web environment

Results 101 - 125 of 146Sort Results By: Published Date | Title | Company Name
Published By: Silver Peak     Published Date: Oct 28, 2013
Enterprises have long been battling the inherent performance limitations of Wide Area Networks (WANs) when delivering applications to remote offices. Caching emerged in the 1990’s as a potential way of addressing this problem, accelerating the performance of specific applications, such as web services, while reducing overall WAN traffic. While caching achieved reasonable success for a few short years, the market for these point products ultimately subsided as a result of several operational and functional limitations. Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. The result is a complete solution for improved application delivery across a distributed enterprise environment.
Tags : 
silver peak, network memory, application caching, wan, caching, networking
    
Silver Peak
Published By: IBM     Published Date: Oct 24, 2013
Hear real world examples from service virtualization and mainframe experts about the way service virtualization can enable continuous integration to increase quality, reduce cost, and decrease project risk.
Tags : 
ibm webcast, continuous integration, test virtualization, test automation, execution environment, collaborative development, simplified testing, v2v migrations
    
IBM
Published By: Plantronics     Published Date: Oct 18, 2013
The following describes some typical UC usage scenarios, and how you can deploy products that will maximize productivity while minimizing downtime, excessive inventory costs, operational overhead, and unsatisfied users.
Tags : 
plantronics, solutions for uc users, solutions for uc applications, sound innovation, mobile and wired workers, web-based collaboration, voice communications, deploy products
    
Plantronics
Published By: Plantronics     Published Date: Oct 18, 2013
As communication options and needs increase, clear preferences have emerged regarding the best ways to exchange specific types of information.
Tags : 
plantronics, global workforces, anywhere-anytime attitude, brainstorming, collaborating, communications tool belt, phone conferences, audio conferences
    
Plantronics
Published By: Brainshark     Published Date: Oct 16, 2013
Traditional ways of talking to customers, partners, and employees—memos, phone calls, newsletters—are being replaced by web-based interactive and social communication tools. Of those surveyed, 88% said that mobile access to social communication or collaboration tools was either important or very important. This whitepaper examines how companies can leverage Mobile, Social Enterprise, and video to create an enriched environment that delivers important communications and fosters active engagement.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video
    
Brainshark
Published By: IBM     Published Date: Oct 10, 2013
With modern IT infrastructures an intricate web of interdependencies, uncovering the total IT environment, including the logical relationships between physical, virtual and cloud elements, has never been more important—or more complex. This white paper discusses how IBM’s analytics for logical dependency mapping, ALDM, reengineers the IT discovery process to provide a more complete and accurate view of the IT infrastructure.
Tags : 
reengineering, it discovery, analytics, visualization, interdependencies, it environment, logic, logical relationships
    
IBM
Published By: Amazon Web Services, Inc     Published Date: Sep 24, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more. This guide discusses planning topics, architectural considerations, and configuration steps to run a high-availability and site-resilient Exchange architecture. This guide is designed for Microsoft Exchange Server administrators, architects, and engineers. In the guide, we also provide a sample AWS CloudFormation template that is designed to help you easily provision the necessary AWS resources and update them in an orderly and predictable fashion. Learn more today!
Tags : 
aws, ms exchange, windows server, share point, pay as you go pricing, scalability, data integrity, cloud
    
Amazon Web Services, Inc
Published By: Amazon Web Services, Inc     Published Date: Sep 19, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more.
Tags : 
aws exchange, microsoft exchange, micrsoft exchange server, microsoft exchange download, microsoft exchange server download, ms exchange, ms exchange server, ms exchange download
    
Amazon Web Services, Inc
Published By: Webroot     Published Date: Sep 18, 2013
Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations—such as deploying a secure web gateway—for responding to this new threat environment. Key findings include: • 8 in10 companies experienced web-borne attacks in 2012 • The majority of respondents reported significant impacts such as increased help desk time, reduced employee productivity and disruption of business activities • Secure web gateways are a critical component of an effective defense against web-borne threats
Tags : 
web threats, data loss, security, web gateway, web attacks, security breach, business technology
    
Webroot
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : 
blue coat, ssl, ssl visibility
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: GeoTrust     Published Date: Aug 09, 2013
Learn more about typical situations where multiple domain certificates are the ideal solution. After this whitepaper, you'll know how to select the right multi-domain certificate for your needs.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution
    
GeoTrust
Published By: Red Hat     Published Date: Jan 01, 2013
Don’t let your web infrastructure limit the growth of your online business. Consider Red Hat Enterprise Linux – the ideal platform for transaction-intensive environments. Red Hat Enterprise Linux offers reliability, scalability, and predictable total cost of ownership – as well as a continuous stream of technical improvements – to keep you at the leading edge.
Tags : 
web, infrastructure, transaction-intensive environment, reliability, scalability, total cost, improvements
    
Red Hat
Published By: Riverbed     Published Date: Oct 17, 2012
Microsoft SharePoint is a collaboration tool used in enterprises. Read this white paper to learn about the optimizing a web-based SharePoint environment and how to address the requirements across the technology stack to deliver ROI for the business.
Tags : 
microsoft sharepoint, enterprise applications, connectivity, it infrastructure, business technology
    
Riverbed
Published By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority ®-part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : 
desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security
    
Dell Software
Published By: Rapid7     Published Date: Jul 12, 2012
In this webcast, Bernd Leger, VP of Marketing, Products & Solutions at Rapid7 and Nate Crampton, Product Manager at Rapid7 discuss the current state of how organizations are prioritizing vulnerabilities in their environments and what security professionals can do to lower their security thresholds.
Tags : 
rapid7, technology, security, it management, business technology
    
Rapid7
Published By: Red Hat     Published Date: Jan 01, 2012
A world-leading web content management and customer experience management system built its capabilities on the Ixonos Elastic Cloud – which is based on the Red Hat software stack, including value-rich Red Hat Enterprise Linux. Learn how Red Hat Enterprise Linux offered a stable, flexible environment for cloud deployments.
Tags : 
ixonos elastic cloud, software stack, red hat, ez systems, linux, cloud deployments
    
Red Hat
Published By: ESET, LLC.     Published Date: Oct 27, 2011
Get the information you need to make the right decision through this presentation. Register for the "Finding the Right Antivirus Solution e-Kit" to watch this webcast to get answers to your questions around effectiveness, performance, environmental fit and usage, management efficiency, and more.
Tags : 
eset, technology, security, internet security, anti virus
    
ESET, LLC.
Published By: Akamai     Published Date: Jul 01, 2011
This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.
Tags : 
akamai, web application security, security extension, firewall solution, cyber crime, xss, ddos, sql injection
    
Akamai
Published By: ESET, LLC.     Published Date: May 16, 2011
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.
Tags : 
eset, cybersecurity webinar, security manager, it security
    
ESET, LLC.
Published By: Dell Storage     Published Date: Apr 21, 2011
The Storage Center SAN is a smart, virtual storage platform that speeds storage provisioning for virtual machines, minimizes disk capacity, automates disaster recovery, fine-tunes data placement for virtual applications and provides a shared storage pool available to all VMs all the time. Watch this webcast to see why Dell Compellent storage is the perfect complement to VMware server environments. (39 mins)
Tags : 
dell compellent, webinar, virtual storage platform, vmware virtual servers, storage center san, disk capacity, disaster recovery
    
Dell Storage
Published By: IBM Corporation     Published Date: Sep 20, 2010
IBM Software Group performed a study that compared the performance of several WebSphere deployment configurations on Intel hypervisor environments.
Tags : 
ibm caching and cloud, test environment, websphere virtual enterprise, static cluster, wve
    
IBM Corporation
Published By: NetApp     Published Date: Aug 19, 2010
Maximize Efficiency and Availability with Hyper-V R2 and NetApp. View this on-demand Webcast to learn how you can increase resource utilization, streamline management, and maximize uptime in your Microsoft environment.
Tags : 
netapp, virtualize sharepoint, sql server, hyper-v r2, microsoft environment, roi, green computing
    
NetApp
Published By: NetApp     Published Date: Aug 19, 2010
View this on-demand webcast to gain insight into design considerations and deployment best practices for SharePoint in a virtualized environment.
Tags : 
netapp, hyper-v, virtualize sharepoint, storage, server investment, deployment best practices, microsoft, data storage
    
NetApp
Published By: GoToMeeting     Published Date: Aug 11, 2010
Effectively engaging prospects is one of the greatest challenges you'll encounter with a virtual sales presentation. If you don't hold a prospect's attention, you probably won't make the sale. This new What Works! eBook explores best practices for effectively engaging prospects in a virtual environment to shorten the sales cycle, beat the competition and close more business.
Tags : 
citrix, virual sales presentation, web conference, virtual environment, sales cycle, prospect engagement, content, strategy
    
GoToMeeting
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.