critical application

Results 276 - 300 of 452Sort Results By: Published Date | Title | Company Name
By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : ibm ouncelab, secure web application, software development lifecycle, security integration, risk management, testing, application security, security management, product lifecycle management, software testing, web development, web service security
     IBM Software
By: IBM Software     Published Date: Aug 04, 2010
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why application security is a critical priority for 2010 and beyond. He will highlight the drivers in the marketplace, define what application security encompasses, explain the business impact of developing an application security strategy, provide insight into how to get started on implementing an application security process, and give examples of best practices of a solid application security approach.
Tags : ibm ouncelab, application security tools, best practices, database management, network security, security management, application security, security, security administration, network security appliance, database development, database security, data warehousing
     IBM Software
By: EMC Corporation     Published Date: Jun 14, 2013
Transform your Microsoft Application environment with simple, efficient, and flexible virtualization solutions. EMC VSPEX Private Cloud solutions improve accessibility, centralize management, and increase performance for mission critical Microsoft Applications.
Tags : servers, accessibility, centralization, microsoft application, virtulization solution, cloud, networking, security, enterprise applications, storage
     EMC Corporation
By: EMC Corporation     Published Date: Jun 14, 2013
Private cloud improves performance and reliability for mission-critical applications supporting humanitarian projects.
Tags : private cloud, cloud, reliability, performance, applications, data growth, digital, technology, enterprise storage, virtualization, data protection, security, enterprise applications, storage, data management
     EMC Corporation
By: TeamQuest     Published Date: Mar 04, 2013
Virtualization and cloud architectures can actually make it harder to deliver consistent performance to critical applications. Best practice performance management can help IT virtualize applications that require guaranteed performance.
Tags : virtualization, network, performance, cloud, cloud computing, enterprise applications, backup and recovery, blade servers, storage virtualization, application performance management
     TeamQuest
By: IBM     Published Date: Oct 01, 2012
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher
Tags : disaster recovery, backup and recovery, ibm power systems, automated virtualization management, virtualization, downtime, mission-critical applications, servers, storage virtualization
     IBM
By: IBM     Published Date: Jul 11, 2012
This paper discusses the challenges of managing applications in highly dynamic IT environments such as public and private Clouds. Modern enterprise applications are engineered for agility and are frequently deployed over flexible IT infrastructures.
Tags : modern applications, architectures, infrastructure, cloud, dynamic it, web traffic, scalability, reliability, flexibility, public cloud, private cloud, mission-critical applications, custom applications, service oriented architecture, soa, virtualization, addm, diagnostics, discovery, end-user monitoring
     IBM
By: VASCO     Published Date: Jul 12, 2012
Read more of this whitepaper to explore critical elements in which strong authentication solutions can be applied with SaaS applications to help drive adoption and improve user experience.
Tags : vasco, cloud computing, technology, saas applications, authentication, security, security management, application integration, application performance management, vulnerability management
     VASCO
By: CDW     Published Date: Mar 27, 2015
Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of workers raised on mobile technologies. Consumer devices and bring-yourown-device (BYOD) programs are driving a new wave of business process innovation, changing the way customers, employees and partners interact with organizations and with each other. In fact, mobile devices and applications are catching up with — and in many cases surpassing — PCs in the quality and functionality of their applications.
Tags : mobile, application, content, innovation, functionality, customer, employee, smartphone, tablet, device, consumerization, wireless, data management
     CDW
By: CDW     Published Date: Aug 28, 2015
The virtualization of Tier 1 mission critical applications has long lagged the virtualization of Tier 2 and Tier 3 apps in large part due to concerns about performance availability and management. The availability of Priority Optimization on HP 3PAR StoreServ Storage eases these concerns while giving organizations the confidence to accelerate their virtualization of Tier 1 apps.
Tags : storage, servers, cloud computing, architecture
     CDW
By: CDW     Published Date: Aug 28, 2015
It’s the last storage architecture you will ever need—regardless of whether your organization is a small or midsized business, a large global enterprise, or a service provider. With a range of models to meet the needs of small to large data centers running key business applications up through enterprise-wide deployment of mission-critical applications and beyond, HP 3PAR StoreServ Storage has you covered.
Tags : storage, servers, cloud computing, architecture, distributed computing, storage management, storage virtualization, data center design and management
     CDW
By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : "advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense", security, it management
     McAfee
By: VMTurbo     Published Date: Aug 15, 2013
This whitepaper explores the challenges and best practices of virtualizing business critical applications. It examines key issues and identifies major practical barriers that organizations face in this task, concluding with advice for implementing an effective solution.
Tags : virtualize, business critical applications, effective solution
     VMTurbo
By: VMTurbo     Published Date: Oct 25, 2013
Businesses receive a number of benefits from running their IT operations within virtualized cloud environments, including: automation, economics and efficieny. Yet, as more mission-critical applications and workloads are run within cloud environments, IT staff lack the means for effective management. Businesses need new tools that meet cloud-era demands and deliver the same benefits as cloud computing itself: automation, economics and efficiency.
Tags : vmturbo, operations manager, vmturbo operations manager, it management, cloud, cloud computing, applications, workload, virtualization, cloud environments, automation, economics, efficiency, it infrastructure, business process automation
     VMTurbo
By: VMTurbo     Published Date: Dec 09, 2013
Learn the best practices of virtualizing business-critical applications and overcome the major challenges that your organization might be facing with your virtualization management.
Tags : vmturbo, virtualization, business critical applications, applications, applications management, consolidation, workload, application performance, shared peak provisioning, spp, spp mangement, it management, platforms, application performance management, application integration, analytical applications
     VMTurbo
By: VMTurbo     Published Date: Feb 11, 2014
Explore the challenges and best practices of virtualizing business-­critical applications. Identifies major practical barriers that organizations face so you don't have to.
Tags : vmturbo, virtualization, virtualizing business, business-critical, business applications, controlling interference, consolidation, managing spp, critical workloads, real time, spp management, application silos, deployment, application performance, application workloads, best practices, efficient virtualization, infrastructure, application integration, server virtualization
     VMTurbo
By: VMTurbo     Published Date: Feb 11, 2014
These new software-defined capabilities, enabling enterprises and service providers bridge the gap between software-defined flexibility and the true business potential of the Software-Defined Datacenter.
Tags : vmturbo, software-defined datacenter, sddc, virtualization, virtualizing business, business-critical, business applications, enabling enterprises, service providers, big data, process automation, decision automation, data management, cloud computing
     VMTurbo
By: VMTurbo     Published Date: Mar 25, 2015
Virtualization 1.0 vs. Virtualization 2.0: Where Are You? Virtualization 1.0 is marked by the ability to virtualize, monitor, and react to problems across the environment as they occur. Ever cognizant of the performance limitations that typify higher workload densities, Virtualization 1.0 hesitates to virtualize the critical applications that would be most beneficial. Virtualization 1.0 is limited by the inherent complexities of virtualization. Virtualization 2.0 is marked by complete, proactive control over the virtual environment. Virtualization 2.0 virtualizes up to 100% of its applications, guided by an intelligent abstraction that continually drives the environment to its desired state. Virtualization 2.0 is the promise of virtualization brought to fruition.
Tags : vmturbo, virtualization, it economic model, virtual environment, it management solutions, it management, knowledge management, enterprise applications
     VMTurbo
By: New Relic     Published Date: Mar 17, 2015
Application performance management (APM) focuses on monitoring, maintaining, and optimizing the performance and health of business applications across development, test, datacenter, and network environments. As mission-critical enterprise application environments become more complex because of the increased use of cloud, big data, and mobility, APM is becoming a top priority for IT teams that need to quickly and cost effectively track end-to-end application performance, identify and remediate the root cause of performance problems, and maintain service levels required by end users and business stakeholders. SaaS-delivered APM solutions offer rapid time to value for IT organizations that need to implement APM quickly with minimal disruption to the business.
Tags : apm, application performance management, big data, application performance, mobility, data center, data management, application integration, business intelligence, business management, server virtualization
     New Relic
By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
     Box
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security, it management, wireless, knowledge management
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : cloud, date security, cloud security, virtualization, security, networking, it management
     CDW-Trend Micro
By: Mitel     Published Date: Sep 22, 2015
In business, as in baseball, communication and collaboration are critical to working like a team toward a common goal. Having the right equipment can be a big part of that. Chances are, you’ve already moved some of your business applications to the cloud, which will better prepare you for working communications into your cloud lineup. If you still haven’t unified your communications in the cloud, now might be the best time to act—before the competition gets a competitive edge. As it turns out, the strategies that work in baseball also make a lot of sense when filling out your cloud solutions lineup. By arranging your cloud investments in the right order, you’ll score more revenue, drive in more ROI and maybe even shut out the competition.
Tags : cloud, communication, collaboration, revenue, roi
     Mitel
By: HPE Intel     Published Date: Mar 09, 2016
State agency and higher education CIOs are under intense pressure to modernize their legacy IT systems. Whether that requires moving from one infrastructure to another, or moving to or from the cloud, the chief challenge remains: How to migrate data and applications without disrupting critical operations, ensure improved performance and avoid pricing and other traps that often accompany virtualizing in the cloud. Learn what’s made the difference in overcoming the impediments to workload migrations from IT leaders who’ve lived through big data and application moves. Topics include: Preparing workloads for cloud on-boarding – and off-boarding Tools for simplifying the consolidation and migration of apps and supporting services Forecasting workloads, and planning for associated testing, training, and other costs
Tags : 
     HPE Intel
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.