rim

Results 101 - 125 of 1441Sort Results By: Published Date | Title | Company Name
Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks, application security, firewalls, hacker detection, intrusion detection, intrusion prevention
    
Arbor
Published By: Arcserve     Published Date: Jul 26, 2010
The Emergence of the Application Delivery 2.0 Era: The primary goal of this handbook is to help IT organizations plan for that transformation.
Tags : 
ca technologies, application delivery 2.0 era, virtualization, mobile workforce, cloud computing, network, application optimization, managed service providers
    
Arcserve
Published By: Arcserve     Published Date: May 29, 2015
The traditional taxonomy of data protection appliances – also known as Purpose Built Backup Appliances (PBBAs) – covers two primary categories: • Backup Appliances • Deduplication Appliances Let’s explore this taxonomy and market dynamics.
Tags : 
data protection appliances, purpose built backup appliances, deduplication, market dynamics, security, it management, knowledge management, data management
    
Arcserve
Published By: Aria Systems     Published Date: Nov 13, 2015
In this era of cloud computing, mobile devices, and the Internet of Things (IoT), firms are testing new product offerings that combine elements of content, software, services, and hardware together. Like the innovative products themselves, the rulebook on monetizing them is evolving. Firms are shifting from one-time perpetual sales or fixed monthly subscriptions to consumption models that blend onetime, subscription, and usage-based billing (see Figure 1). CEOs recognize this shift toward business models that reflect the value of the relationship with the customer. The move to subscription and consumption business models is pervasive in almost every industry. From retailers selling subscription box sets to industrial equipment manufacturers charging based on consumption, the increase in experimentation of alternative business models is extraordinary (see Figure 2). While B2C disrupters like Netflix and Zipcar have gotten more media attention, the growth of subscription billing plat
Tags : 
    
Aria Systems
Published By: Aruba Networks     Published Date: Nov 15, 2013
802.11ac va por buen camino para convertirse en el modelo para la próxima generación de Wi-Fi. La velocidad de transmisión de gigabits, su capacidad mejorada y la fiabilidad que proporciona 802.11ac a las redes inalámbricas LAN son amplificadas ya que el número de usuarios de móviles y dispositivos, así como el uso de aplicaciones continúan creciendo a gran velocidad. Tanto como si usted es uno de los primeros que ya han empezado a planificarse como si, al igual que les sucede a diversas organizaciones, no está seguro de qué es lo siguiente que debe hacer, descárguese esta guía en cinco pasos que le ayudará a prepararse y planificar una migración exitosa a WLAN 802.11ac.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage
    
Aruba Networks
Published By: Astrocom     Published Date: Dec 13, 2007
Enterprises with mission critical applications are exploring the benefits of disaster recovery sites for their data centers to ensure business continuity. Special network technology is needed to ensure that site failover and failback occurs reliably and predictably. An ideal solution should provide reliable network connections, manage inbound and outbound traffic over multiple WAN links, failover to a secondary data center if all links at the primary data center are down, and eliminate deployment barriers and costs of multi-homing with BGP (Border Gateway Protocol).
Tags : 
data center, datacenter, data centers, business continuity, disaster recovery, backup, recovery, failover
    
Astrocom
Published By: Astrocom     Published Date: Apr 23, 2008
The Domain Name System (DNS) is a hierarchical system that provides the IP addresses that correspond to a given Fully Qualified Domain Name (FQDN, often called a hostname or domain name). At the top of the tree structure are thirteen “root” Domain Name Servers that have the primary and secondary IP addresses of the DNS Authorities for all domains on the Internet.
Tags : 
dns, ip networks, networking, network management, powerlink, astrocom, servers
    
Astrocom
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Cyber-crime is forecast to cost the global economy $6 trillion by 2021, up from $3 trillion in 2016. Described by some as the “greatest threat to every company in the world”, public concern for the safety of data is growing – not just in how criminals might use stolen data to commit fraud, but also in how personal data is used by the organizations we engage with.
Tags : 
data, cyber crime, company, personal, management, gdpr
    
AstuteIT_ABM_EMEA
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
MongoDB is an open-source, document database designed with both scalability and developer agility in mind. MongoDB bridges the gap between key-value stores, which are fast and scalable, and relational databases, which have rich functionality. Instead of storing data in rows and columns as one would with a relational database, MongoDB stores JSON documents with dynamic schemas. Customers should consider three primary factors when evaluating databases: technological fit, cost, and topline implications. MongoDB's flexible and scalable data model, robust feature set, and high-performance, high-availability architecture make it suitable for a wide range of database use cases. Given that in many cases relational databases may also be a technological fit, it is helpful to consider the relative costs of each solution when evaluating which database to adopt.
Tags : 
total, cost, ownership, comparison, mongodb, oracle
    
AstuteIT_ABM_EMEA
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
D’ici à 2021, le coût de la cybercriminalité pour l’économie mondiale devrait atteindre les 6 000 milliards de dollars, soit deux fois plus que les 3 000 milliards de dollars de 2016. En parallèle à ce que certains qualifient de « pire menace pour les entreprises du monde entier », les gens s'inquiètent de plus en plus de la sécurité de leurs données – non seulement des capacités des cybercriminels à utiliser des données volées pour usurper leur identité, mais aussi de l’utilisation de leurs données personnelles par les entreprises avec lesquelles ils interagissent.
Tags : 
rgpd, impact, sur, votre, gestion, donnees
    
AstuteIT_ABM_EMEA
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Schätzungen zufolge wird die Cyber-Kriminalität die Weltwirtschaft bis 2021 6 Billionen USD kosten. Das entspricht einer Steigerung von 3 Billionen USD gegenüber 2016. Manche Analysten bezeichnen dies bereits als die „größte Bedrohung für alle Unternehmen weltweit“. Auch das öffentliche Bewusstsein für die Datensicherheit nimmt zu. Dabei geht es nicht allein darum, wie Kriminelle gestohlene Daten in betrügerischer Weise missbrauchen könnten, sondern auch darum, wie Unternehmen und Institutionen die personenbezogenen Daten nutzen, die wir ihnen zur Verfügung stellen.
Tags : 
    
AstuteIT_ABM_EMEA
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Si prevede che la criminalità informatica possa costare all’economia globale fino a 6 trilioni di dollari nel 2021, rispetto ai 3 trilioni di dollari del 2016. Considerata da alcuni "la più grande minaccia per ogni azienda mondiale", ha alimentato il dibattito pubblico sulla sicurezza dei dati. Non solo a proposito del possibile sfruttamento criminale dei dati personali rubati ma anche del loro trattamento da parte delle aziende con cui abbiamo relazioni.
Tags : 
gdpr, l'impatto, della, normativa, sulla, gestione, dei, dati
    
AstuteIT_ABM_EMEA
Published By: Asurint     Published Date: Dec 21, 2018
Employers may ask a consumer reporting agency (CRA) to implement internal systems to evaluate background checks as part of the hiring process. An adjudication matrix (also known as a hiring matrix) is commonly used by employers to designate what types of crimes over certain time periods may make an individual ineligible for employment. An adjudication matrix will typically contain labels such as “clear” or “ineligible” that designate how the individual’s background check results lined up with the matrix.
Tags : 
    
Asurint
Published By: Aternity     Published Date: May 18, 2015
This whitepaper provides an overview of Aternity Virtual Desktop Monitoring and how it monitors end user experience in a VDI environment. Aternity goes well beyond traditional Virtual Desktop Infrastructure assessment tools that are primarily focused on planning and testing virtual deployments. Aternity provides in-depth monitoring of end user experience in a production environment spanning tens of thousands of business users.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
    
Aternity
Published By: athenahealth     Published Date: Jul 22, 2019
Medicare Advantage is expanding coverage for what it considers “primarily health related supplemental benefits.” That’s good news, not just for treating illness and injury, but for helping high-risk patients maintain their health and prevent avoidable utilization. This article discloses the new list of services to be covered under Medicare Advantage, including transportation and in-home support.
Tags : 
    
athenahealth
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Toolkit provides vital information to help you at every stage of your decision process. In this one download you'll get Aventail's SSL VPN Technical Primer (a technology overview and an objective comparison of IPSec VPNs and SSL VPNs); SSL VPN Buyer's Guide (assessment criteria and questions to ask VPN vendors); and SSL VPN Purchase Checklist (SSL VPN requirements in six feature/function categories).
Tags : 
ssl, vpn, ssl vpn, ssl vpn purchase, vpn purchase, buyers guide, buying guide, ipsec
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Technical Primer explains how SSL VPNs work, and includes an objective comparison of the distinguishing factors between IPSec and SSL VPN technologies. You'll learn why these two technologies, based on fundamentally different designs and methodologies, each serve specific use cases best.
Tags : 
ssl, vpn, ssl vpn, comparison table, comparison guide, comparison chart, ipsec, ipsec vpn
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
By 2008, SSL VPNs are expected to be the primary access method for more than two-thirds of business employees who work remotely. This white paper and companion ROI calculator worksheet, provide a working methodology and real-world scenarios to help you determine annual ROI from replacing your existing IPSec VPN with an Aventail SSL VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, roi, return on investment, secure remote access
    
Aventail
Published By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : 
aws, aws vpc, aws openvpn, aws bastion, aws remote access
    
Aviatrix
Published By: Avocent     Published Date: Aug 22, 2011
This whitepaper discusses how enterprises can take steps to optimize their data center infrastructures before experimenting with cloud computing.
Tags : 
avocent, data center infrastructure, cloud computing, power management, infrastructure, network architecture, quality of service, service oriented architecture
    
Avocent
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : 
rei, intelligent, threat, detection, edge, protection, aws, splunk
    
AWS
Published By: AWS     Published Date: Sep 23, 2019
Tanto si pertenece a un hospital público como a una compañía farmacéutica internacional, Amazon Web Services (AWS) le ayuda a agilizar procesos, mejorar la colaboración y seguridad, crear un entorno de experimentación e impulsar la innovación tecnológica. Las organizaciones del sector de la asistencia sanitaria y de las ciencias biológicas recurren a AWS para todo lo relacionado con el almacenamiento básico y los sistemas de información clínica. Y vamos más allá. Nuestro objetivo es respaldar y capacitar a los expertos para que dispongan de todo lo necesario para poder salvar vidas. Buscamos el compromiso mutuo en cada parte del proceso. Cuando es la vida lo que está en juego, solo nos conformamos con lo mejor. Descubra el futuro de la asistencia sanitaria con la nube de AWS.
Tags : 
    
AWS
Published By: AWS - ROI DNA     Published Date: Jun 12, 2018
Traditional databases and data warehouses are evolving to capture new data types and spread their capabilities in a hybrid cloud architecture, allowing business users to get the same results regardless of where the data resides. The details of the underlying infrastructure become invisible. Self-managing data lakes automate the provisioning, reliability, performance and cost, enabling data access and experimentation.
Tags : 
    
AWS - ROI DNA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.