central server

Results 1 - 25 of 34Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 11, 2018
The Cisco SD-WAN solution is a cloud-delivered overlay WAN architecture that enables digital and cloud transformation at enterprises. It significantly reduces WAN costs and time to deploy new services, and, builds a robust security architecture crucial for hybrid networks. Enterprises today face major user experience problems for SaaS applications on account of networking problems. The centralized Internet exit architecture is inefficient and results in poor SaaS performance. And branch sites are running out of capacity to handle Internet traffic which is a concern because more than 50% of branch traffic is destined to the cloud. More importantly there are many dynamic changes in Internet gateways and the SaaS hosting servers that lead to unpredictability in performance. The Cisco SD-WAN solution solves these problems by creating multiple Internet exit points, adding high bandwidth at branch locations, and dynamically steering around problems in real-time, resulting is an optimal SaaS
Tags : 
    
Cisco
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure
    
CA Technologies
Published By: Lenovo     Published Date: Jul 07, 2015
"Lenovo® XClarity™ is a new centralized systems management solution that helps administrators deliver infrastructure faster. This solution integrates easily into Lenovo System x® M5 and X6 rack servers and the Lenovo Flex System™ — all powered by Intel® Xeon® processors — providing automated discovery, monitoring, firmware updates, configuration management, and bare metal deployment of operating systems and hypervisors across multiple systems. Lenovo XClarity provides automated resource management with agentless, software virtual appliance architecture. It features an intuitive graphical user interface. Download now to find out more about Lenovo XClarity! Sponsored by Lenovo® and Intel®"
Tags : 
lenovo, xclarity, server value, system management, automated discovery, configuration management, software development, it management
    
Lenovo
Published By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
cloud computing, cloud applications, best practices, applications, access management, business analytics, business management
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
IT endpoint management used to be an easier game: Managers deployed user systems with custom images when employees were hired, and employees returned them on their last day at work. Even during deployment, users had minimal abilities to impact systems and devices that were centrally managed. Servers resided in physical data centers where they could be identified and accessed. Those were the days!
Tags : 
    
Group M_IBM Q418
Published By: VMware Citrix     Published Date: Jan 23, 2018
This IDC MarketScape includes vendors that create and sell software in the client virtualization space, with a focus on centralized virtual desktops, distributed virtual desktops, and virtual user session (VUS) software. Vendors that only offer user state virtualization and/or software products that support virtual client computing deployments but not one of the aforementioned products will not be included in the IDC MarketScape graphic or profiles. This is because these types of solutions address a specific or niche need in the market but do not, by themselves, provide a complete software solution that an end customer can purchase on a standalone basis or in addition to a Microsoft Server version.
Tags : 
idc, marketscape, vendors, software, desktops, vus, virtual user session, vmware
    
VMware Citrix
Published By: AppSense     Published Date: Oct 06, 2011
Significant differences exist in uptake of the different flavours of desktop virtualisation, for example in VDI the shared-server approach is more prevalent than 'one server per client'. It is likely that more organisations will seek the economies of scale offered by the shared server approach than those looking at the one server per desktop approach to deliver 'higher performance' desktops. However, there will be situations where centralising the management and other operational elements of a desktop estate by employing a one server per desktop approach are appropriate.
Tags : 
appsense, user, virtualization, data center, desktop management, technology, business analytics, business intelligence
    
AppSense
Published By: F5 Networks Inc     Published Date: Apr 18, 2012
Efforts to reduce capital and operating expenditures by consolidating data centers can fail if applications and network are not optimized. Learn about a consolidation strategy that goes beyond centralizing servers, routers, software, and switches to solve multiple business problems.
Tags : 
data center consolidation, data center virtualization, data center strategies, centralizing services, dynamic data centers, data center transformation, data center network, application delivery
    
F5 Networks Inc
Published By: Dell Windows Server     Published Date: Jan 16, 2009
New virtualization tools, Web technologies, and security enhancements help save time and reduce costs, and provide you with high availability and increased flexibility for your changing business needs. Central to IT simplification is streamlining maintenance and maximizing availability — and by running Windows Server 2008 on Dell servers, you can do both.
Tags : 
dell, ws08, new virtualization, web technologies, security enhancements, windows server 2008, security, platforms
    
Dell Windows Server
Published By: Double-Take Software     Published Date: Dec 03, 2009
Download this paper today to learn about new solutions that use real-time data replication software to automatically backup branch office data to a central server to provide a simpler, more reliable and cost-effective way to protect your branch offices.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
    
Double-Take Software
Published By: Vision Solutions     Published Date: Dec 03, 2009
Download this paper today to learn about new solutions that use real-time data replication software to automatically backup branch office data to a central server to provide a simpler, more reliable and cost-effective way to protect your branch offices.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
    
Vision Solutions
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server Express integrates with your organization's existing infrastructure, which can include messaging software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. You can install the BlackBerry Enterprise Server Express on the same server as Microsoft Exchange or Windows Small Business Server, or you can install the BlackBerry Enterprise Server Express on a separate server.
Tags : 
blackberry, server express, microsoft exchange, v5.0.1, administration guide, mobile applications, cio, pim
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Tags : 
blackberry, mobile applications, enterprise server, planning guide, aes, des, cio, pim
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Tags : 
blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software
    
BlackBerry
Published By: DoubleTake     Published Date: Jul 14, 2010
The Department of Homeland Security puts businesses in two categories: those who have already experienced the pain of losing valuable electronic data, and those who will at some point in the future. Well-prepared businesses know that deploying the right resources, processes and technology to protect vital HR information is important, but having adequate resources and technology in place to protect the same invaluable data in branch offices is just as important, though often overlooked. This paper will teach you how real-time data replication software can automatically backup branch office data to a central server for a simpler, more reliable and cost-effective way to protect your branch.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
    
DoubleTake
Published By: Quest     Published Date: Jul 07, 2012
When disaster strikes, don't waste hours and dollars recovering critical data. vRanger delivers blazing-fast speed and granular recovery for your VMware applications and data. Get your free trial today.
Tags : 
applications, data, delivers, protection, disaster, security, recovery, backup
    
Quest
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: IBM     Published Date: Sep 16, 2014
IBM’s new PowerLinux servers appeal to Linux buyers? Linux buyers are driven by the price advantages that Linux offers as compared with other operating environments (Linux is free open source code) Windows and Unix are chargeable licensed code). Linux buyers, therefore, look first and foremost at the total cost of acquisition of Linux based servers. Linux buyers also want rapid time to value (fast deployment); they often use decentralized procurement processes; they want their Linux servers to be simple to use and manage."
Tags : 
power-based systems, big data, linux, fast deployment, open source infrastructure, data management, server hardware, application performance management
    
IBM
Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail, application performance management, business analytics, business intelligence, customer experience management
    
IBM
Published By: Eaton     Published Date: Jun 01, 2012
Though power protection solutions vary in numerous ways, all but the largest data centers use basic approaches when deploying uninterruptible power systems (UPSs): Either they distribute many smaller UPSs among their server racks or they install one or two large UPSs centrally within or near their server room. This white paper outlines each architecure's pros and cons.
Tags : 
uninterruptible power system, ups, power back up strategy, distributed power back up scheme, centralized back up scheme, white space, hybrid back up strategy, distributed computing
    
Eaton
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager
    
Bitium
Published By: Cisco     Published Date: Jan 05, 2015
The data center is central to IT strategy and houses the computational power, storage resources, and applications necessary to support an enterprise business. A flexible data center infrastructure than can support and quickly deploy new applications can result in significant competitive advantage, but designing such a data center requires solid initial planning and thoughtful consideration of port density, access-layer uplink bandwidth, true server capacity, oversubscription, mobility, and other details.
Tags : 
data center, consolidation, server virtualization, new applications, it management, data management
    
Cisco
Published By: HP     Published Date: May 14, 2014
To respond to rapid business environmental changes, enterprises are now adopting a more agile and services-oriented model for centralized IT, often characterized as “private cloud.” Public cloud service providers have become adept at adding new customers, new applications, and more compute-intensive workloads with minimal delay. While traditional enterprise IT may not be able to fully emulate this model, they can use virtualization – both at the levels of servers and storage – to come as close to the cloud as possible. Read this Evaluator Group paper to learn how HP 3PAR StoreServ Storage platforms can be foundational to developing IT agility.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud, it management
    
HP
Previous   1 2    Next    
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.