configuration

Results 176 - 200 of 494Sort Results By: Published Date | Title | Company Name
Published By: Tripwire     Published Date: Nov 07, 2012
Cloud computing, virtualization and social networking have several things in common - they create new threat vectors that can leave companies vulnerable to new types of attacks. Read on to learn how to prevent new attacks by getting back to basics.
Tags : 
security, configuration, basics, security flaw, it assets, it infrastructure, security infrastructure, tripwire, data management, business technology, data center
    
Tripwire
Published By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content – effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a “mobile first” strategy that manages and secures both mobile apps and content.
Tags : 
box, mobile first, securing information, mobile device management solutions, applications, enable management, it management
    
Box
Published By: SolarWinds     Published Date: May 18, 2015
Learn about ten priorities Enterprise Management Associates (EMA) identified as integral for every company’s monitoring strategy. Read about the challenges companies face in fully visualizing their IT infrastructure to monitor essential technology implementations, configurations, and statuses.
Tags : 
it infrastructure, technology implementations, system administrators, choosing servers, app monitoring software, it management
    
SolarWinds
Published By: CA Technologies EMEA     Published Date: May 24, 2018
L’outil de création d’API, CA Live API Creator, crée des back-ends applicatifs exposant des API REST/JSON à l’échelle de l’entreprise pour l’accès aux données et aux applications existantes. Cet outil permet aux développeurs de créer de nouvelles API REST rassemblant les données de différentes sources, par simple configuration. Ils peuvent étendre ces dernières en mettant en place des règles métier déclaratives, un traitement des événements via JavaScript et de la sécurité basée sur les rôles.Le modèle déclaratif de CA Live API Creator permet également de disposer de systèmes très évolutifs et fiables. Ses services optimisés sont plus efficaces et moins fragiles que les services codés manuellement par des développeurs et des architectes qualifiés
Tags : 
    
CA Technologies EMEA
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"CrowdStrike® Falcon Discover™on Amazon Web Services (AWS) helps you ramp up to the speed of DevOps, delivering advance endpoint protection through automated real-time protection, visibility and control, and more. Watch our on-demand webinar. You’ll see how CrowdStrike Falcon Discover can help your security analysts implement more effective triage and response actions; set up strong baseline security policies for your team; and more. Along with these topics, the webinar covers: Learning about the shared responsibility model: Find out moreabout how this model helps everyone stay more secure and what steps you should take. Learning best practices for CrowdStrike Falcon Discover: Choose the right baseline configuration and environmental guidelines for your team."
Tags : 
    
AWS - ROI DNA
Published By: Riverbed     Published Date: Feb 26, 2015
SteelHead SaaS offers up to 30x better application performance for cloud services and SaaS applications deployed in enterprises. The solution combines the best of WAN optimization with the best of Internet optimization to provide a seamless transition for users between private and public clouds. Customers experience application acceleration immediately, without requiring any configuration changes to the user or service provider environments.
Tags : 
sas, optimization, private clouds, public clouds, saas applications
    
Riverbed
Published By: Riverbed     Published Date: Feb 26, 2015
In this report, we'll look at the challenges that businesses are facing when it comes to understanding network and application performance, and how the lack of network information can lead to bad performance, low user satisfaction, compliance issues and costly downtime.
Tags : 
automation, network performance, application performance, compliance issues, network management, automated configuration, modern enterprise
    
Riverbed
Published By: Riverbed     Published Date: Feb 26, 2015
In the world of network management, knowledge is power. But many organizations know a lot less about their network than they think. With proper network auditing and configuration, businesses can fill this knowledge gap.
Tags : 
network management, network auditing, automation, key network management processes, audit, network infrastructure
    
Riverbed
Published By: Riverbed     Published Date: Apr 24, 2015
A brief on how to use network auditing and configuration with the maximum of efficiency and utility.
Tags : 
networking, api, applications, management, visualizing, best practices, monitoring, auditing
    
Riverbed
Published By: ALE     Published Date: Jan 10, 2019
The purpose of this design guide is to present the requirements and considerations relevant to the transportation vertical along with design options, best practices and configuration guidelines. While this design guide is focused on Shortest Path Bridging (SPB-M) based networks, it also addresses data networking solutions applicable for this transportation vertical. Although several modes of transport exist, this document focuses on rail (metro, heavy, light) and road transport. More specifically, this document focuses on the fixed network infrastructure underpinning the multiple systems that enable the safe and reliable operation of rail and intelligent transport systems. To find out more download this whitepaper today.
Tags : 
    
ALE
Published By: Tideway Systems     Published Date: Dec 11, 2007
This report provided by Enterprise Management Associates (EMA) is developed around research that's focused on showing the many faces of the CMDB – as a central point for governance, asset, inventory, change and configuration control, and as a core system, in many cases for more effective service assurance. Designated for IT adopters and planners – read by executives, as well as, architects, and technical influencers.
Tags : 
cmdb, configuration management, change management, itil, service management, itsm, tideway systems, tideway
    
Tideway Systems
Published By: Pivotal CRM     Published Date: Dec 21, 2007
Most businesses today are under increasing pressure to respond to change expeditiously—to adapt to the ongoing needs and demands of their customers, the changing competitive landscape, and the evolution of the marketplace. An organization’s CRM system can either effectively support or hinder their business agility and capacity to respond to change, affecting overall corporate performance and customer satisfaction.
Tags : 
pivotal, crm, customer relationship management, sfa, sales force automation, salesforce, flexibility, architecture, technical architecture, 3-tier, three-tier, structure, integration, adaptability, customization, configuration, pivotal, pivotal crm, quinstreet
    
Pivotal CRM
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
The focus of this report is performance testing of the core services of an OCS Enterprise Edition Consolidated Configuration and as deployed on an HP BladeSystem and HP StorageWorks solution. One requirement for any solution deploying more than one server in a pool is a hardware load balancer. In this solution a F5 BIG-IP Local Traffic Manager is used.
Tags : 
hp bladesystem, hp storageworks, server deployment, microsoft office communications server, storage
    
F5 Networks Inc
Published By: Aldon     Published Date: Jan 13, 2009
Cut development costs and speed time-to-market with change management.
Tags : 
aldon, software configuration management, scm, effective change management, version control, software development
    
Aldon
Published By: HP Data Center     Published Date: Mar 25, 2009
In this White Paper IDC sees the use of static x86 server configurations is quickly becoming an outdated concept with the introduction of modern solutions based on blade architectures, which can offer both intelligent configuration and management and the ability to perform physical-to-virtual migration to promote uptime and efficient resource usage. When combined with the quickly maturing x86 hypervisor technologies available from a variety of solution providers, the synergy of blade architectures and virtualization offers customers the ability to dramatically increase utilization of their server investments, boost uptime, provide a more resilient and available infrastructure, and roll out new infrastructure and services more quickly.
Tags : 
hp data center, virtualization, x86, hypervisor technologies, it infrastructure, blade architecture, basic virtualization, advanced virtualization, hp c-class bladesystem, unvirtualized, legacy rehosting, virtualized deployment, it benchmarks, total cost of ownership, tco, scalability, cost reductions, system management, it management
    
HP Data Center
Published By: HP Data Center     Published Date: Apr 16, 2009
This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.
Tags : 
hp data center, 802.11n, architectural evolution, wlan, lan, scalability, collaboration, wireless, wireless networks, high-bandwidth, access points, aps, quality of service, qos, rf configuration, infrastructure, lan backbone, bottleneck, hp procurve, network architecture
    
HP Data Center
Published By: Dell-Intel     Published Date: Jul 16, 2009
The Business Ready Configurations for Dell PowerEdge blade servers, Dell EqualLogic SAN, and VMware Infrastructure provides a detailed reference architecture for deploying and using VMware virtualization on Dell blades and iSCSI storage environments. The Dell PowerEdge M1000e supports the recently announced 11th generation Dell PowerEdge M610 and M710 blade servers based on the new Intel Xeon processors.
Tags : 
data center, virtualization, xeon, dell, intel, equallogic, san, iscsi, vmware infrastructure, iscsi, poweredge, vmware distributed resource scheduler, drs, vmware, high availability, scalable, scalability, lan, failover, balancing
    
Dell-Intel
Published By: EMC Corporation     Published Date: Aug 05, 2014
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up-to-the-minute situational awareness and rapid data-driven security decisions. This means that large organizations have entered the era of data security analytics. Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: Shavlik Technologies     Published Date: Apr 19, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : 
shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
    
Shavlik Technologies
Published By: CollabNet     Published Date: Mar 31, 2012
In this session, you will learn that successful Continuous Integration relies on carefully preparation of a versioning control and change management strategy. We will cover which issue management, Subversion and Git best practices will maximize value
Tags : 
scriptlogic, software asset management, software license, tracking, automation, system center configuration manager, sccm, virtual application, software development
    
CollabNet
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected-CPS) of tested product configurations.
Tags : 
    
Citrix Systems
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: May 07, 2012
HP ProLiant Gen8 server features capabilities that speed and simplify 3 critical phases of the server lifecycle: configuration and provisioning, daily operational health monitoring and ongoing updates and maintenance. Download this short paper!
Tags : 
lifecycle, operations, flexibility, serviceability, data center, redefine, expectations, productivity, experience, storage performance, servers, gen8, intel, proliant, storage, data management
    
Sponsored by HP and Intel® Xeon® processors
Published By: McAfee     Published Date: Jan 23, 2013
Vulnerability assessment vendors compete on management features, configuration assessment, price and more, with other security products. Buyers must consider how VA will fit into their vulnerability management process when evaluating VA products,
Tags : 
vulnerability management, network scanning, strong positive, mcafee vulnerability manager, mvm, mcafee epolicy orchestrator, epo, nitro siem, mcafee security innovation alliance, data management, business technology, data center
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : 
risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor, mcafee enterprise security manager
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.