration
    
Carbonite
Published By: APC by Schneider Electric     Published Date: Feb 15, 2011
This paper divides the realm of data center "Operations Technology" into four distinct domains and compares the primary and secondary functions of key subsystems within these domains.
Tags : 
apc by schneider electric, classification, data center operations technology, ot management tools, software management tool, physical infrastructure
    
APC by Schneider Electric
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
This whitepaper will provide an overview of cloud computing, identify some challenges and considerations for using the cloud, and will look at how best to manage a combination of physical and virtual systems throughout your infrastructure in order to support your business objectives.
Tags : 
shavlik, cloud computing, infrastructure, physical and virtual system, patching, os migration
    
Shavlik Technologies
Published By: IBM     Published Date: Jul 15, 2016
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance.
Tags : 
ibm, data, security, virtualization
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: Schneider Electric     Published Date: Jun 04, 2014
When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both quantitative and qualitative differences to consider. The 10-year TCO may favor upgrading or building over outsourcing, however, this paper demonstrates that the economics may be overwhelmed by a business’ sensitivity to cash flow, cash cross-over point, deployment timeframe, data center life expectancy, regulatory requirements, and other strategic factors. This paper discusses how to assess these key factors to help make a sound decision.
Tags : 
schneider, electric, data, infrastructure, upgrade, retail, outsource, own
    
Schneider Electric
Published By: Panduit     Published Date: Nov 28, 2018
If you’re looking to build, expand, or modernize your facility with converged physical infrastructure solutions, be sure to download our cheat sheet Key Questions to Ask a Prospective Converged Physical Infrastructure Solutions Vendor.
Tags : 
panduit, colocation, converged infrastructure
    
Panduit
Published By: Siemon Company     Published Date: May 12, 2010
Siemon, a global leader in network cabling solutions and data center physical layer infrastructure, offers this new 66-page E-Book focused on guiding data center professionals and service providers through key infrastructure challenges.
Tags : 
siemon, ieee, cooling, data center, cabling, cooling, networking, physical infrastructure, saas, paas
    
Siemon Company
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe, qos, security
    
Rohde & Schwarz Cybersecurity
Published By: Dell EMC     Published Date: Feb 23, 2017
Enterprises of all sizes are undergoing massive data center modernization initiatives. They are looking to use technology to cut costs and drive competitive advantage. At the core of many of these transformations is an effort to reengineer IT delivery models to enable cloudlike flexibility of resources, and reduce both capital expenditures and operational overhead. That is giving rise to the private cloud movement. Indeed, private cloud adoption is accelerating and maturing. IT organizations are looking to the private cloud for the elasticity it can provide to add or remove resources as required. In fact, ESG research reveals that more than three-quarters of organizations would classify their private cloud deployment as either an advanced internal cloud or a basic internal cloud. Those organizations that have virtualized at least half of their production applications are more than twice as likely as their more physical infrastructure-dependent counterparts to categorize their environme
Tags : 
    
Dell EMC
Published By: Acronis     Published Date: Jan 20, 2012
Today, the cloud stirs up all manner of possibilities for handling data protection, but the cloud also brings many challenges: security, bandwidth, connection availability and data recovery.
Tags : 
acronis, data, data management, virtualization, infrastructure, hybrid, backup, data recovery
    
Acronis
Published By: McAfee     Published Date: Feb 06, 2013
The next-generation of hybrid data centers will integrate physical, virtual, and cloud infrastructures to deliver IT services more flexibly, affordably, and adaptively, and require a new generation of flexible security architectures.
Tags : 
    
McAfee
Published By: IBM     Published Date: Aug 08, 2012
Manage physical and virtual assets, maintain your infrastructure and capital equipment and maximize the efficiency of your people, processes and assets with predictive analytics.
Tags : 
ibm, technology, asset management, business management, predictive analytics, physical assets, virtual assets, infrastructure, capital equipment
    
IBM
Published By: IBM     Published Date: Feb 10, 2014
Manage physical and virtual assets, maintain your infrastructure and capital equipment and maximize the efficiency of your people, processes and assets with predictive analytics.
Tags : 
ibm, ibm business analytics, operational analytics, predictive maintenance, insights, data analysis, roi, operational value cycle, ibm spss, asset management, infrastructure management
    
IBM
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
enterprise authentication, securing identities, evolving environment, attacks, mobile platforms, user identities, network devices
    
Entrust Datacard
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: