critical application

Results 176 - 200 of 452Sort Results By: Published Date | Title | Company Name
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Organizations are increasingly moving their mission-critical applications and data to Amazon Web Services (AWS) and taking advantage of the massive compute power of Amazon Elastic Compute Cloud (Amazon EC2). The CrowdStrike Falcon® platform for AWS provides extensive and detailed visibility over Amazon EC2 instances, helping to improve an organization’s overall security posture. Learn how CrowdStrike® Falcon Discover™ enables IT security professionals to quickly identify and stop threats. Download this solution brief to learn how you can help satisfy your security requirements by: • Monitoring and searching metadata to improve security posture • Reviewing the rate of the Amazon EC2 instances launched over time • Gaining additional context surrounding alerts"
Tags : 
    
AWS - ROI DNA
Published By: Riverbed     Published Date: Feb 26, 2015
The financial industry is tough. Things change fast, and the field is always becoming more competitive and global. Likewise, clients are more demanding than ever, and customers now expect nothing less than 24/7 accessibility and reliability. To succeed in this environment, financial services firms and their clients rely heavily on IT to get the job done. Unfortunately, many firms struggle to keep up with those demands and are held back by issues with technology – especially regarding mission-critical applications.
Tags : 
apps, technology, finance, it management
    
Riverbed
Published By: Riverbed     Published Date: Feb 26, 2015
To succeed in this environment, financial services firms and their clients rely heavily on IT to get the job done. Unfortunately, many firms struggle to keep up with those demands and are held back by issues with technology – especially regarding mission-critical applications.
Tags : 
financial services, applications, finance industry, it finance, financial demands, it management, finance
    
Riverbed
Published By: HPE Intel     Published Date: Jan 11, 2016
You’re looking at flash storage because you see it’s taking the storage world by storm. You’re interested in accelerating business-critical applications, consolidating a virtual server or desktop deployment, trying to get ahead of your company’s data onslaught, or some combination of the above. This easy-to-read guide was developed to help arm you with key considerations and questions to ask before investing in a flash storage array for your business, today and for the future.
Tags : 
    
HPE Intel
Published By: IBM     Published Date: Sep 15, 2014
In business timing is everything, especially for business-critical applications. Delays in delivering critical data and processing can significantly increase business and financial risks. IBM’s new eBook FlashAhead discusses these challenges and offers up the all-flash storage system as a solution.
Tags : 
data center economics, application performance, critical data, big data, flash storage, storage system, data management, storage management, storage virtualization, business activity monitoring
    
IBM
Published By: Pure Storage     Published Date: Apr 10, 2019
Splunk® has become a mission critical application. Thousands of organizations are gaining insight from their machine data and transaction logs using Splunk, and many more are planning to deploy Splunk. No matter what stage you’re in, having guidelines to follow can help improve the Splunk experience. Since a mission critical data application deserves a mission critical data platform, Pure Storage® built the solution on the Pure FlashStack™ converged infrastructure solution. FlashStack is a joint offering from Cisco® and Pure Storage. This paper is intended to provide a framework for designing and sizing a high-performance, scalable, and resilient Splunk platform. Pure Storage is a leading all-flash array provider focused on reducing storage complexity while improving Splunk performance, resiliency, and efficiency.
Tags : 
    
Pure Storage
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
Read this paper to learn more on how blades are highly associated with core infrastructure consolidation and optimization efforts.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, data center
    
HP - Intel® Xeon® processors
Published By: Riverbed     Published Date: Sep 05, 2014
In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services.
Tags : 
application, performance, management, tool set, enterprises, fundamental issues, application performance management
    
Riverbed
Published By: Riverbed     Published Date: Jan 28, 2014
Forrester benchmark data on current state of application availability and performance within the enterprise. In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Read the report to learn the key findings of this study.
Tags : 
riverbed, forrester consulting, application performance management, application availability, enterprise, it transactions, business services, business-critical applications, proactive performance management, lowering operational costs, it efficiency, meaningful alerts, proactive alerting, root-cause identification, end user experience monitoring, wan optimization technologies, networking, it management, knowledge management, enterprise applications
    
Riverbed
Published By: Riverbed     Published Date: Aug 15, 2013
In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Download now to find the results!
Tags : 
apm, riverbed, network performance, application performance, infrastrucure, forrester report, business performance, it survey, network management, customer service, infrastructure, network performance management, productivity, service management, cloud computing
    
Riverbed
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Tags : 
fortinet, fortigate dos protection, malicious traffic, denial of service, ddos protection, network security, fortios, attacks, ddos, network security appliance, security management, vulnerability management
    
Fortinet, Inc.
Published By: CA Technologies     Published Date: Jun 09, 2015
In today’s application economy, everyone is in the software business. Auto makers are putting Wi-Fi hotspots in their cars. Watches are trading gears for motherboards. Even soda fountains have evolved from dumb machines into instrumented devices with touch-screen user interfaces. This digital transformation is changing the way applications are developed, tested, moved through environments and released into production—and it’s putting new demands on IT teams with which they’re struggling to keep up. At a high level, this is because the application delivery systems and processes at many enterprises were put in place when IT only had to push out an annual or semi-annual release. But as market pressures and executive mandates have forced teams to deliver innovations faster and more frequently, a new set of development, testing, automation and customer challenges have appeared—acting as obstacles that stand between you and your digital transformation goals.
Tags : 
    
CA Technologies
Published By: SAP     Published Date: Nov 22, 2011
FreshDirect found it very challenging to get operational insights from its information systems. In order to improve, it was critical to FreshDirect that they select a BI technology that allows the company to measure and report on operational metrics across departmental applications without requiring the building of IT-intensive data marts. With this requirement as one of the key selection criteria, the company evaluated multiple vendors. Download this case study to learn more.
Tags : 
sap, businessobjects, business, technology, case study, freshdirect, bi technology, information systems, application integration, application performance management, business analytics, business intelligence, analytical applications
    
SAP
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
    
Fidelis Cybersecurity
Published By: Hostway     Published Date: Jun 13, 2012
In this video, experts from Gartner, Microsoft and Hostway provide trends, information and advice for evolving your cloud strategy beyond testing and development to database-intensive and mission-critical application storage.
Tags : 
managed hosting, managed servers, web hosting, ecommerce managed hosting, managed server, managed hosting, colocation, web hosting provider, hosting company, web hosting solution, hostway corporation, storage, virtualization, cloud computing, infrastructure
    
Hostway
Published By: Nimble Storage     Published Date: Oct 28, 2013
Improvements in scalability, availability, performance, and functionality of midrange storage systems have blurred the boundaries between network-attached, midrange, and high-end storage systems. This Magic Quadrant will help IT leaders understand storage vendors' strategies and market strengths.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage, high-performance storage, storage efficiency, storage management, storage for vdi, storage for virtualized servers, storage for private cloud, storage for vmware, storage for oracle, storage for microsoft, storage for exchange, storage for sharepoint, storage
    
Nimble Storage
Published By: IBM     Published Date: Apr 07, 2015
You may be considering the move to a SaaS model for several reasons: it's cheaper, easier, more flexible. But then reality sets in. You can't afford to move to SaaS right away. Many of your apps are too mission-critical to trust SaaS at this point, and security restrictions and company guidelines will not allow you to use SaaS for many apps. However, for some apps, it's not an issue, and that number continues to grow. So how do you reconcile? Enter stage left-- Hybrid APM. With the ability to pick and choose between SaaS or on-premises monitoring for your different applications and components, wherever they reside, your troubles are alleviated and the shift towards SaaS can be seamless.
Tags : 
ibm, saas, mission-critical, security, apps, growth, apm, cloud, monitoring, tco, middleware, database development, productivity, service management
    
IBM
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: NetApp     Published Date: Dec 15, 2014
Organizations today are increasingly information-driven, requiring them to create, organize, and store more data every day. To handle the conversion of “data to information”, you need an agile and scalable infrastructure which will provide the backbone to run multiple business-critical workloads simultaneously. This IDC white paper examines the need for the NetApp FAS8080EX hardware-optimized platform to help organizations transform into data-driven entities, adopt newer technologies, and invest in business-critical applications to stay ahead of their competition.
Tags : 
information-driven, data, scalable infrastructure, hardware-optimized platform, storage
    
NetApp
    
Ciena
Published By: Dyn     Published Date: Nov 03, 2016
Global DNS performance and availability are critical to user experience. According to Gartner, “DNS is mission-critical to all organizations that connect to the internet. DNS failure or poor performance leads to applications, data and content becoming unavailable, causing user frustration, lost sales and business reputation damage.” But many businesses still rely on a single, often in-house DNS solution that lacks global scale and resiliency. This white paper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: - The critical role DNS plays in the user experience. - The risks of relying solely on a single DNS solution. - The added performance and reliability benefits of a high availability DNS architecture with a redundant managed DNS service. - Criteria for evaluating a managed DNS service provider.
Tags : 
dyn, dns, downtime risk, end-user experience, networking, enterprise applications
    
Dyn
Published By: IBM     Published Date: Jul 02, 2018
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy. IDC believes that this emerging environment is to date still highly undefined, even as businesses must make critical decisions. Should businesses develop in-house or use VARs, systems integrators, or consultants? Should they deploy on-premise, in the cloud, or in some hybrid form? Can they use existing infrastructure, or do AI applications and deep learning require new servers with new capabilities? We believe that many of these questions can be
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy. IDC believes that this emerging environment is to date still highly undefined, even as businesses must make critical decisions. Should businesses develop in-house or use VARs, systems integrators, or consultants? Should they deploy on-premise, in the cloud, or in some hybrid form? Can they use existing infrastructure, or do AI applications and deep learning require new servers with new capabilities? We believe that many of these questions can be
Tags : 
    
Group M_IBM Q418
Published By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm, itil, asg, ddm, cms, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm
    
ASG Software Solutions
Published By: Dell EMC     Published Date: Nov 04, 2016
Whether you’re dead set on winning the America’s Cup for Britain the first time like Olympian Sir Ben Ainslie or simply determined to keep your business competitive, success demands an infrastructure that can deliver quickly. Download the case study to learn how Ainslie’s British sailing team Land Rover Bar used innovative IT to deliver agility, reliability and speed in its bid to win, and how using hyper-converged infrastructure created a competitive advantage through improved performance and collaboration, reduced risk to critical applications, and provided the ability to spin up VMs in less than 15 minutes.
Tags : 
it infrastructure, hyper-convergence, architecture, sql, microsoft exchange, storage management, business intelligence
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.