Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

configuration

Results 301 - 325 of 518Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Oct 01, 2014
If your company is using cloud computing services today, it’s highly likely you are already in a hybrid cloud configuration. The key question is whether you are actively managing this reality. In January 2014, HP commissioned Forrester Consulting to evaluate the state of enterprise hybrid cloud environments and how they are being managed. Forrester developed a hypothesis that tested the assertion that enterprise IT operations teams struggle to recognize and manage this hybrid state — a hypothesis that was proven out.
Tags : 
hybrid, cloud, world, state, company, managing, reality, enterprise, environment, consulting, configuration, services, material, hypothesis, operations, it management, cloud computing
    
HP
Published By: ThreatTrack Security     Published Date: May 26, 2015
Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”
Tags : 
cybersecurity, misconfiguration, patch management, passwords, mobile devices, viruses, security, it management, knowledge management, data management
    
ThreatTrack Security
Published By: Kenandy     Published Date: Jan 28, 2015
What do Star Trek and Enterprise Resource Planning (ERP) have in common? Apart from each being a bold adventure, both have experienced a rebirth as a next generation. In recent reports, Mint Jutras describes the next generation of ERP in terms of new technology that enables: new ways of engaging with ERP custom configuration without programming more innovation better integration
Tags : 
next generation erp, custom configuration, innovation, integration, erp for manufacturing, enterprise applications
    
Kenandy
Published By: MobileIron     Published Date: Oct 21, 2016
The release of Android for Work, combined with the enterprise upgrades in Lollipop, delivers an outstanding opportunity for companies that have long waited to support Android devices as part of their BYOD mix. It also cements the need for a multi-OS EMM platform that is capable of delivering configurations across Android, iOS, and Windows devices. For organizations that want to take advantage of Android for Work, the first step will be to find an EMM provider with with a comprehensive platform and broad experience with multi-OS deployments to ensure their success. Download now to learn more!
Tags : 
    
MobileIron
Published By: AWS     Published Date: Oct 30, 2018
Centrify – a leading cybersecurity company – needed to establish and maintain active security over its applications running on AWS, as it rapidly scaled up. The Centrify DevOps team implemented Dome9 Arc to visualize and assess its security posture, actively enforce security and compliance policies, and automatically remediate misconfigurations on AWS.
Tags : 
centrify, compliance, security, aws, dome9
    
AWS
Published By: ThousandEyes     Published Date: Nov 17, 2016
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings. Watch this video short now!
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Mar 14, 2017
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings.
Tags : 
    
ThousandEyes
Published By: VMware     Published Date: Dec 18, 2012
This presentation will be available to audience members until June 21, 2014 at 09:00 AM Pacific Daylight Time.
Tags : 
virtualization, cloud, vmware, security, compliance, cloud computing, infrastructure
    
VMware
Published By: Amazon     Published Date: Nov 07, 2013
This planning and implementation guide discusses planning topics, architectural considerations, and configuration steps relevant before and after launching the necessary AWS services such as Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Virtual Private Cloud (Amazon VPC) to run a high-availability and site-resilient Exchange architecture.
Tags : 
amazon web services, microsoft exchange, aws cloud, cloud, web services, servers, processor, memory, storage, log replication, network traffic, resiliency, availability, configuration, deployment, web service management, cloud computing
    
Amazon
Published By: Stratavia     Published Date: Oct 03, 2007
IT organizations are looking to leverage automation to improve the delivery of business services across the enterprise, while reducing costs. Automation can be implemented in many ways; however, today’s enterprise demands a higher level of sophistication than simple scripts. This whitepaper from Stratavia discusses the key aspects of automated server provisioning that every CIO should know.
Tags : 
server provisioning, automation, itil, workflow, data center automation, run book automation, configuration management, configuration, data center, vmware, virtualization, stratavia, infrastructure, network management, servers, server virtualization
    
Stratavia
Published By: TDi Technologies     Published Date: Aug 16, 2011
Configuration ports on critical and non-critical cyber assets are often misunderstood and overlooked in the overall cyber security strategy.
Tags : 
    
TDi Technologies
Published By: Tripwire     Published Date: Oct 14, 2010
Now smart CISOs are looking to lockdown the enterprise to achieve continuous compliance and narrow the breach-to-detection gap with baseline controls in configuration and change management.
Tags : 
tripwire, breach, detection, security, configuration and change management, compliance, intrusion detection, intrusion prevention, security management, configuration management
    
Tripwire
Published By: IBM     Published Date: Jul 23, 2009
Download this white paper and find out  how technological advances are enabling collaboration to extend across the enterprise and through outsourced resources with globally distributed development. (GDD)  Learn how GDD is enabling companies to expand their operations on a  worldwide basis, cost and skills arbitrage, and reduced time to market.
Tags : 
ibm, ibm telelogic, global collaboration, global distributed development (gdd), wide area network (wan), application lifecycle management (alm), lan, software configuration management, enterprise applications, wide area networks, application performance management
    
IBM
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard, identity management, internet security, policy based management, security management, security policies
    
Qualys
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities, security management, vulnerability management
    
Qualys
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Discover how to complete more application integration projects by delivering in days what used to take months of custom programming.  Find out how an appliance-based approach to application integration uses “configuration, not coding” to dramatically simplify and accelerate integration projects, while cutting costs by up to 80%.
Tags : 
erp, crm, integration, data integration, application integration, castiron, cast iron, scm, supply chain, customer relationship management, business integration, enterprise resource planning
    
Cast Iron Systems
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Discover why traditional software and custom coding solutions are obsolete when solving integration problems in a SaaS environment and how they’re rapidly being replaced by Integration Appliances that use “configuration, not coding” to quickly integrate your SaaS applications with your business-critical data.
Tags : 
saas, software as a service, erp, scm, crm, data integration, application integration, marketing automation, sales automation, castiron, cast iron, business integration, enterprise resource planning
    
Cast Iron Systems
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had just two choices for their integration needs, complex and expensive platforms like EAI or write custom code. Learn about the "hidden costs" of custom code and discover five reasons why companies are switching to Integration Appliances that use a simple “configuration, not coding” approach to integration.
Tags : 
integration, enterprise application integration, eai, application integration, castiron, cast iron, enterprise applications, business integration, data integration
    
Cast Iron Systems
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had only two choices for integrating SAP solutions, complex and expensive platforms like EAI or write custom code. Integration Appliances offer companies a third option, one that dramatically simplifies and accelerates SAP integration by using a “configuration, not coding” approach to rapidly connect SAP applications with a wide variety of applications, without burdening specialist resources.
Tags : 
eai, sap, castiron, cast iron, enterprise resource planning, erp, crm systems, application integration, business integration, data integration
    
Cast Iron Systems
Published By: NetApp     Published Date: Dec 01, 2009
This technical report (TR) provides guidelines and best practices for integrated architectures and implementations of Microsoft® Hyper-V with NetApp® storage solutions.
Tags : 
netapp, storage, microsoft virtualization, technical report, integrated architectures, hyper-v, cluster network, configuration, back up and recovery, disaster recovery, backup and recovery, clustering, network attached storage, storage virtualization, server virtualization
    
NetApp
Published By: Lumension     Published Date: Sep 18, 2012
Beyond Compliance: Combating Threats with Endpoint Configuration Management
Tags : 
suite, endpoint configuration, threats, compliance, lumension
    
Lumension
Published By: rPath     Published Date: Dec 10, 2010
This white paper introduces rPath intelligent system automation as a way to bring consistency, control and scale to .NET production environments. In particular, it describes three scenarios for using rPath within .NET environments.
Tags : 
rpath, automation, sccm, application integration, business process automation, system management software, configuration management
    
rPath
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search