host

Results 676 - 700 of 724Sort Results By: Published Date | Title | Company Name
By: Internap     Published Date: Jul 15, 2011
Download this webcast and learn key questions and considerations in selecting the IT Infrastructure services that best meet your business needs.
Tags : managed hosting, colocation, data center, cdn, internap, ecommerce, data center, internap, data center services, cdn, internet connectivity, cloud, private cloud, infrastructure, cloud computing, data center design and management, colocation and web hosting
     Internap
By: Internap     Published Date: Jul 15, 2011
Download this webcast featuring Tier1 Research and learn the various approaches to solve your data center footprint and power capacity challenges
Tags : managed hosting, colocation, data center, cdn, internap, ecommerce, data center, internap, data center services, cdn, internet connectivity, cloud, private cloud, infrastructure, cloud computing, data center design and management, colocation and web hosting
     Internap
By: Internap     Published Date: Jul 15, 2011
Download this webcast and learn how you can boost your multi-homed network with our FCP solution, optimizing availability and improving performance.
Tags : managed hosting, colocation, data center, cdn, internap, ecommerce, data center, internap, data center services, cdn, internet connectivity, cloud, private cloud, infrastructure, cloud computing, data center design and management, colocation and web hosting
     Internap
By: Blue Coat Systems     Published Date: Oct 24, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring, anti spyware, anti virus, application security, authentication, compliance, disaster recovery, encryption, firewalls, hacker detection, identity management, internet security
     Blue Coat Systems
By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
     Dell Storage
By: Symantec     Published Date: Oct 02, 2012
Symantec SSLCertificates Provide a Secure Bridge to Trusted Cloud Hosting Providers
Tags : cloud, ssl, symantec
     Symantec
By: Attachmate     Published Date: Mar 20, 2013
This short demo shows how Verastream Host Integrator can modernize and service-enable legacy assets for use across your enterprise. Verastream takes a flexible, scalable service-level approach to integration and gets you up and running quickly.
Tags : soa project, mobile now, mobilenow, screen scraping, terminal emulation iphone, terminal emulation ipad, networking, security, data management
     Attachmate
By: Equinix     Published Date: Jul 31, 2012
This white paper from GigaOM Pro explains the factors to consider when developing a public-to-private cloud migration or hybrid strategy, some pitfalls to avoid and a case study. Get your complimentary 40-page report now.
Tags : cdn, latency, cloud, application, host, private cloud, private, public-to-private, public, zynga, hybrid, networking, data protection, document management
     Equinix
By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : data, identity, security, network, protection, mobile, security, documents, evolution, malware, sql, web, browser, hostile, e-mail, attack, password, lockdown, trusted, dlp
     CDW Symantec
By: Mimecast     Published Date: Oct 17, 2013
"Storage Anywhere & Everywhere" is a new study by Free Form Dynamics sponsored by Mimecast. It includes lessons from expert or 'elite' organizations on how to get control of your data and make it work to your advantage.
Tags : mimecast, free form dynamics, inforgraphic, defragmentation, liberating data, controlling data, elite organizations, measure roi, understanding data, establish policies, protect your data, streamline routine, cloud services, hosted services, control corporate data, data management, security management, wireless security, productivity
     Mimecast
By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting, cloud computing, network, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, disaster recovery, email security, encryption
     Arbor Networks
By: Arbor     Published Date: Sep 20, 2013
Today’s hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations—provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a DDoS attack on their operations and calculate the ROI of an effective DDoS defense solution.
Tags : distributed denial of services, defense solutions, security, financial management, ddos attacks, ddos protection, ddos defense system, ddos protection solutions, roi, return on investment, risk management
     Arbor
By: SilverSky     Published Date: May 22, 2014
Are you looking for a Microsoft Hosted Exchange Provider? Want to see how the providers in this space stack up? The Radicati Group provides vendor analysis and reveals the Trail Blazers, Specialists, Mature Players and Top Players in this report.
Tags : silversky, ibm, microsoft hosted exchange, microsoft hosted exchange providers, email service providers, cloud, cloud business email providers, cloud business email, microsoft exchange, content delivery, messaging, cloud computing
     SilverSky
By: Viavi Solutions     Published Date: Apr 07, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
     Viavi Solutions
By: Thawte     Published Date: Dec 29, 2015
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted Certificate Authority (CA) can help enterprises conduct business in the cloud with confidence.
Tags : best practices, business management
     Thawte
By: Sitecore     Published Date: Feb 25, 2015
The forces of digital disruption have empowered consumers and inverted the power relationship between buyers and sellers. Competitive advantages based on manufacturing, distribution, and IT are no longer sustainable. Customer loyalty has all but disappeared; buyers can and will shift their allegiance immediately if disappointed. In the era of the empowered consumer, business success depends upon offering consistently outstanding customer experiences across multiple touchpoints and over the entire customer lifecycle.
Tags : content management, vendors, digital experience, optimization, web page, hosting, business, agenda, software development, enterprise applications
     Sitecore
By: Symantec Corporation     Published Date: Jun 18, 2014
Cloud computing is rapidly transforming the IT landscape, and the conversation around adopting cloud technology has progressed from “if” to “when.” Enterprises are showing strong interest in outsourced (“public”) cloud offerings that can help them reduce costs and increase business agility. These cloud services offer enormous economic benefits but they also pose significant potential risks for enterprises that must safeguard corporate information assets while complying with a myriad of industry and government regulations. Read this white paper to find out what Symantec is doing help to bridge the gap to cloud computing!
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
     Symantec Corporation
By: IBM     Published Date: Jan 09, 2014
IT-Informatik chose a full virtualization strategy, based on IBM® PowerLinux™ servers with IBM PowerVM® virtualization and Live Partition Mobility, to manage its SAP hosting services. The new solution slashes IT operational costs by more than 50 percent and enables IT-Informatik to set up new customer environments 80 percent faster.
Tags : it-informatik, sap, ibm system, ibm powerlinux, operational costs, linux enterprise, partition mobility, linux
     IBM
By: IBM     Published Date: Jan 09, 2014
Today, large organizations are being buffeted by a host of changes, many of them unexpected or unfamiliar. Business information is virtually exploding in size, kind and locale, taxing the abilities of even the most progressive enterprises to keep up. Mobile technologies and business analytics that were once exclusively used by employees with specialized needs and skills are now common across the entire workforce. As a result of all this, IT is bending under the strain of developing and delivering necessary new services while at the same time maintaining core service quality. This report will consider these issues, as well as IBM’s position in and efforts around developing next generation enterprise systems solutions, including its System z mainframes, POWER7+ processor-based Power Systems servers and System Storage offerings focused on those areas and use cases.
Tags : enterprise systems, system performance, power7+, power systems servers, system storage, it infrastructure, analytics solutions, business analytics, business processes, charles king, pund-it, inc., ibm, infrastructure, cloud computing, power and cooling, data center design and management
     IBM
By: IBM     Published Date: Feb 05, 2014
From a communications equipment manufacturer optimizing investments with a security scan to a mutual insurance company reducing spam and threats with hosted web and email services, IBM security consultants have helped many companies evaluate their existing security practices against their business requirements and objectives. Read these customer references to learn how organizations managed risk, security and compliance with help from IBM.
Tags : 
     IBM
By: Cisco     Published Date: Dec 08, 2015
Driven by budget pressures and the growth of cloud-hosted applications, mobility, and bandwidth-hogging applications such as video, many IT organizations are actively considering direct Internet access (DIA) at their branches. DIA offers two compelling benefits: (1) it can substantially reduce operating costs by freeing up costly WAN bandwidth for mission-critical applications, and (2) it offers a better experience for users accessing applications hosted in the public cloud.
Tags : direct internet access, cisco, canada, dia, wan, wide area network, networking, wireless, knowledge management
     Cisco
By: Epicor     Published Date: Sep 20, 2018
As technology improves, retailers are relying more and more on their customer service to gain an advantage and differentiate themselves from the competition. Providing a pleasant customer experience can turn a first-time shopper into a lifelong buyer. By reading this Epicor eBook, you’ll discover the important role mobile technology plays in delivering faster, service. Retailers everywhere are implementing mobile tools to empower their employees to support customers—from stock and pricing information to mobile checkout. Epicor Eagle N Series is a fully integrated retail management system that offers a whole host of mobile tools to help you service your customers, stay informed, and make decisions from anywhere. Read the eBook and learn how the mobility of Epicor Eagle N Series can provide your retail business with a competitive advantage.
Tags : retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas
     Epicor
By: Epicor     Published Date: Sep 20, 2018
As technology improves, retailers are relying more and more on their customer service to gain an advantage and differentiate themselves from the competition. Providing a pleasant customer experience can turn a first-time shopper into a lifelong buyer. By reading this Epicor eBook, you’ll discover the important role mobile technology plays in delivering faster, service. Retailers everywhere are implementing mobile tools to empower their employees to support customers—from stock and pricing information to mobile checkout. Epicor Eagle N Series is a fully integrated retail management system that offers a whole host of mobile tools to help you service your customers, stay informed, and make decisions from anywhere. Read the eBook and learn how the mobility of Epicor Eagle N Series can provide your retail business with a competitive advantage.
Tags : retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas
     Epicor
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.