architecture

Results 1 - 25 of 1437Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : security, enterprise network, firewall, cisco, gartner, magic quadrant
     Cisco
By: Red Hat     Published Date: Feb 25, 2019
How to strike the balance between your existing systems and emerging technologies. Many organizations are struggling with the pressure to adopt cloud-native architectures while maintaining existing conventional systems. A virtualized infrastructure can connect your new and old systems. This IDC paper helps you achieve the ideal balance by: Embracing the new without disrupting the current infrastructure. Preparing for next-generation computing requirements. Enabling agile application delivery to compete and win. Read the IDC whitepaper to learn more about balancing your investment in new and existing systems.
Tags : 
     Red Hat
By: Gigamon EMEA     Published Date: Feb 20, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
     Gigamon EMEA
By: Gigamon EMEA     Published Date: Feb 20, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
     Gigamon EMEA
By: Gigamon EMEA     Published Date: Feb 20, 2019
IDG survey confirms: CEOs consider cybersecurity a top priority. Get “Countering Escalating Cyberthreats” and improve your threat visibility across the entire network. As CEOs struggle with the risks of a digital business, it is time to adopt a more holistic approach to security. You can distribute traffic to the right tool at the right time, eliminate network weaknesses and keep your CEO happy. Read now.
Tags : 
     Gigamon EMEA
By: Lenovo - APAC     Published Date: Jan 28, 2019
Australian businesses have long been recognised as leaders in the adoption of cloud services and the migration of core infrastructure to cloud platforms. Yet as ambitious ‘cloud-first’ programs are executed, performance and complexity issues have led many organisations to embrace the middle ground – a hybrid IT solution combining public cloud and on-premises infrastructure. Fast-growing hyperconverged infrastructure (HCI) platforms are increasingly being recognised as an ideal enabler for this strategy, with a software-based design that combines robust computing infrastructure with a high degree of centralisation, integration, flexibility, and analytics-based monitoring and manageability. Read how companies such as Beam Suntory have redefined enterprise architecture and learn more about the way an integrated hyperconverged infrastructure can help you build the right infrastructure for the future.
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Jan 28, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as theydo not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Feb 11, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as theydo not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Dell SB     Published Date: Jan 24, 2019
Whether we choose to or not , our businesses are undergoing a rapid digital transformation. To ride this technology wave successfully, we need a modern IT infrastructure. At the heart of this modern IT infrastructure is the server. Choosing the right server that fits both the current and future needs is critical. PowerEdge is introducing its new line of award winning servers that is custom - built for the modern IT infrastructure. Since b usiness face fierce competition and dynamic customer needs, the Scalable Business Architecture from PowerEdge enables an enterprise to scale efficiently and adapt quickly to address this dynamic business & workload needs. With Intelligent Automation in new PowerEdge , you can automate more routine tasks and free up skilled resources for business - critical tasks. Finally, w e all know how important security is for all operations. PowerEdge protects businesses and their customers with its sophisticated Integrated Security fea
Tags : 
     Dell SB
By: Group M_IBM Q119     Published Date: Mar 04, 2019
There can be no doubt that the architecture for analytics has evolved over its 25-30 year history. Many recent innovations have had significant impacts on this architecture since the simple concept of a single repository of data called a data warehouse. First, the data warehouse appliance (DWA), along with the advent of the NoSQL revolution, selfservice analytics, and other trends, has had a dramatic impact on the traditional architecture. Second, the emergence of data science, realtime operational analytics, and self-service demands has certainly had a substantial effect on the analytical architecture.
Tags : 
     Group M_IBM Q119
By: Genesys     Published Date: Feb 12, 2019
Everyone says they’re “in the cloud,” but most technology leaders would agree that not all clouds are created equal. When evaluating a cloud contact centre solution for your business, it’s important to understand the difference between a true Cloud 2.0 application and traditional software, including which features to look for and why those features are important. Download this eBook and learn: How a true Cloud 2.0 model is built to provide levels of reliability, scalability, flexibility and security that that far exceed those of previous generations The benefits of utilising a platform built on microservices architecture How to take your business to the next level with a built to scale cloud contact centre platform
Tags : 
     Genesys
By: Bell Micro     Published Date: Jun 14, 2010
This paper discusses how the IBM XIV Storage System's revolutionary built-in virtualization architecture provides a way to drastically reduce the costs of managing storage systems.
Tags : bell micro, ibm xiv, storage system management, virtualization architecture, storage area networks, storage management, storage virtualization
     Bell Micro
By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : bell micro, hardware, storage management, vmware, ibm xiv, network architecture, server hardware
     Bell Micro
By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
As the march toward a forward secrecy world continues, what options do you have to inspect and act as an intermediary? Join David Holmes as he presents options to maintain visibility in the SSL service chain.
Tags : ssl visibility, passive inspection architecture
     F5 Networks Singapore Pte Ltd
By: NEC     Published Date: Aug 26, 2009
This is a case study which shows how Leicester Theatre Trust (LTT) implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC.
Tags : curve, nec, ltt, unified communications, architecture, service oriented architecture, soa, soc, service oriented communications, web service management, service management
     NEC
By: NEC     Published Date: Aug 25, 2009
This is a case study which shows how Voorhees College implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC to provide students, faculty and staff in five locations with software-based voice and desktop communications tools to achieve a 40 percent savings over its previous traditional telephony solution.
Tags : voorhees, nec, desktop communications, communications, service orientated, widearea network, wan, unified communications architecture, tco, soa, ip networks, ip telephony, service oriented architecture
     NEC
By: NEC     Published Date: Sep 14, 2009
This white paper is a business briefing for C-Level Executives on how integrating a range of technologies - including unified communications, service oriented architecture, virtualization and cloud computing - can transform the productivity and profitability of large enterprises.
Tags : nec, virtualization, soa, service oriented architecture, cloud computing, unified communications, sla, slas, service level agreement, vaas, mashup, enterprise communications, enterprise software
     NEC
By: NEC     Published Date: Sep 29, 2009
Written by: IDC Abner Germanow, Jonathan Edwards, Lee Doyle IDC believes the convergence of communications and mainstream IT architectures will drive significant innovation in business processes over the next decade.
Tags : it architecture, idc, automation, automated order processing, soa, service oriented architecture, soap, http, xml, wsdl, uddi, esbs, jee, .net, crm, san, business process automation, business process management, configuration management, edi
     NEC
By: ASG Software Solutions     Published Date: May 28, 2009
Organizations are drowning in content. They don't know what they have, and they can't find what they need when they need it. While they spend significant time and money to manage content stored among a host of disconnected systems, their efforts are less than fully effective.
Tags : asg, sla, cmdb, bsm, metadata, metacmdb, lob, automation, it value chain, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, best practices, business analytics, business intelligence, business management, business process management
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Feb 23, 2010
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.
Tags : asg, cmdb, virtualization, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
     ASG Software Solutions
By: BitGravity     Published Date: Dec 17, 2009
This paper outlines the seven essential buying criteria that every decision-maker needs to consider when making a decision on a video delivery provider. These buying criteria are shared across the gamut of small, video-centric startups and established, familiar media giants.
Tags : bitgravity, video delivery, legacy cdns, network architecture, internet video, file management, total cost ownership, proxy cache, bandwidth management, infrastructure, traffic management, content delivery
     BitGravity
By: SAP     Published Date: Feb 03, 2017
As the global business world shifts to all digital, real-time operations, the legacy two-tier ERP architecture so many businesses have relied on to bridge headquarters with subsidiaries can no longer compete effectively. A simple and comprehensive answer exists in SAP S/4HANA. Available in cloud and on-premise, SAP S/4HANA gives organizations the ability to utilize the same product family across a multi-tier deployment.
Tags : 
     SAP
By: Red Hat     Published Date: Sep 09, 2018
As applications and services become more central to business strategy, and as distributed methodologies like agile and DevOps change the way teams operate, it is critical for IT leaders to find a way to integrate their backend systems, legacy systems, and teams in an agile, adaptable way. This e-book details an architecture called agile integration, consisting of three technology pillars—distributed integration, containers, and APIs—to deliver flexibility, scalability, and reusability.
Tags : 
     Red Hat
By: Cisco     Published Date: Dec 20, 2018
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what your organization needs and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco® Digital Network Architecture (Cisco DNA™) is your team’s bridge to an intentbased network. It is an open, extensible, software-driven architecture that accelerates and simplifies your enterprise network operations, while lowering costs and reducing your risk. Only Cisco provides a single network fabric that is powered by deep intelligence and integrated security to deliver automation and assurance across your entire organization at scale. Cisco DNA gives IT time back from time-consuming, repetitive network configuration tasks so you can focus on the innovation your business needs. Cisco DNA automation and assurance are built on a Software-Defined Networking (SDN) controller, ri
Tags : 
     Cisco
By: Cisco     Published Date: Dec 11, 2018
WAN edge infrastructure is changing rapidly as I&O leaders responsible for networking face dynamic business requirements, including new application architectures and on-premises and cloud-based deployment models. I&O leaders can use this research to identify vendors that best fit their requirements. By year-end 2023, more than 90% of WAN edge infrastructure refresh initiatives will be based on virtualized customer premises equipment (vCPE) platforms or software-defined WAN (SD-WAN) software/appliances versus traditional routers (up from less than 40% today).
Tags : 
     Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.