Sort results by: Published date | Company name
Showing items 1-25

IT Security by the Numbers: Calculating the Total Cost of Protection [ Source: Kaspersky Lab ]

April 2014- Humorist Franklin P. Jones may have said it best: "When you get something for nothing, you just haven't been billed for it yet." These are wise words of warning for businesses counting on so-called "free" IT security software.

Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn ...

Virtualization Security Is Not an Oxymoron [ Source: Kaspersky Lab ]

April 2014- An overwhelming majority of organizations have adopted virtualized servers and those numbers are on the rise. While the business benefits of virtualization are clear-increased performance and stability and decreased hardware costs, floor space, and management oversight-the virtualized world makes your organization vulnerable to a wide array of new cybersecurity threats. Are you willing to bet your organization's IT infrastructure on your ability to combat these hazards?

The IT security and virtualization experts at ...

Transforming Traditional Intranets: Three Places to Focus [ Source: Jive ]

April 2014- Today's intranet typically looks like a frustrating mess of abandoned content - difficult for employees to use and content owners to govern. Traditional intranets are rarely mobile-friendly and can be a challenge for IT to integrate, maintain and support. It's time to transform the intranet, but what should a modern, mobile intranet look like?

At its core, the modern intranet should boil down to three fundamental focal areas:
Deliver information and expertise ...

Transparency in the Public Cloud: Eliminating Public vs Private Tradeoffs [ Source: iland ]

March 2014- It's now possible to get the same visibility in the public cloud that you have in your own data center - or even better. A Best of Interop 2014 finalist, analysts and media agree that the new iland Enterprise Cloud Services portal provides unmatched visibility into the true costs of cloud as well as performance, security and compliance data.

According to Torsten Volk, research director at Enterprise Management Associates, "iland's new portal exemplifies the ...

Powering Converged Infrastructure [ Source: Eaton ]

March 2014- Converged infrastructures utilize virtualization and automation to achieve high levels of availability in a cost-effective manner. In fact, converged infrastructures are so resilient that some IT managers believe they can be safely and reliably operated without the assistance of uninterruptible power systems (UPSs), power distribution units (PDUs) and other power protection technologies. In truth, however, such beliefs are dangerously mistaken.

This white paper explores the factors that make converged infrastructures inherently resilient, explains ...

Can Your Virtualization Software Handle A Power Outage? [ Source: Eaton ]

March 2014- Server virtualization empowers businesses to lower hardware spending, simplify administration and boost availability. It's no surprise, then, that nearly 80 percent of server workloads supported by x86 hardware will be running on virtual machines (VMs) by 2016, according to analyst firm Gartner Inc.

For IT and facilities managers, however, server virtualization introduces both challenges and opportunities. In particular, while it makes preventing downtime during utility failures dramatically easier, provided your data center is equipped with ...

The State of The Modern Data Center: Transforming IT into a Strategic Business Asset [ Source: Equinix ]

March 2014- To leverage the full potential of today's data centers, progressive technology decision makers are transforming traditional facilities into core business assets that support revenue-generating initiatives and other long-term goals. This and other important trends that reflect how enterprise executives are aiming to expand their use of managed, colocation and third-party cloud services are explored in detail in "The State of the Modern Data Center," a comprehensive new study by UBM Tech that surveyed nearly 450 IT ...

Organization Ensures Performance & Security with Network Visibility [ Source: Gigamon ]

March 2014- Read this case study to learn how an R&D organization built a monitoring infrastructure to gain pervasive traffic visibility to meet performance and security requirements.

Visibility for Converged Infrastructure Solutions [ Source: Gigamon ]

March 2014- Advancements in technologies have led to significant growth in converged infrastructure solutions, which offer the IT organization many benefits. But as servers, networking, and storage become commoditized in converged infrastructure solutions, application traffic and end-user activity becomes more and more difficult to monitor and manage.

Learn how the solutions provided by Gigamon allow organizations to maintain pervasive visibility in the world of converged infrastructure.

Visibility in the Modern Data Center [ Source: Gigamon ]

March 2014- As data center technology goes virtual and converges, resources become invisible to your monitoring tools. Learn how you can reveal those silos of IT.

Reap the Benefits of the Evolving HPC Cloud [ Source: IBM ]

March 2014- The necessary compute power to drive modern biomedical research is a formidable and familiar challenge throughout the life sciences. Underlying infrastructures must evolve to keep pace with innovation.

IBM Technical Computing Infographic [ Source: IBM ]

March 2014- IBM Technical Computing delivers powerful, innovative solutions to customers' most challenging and complex problems, enabling businesses and researchers to innovate, achieve breakthrough results and establish sustainable competitive advantage.

Unleashing the Power of High-Performance Computing eBook [ Source: IBM ]

March 2014- High-performance computing (HPC) continues to transform capabilities of organizations across a range of industries, whether the Human Genome Project or aerodynamics testing for race cars, we demonstrate how IBM Platform Computing solutions offer effective ways to unleash the power of HPC.

Energize your Unified Communications with SIP [ Source: XO Communications ]

March 2014- For IT decision makers in medium to large- sized businesses, this white paper presents an overview of the Session Initiation Protocol (SIP) standard, business applications for SIP trunking, and the advantages of SIP as an enabler for unified communications.

Checklist from ESG to Compare Online File Sharing Solutions [ Source: Egnyte ]

March 2014- Asking the right questions is critical in selecting an online file sharing solution. This ESG brief, provides a checklist of questions and criteria around administration, security, service, and support to help IT professionals pick the right solution

eBook: Achieve deeper network security and application control [ Source: Dell Software ]

March 2014- Learn about how your NGFW must be able to deliver a deeper level of network security to safeguard your organization from ever-evolving threats.

Getting Started With a Zero Trust Approach to Network Security [ Source: Palo Alto Networks ]

March 2014- The continued, high frequency of successful cyberattacks against today's enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. The failure of resulting architectures is a product not only of the outdated assumption that everything on the inside of an organization's network can be trusted, but also the inability of legacy countermeasures to provide adequate visibility, control, and protection of application traffic transiting associated network boundaries.

This paper ...

Threat Intelligence: Are you getting what you need? [ Source: BAE Systems Applied Intelligence ]

March 2014- Operationalizing your threat intelligence is vital to your business success. Malicious cyber criminals continue their relentless attack campaigns utilizing ever-changing techniques to compromise victims and wreak havoc in one form or another. Recent attacks are highly targeted and are designed to maximize the criminals' business goals.

The following questions are answered in this new whitepaper:

What is threat intelligence?
Who consumes threat intelligence?
How to apply threat intelligence?

Preparing the Physical Infrastructure of Receiving Data Centers for Consolidation [ Source: APC by Schneider Electric ]

February 2014- The consolidation of one or more data centers into an existing data center is a common occurrence. This paper gives examples of what is becoming a standard architecture for preparing the physical infrastructure in the receiving data center. This approach allows for shorter timelines and high efficiency while avoiding the commonly expected difficulties and complexities often experienced with consolidation projects.

Choosing between Room, Row, and Rack-based Cooling for Data Centers [ Source: APC by Schneider Electric ]

February 2014- Latest generation high density and variable density IT equipment create conditions that traditional data center cooling was never intended to address, resulting in cooling systems that are oversized, inefficient, and unpredictable. Room, row, and rack-based cooling methods have been developed to address these problems. This paper describes these improved cooling methods and provides guidance on when to use each type for most next generation data centers.

Comparing Data Center Power Distribution Architectures [ Source: APC by Schneider Electric ]

February 2014- Significant improvements in efficiency, power density, power monitoring, and reconfigurability have been achieved in data center power distribution, increasing the options available for data centers. This paper compares five power distribution approaches including panelboard distribution, field-wired PDU distribution, factory-configured PDU distribution, floor-mount modular power distribution, and modular busway, and describes their advantages and disadvantages. Guidance is provided on selecting the best approach for specific applications and constraints.

An Improved Architecture for High-Efficiency, High-Density Data Center [ Source: APC by Schneider Electric ]

February 2014- Data center power and cooling infrastructure worldwide wastes more than 60, 000, 000 megawatt-hours per year of electricity that does no useful work powering IT equipment. This represents an enormous financial burden on industry, and is a significant public policy environmental issue. This paper describes the principles of a new, commercially available data center architecture that can be implemented today to dramatically improve the electrical efficiency of data centers.

Virtualization and Cloud Computing : Optimized Power, Cooling, and Management Maximizes Benefits [ Source: APC by Schneider Electric ]

February 2014- IT virtualization, the engine behind cloud computing, can have significant consequences on the data center physical infrastructure (DCPI). Higher power densities that often result can challenge the cooling capabilities of an existing system. Reduced overall energy consumption that typically results from physical server consolidation may actually worsen the data center's power usage effectiveness (PUE). Dynamic loads that vary in time and location may heighten the risk of downtime if rack-level power and cooling health are ...

Raising the Bar for IT Service Management: EMA's Look at BMC Remedy OnDemand [ Source: BMC Software ]

February 2014- Increasingly, enterprise organizations are moving to the cloud for IT Service Management (ITSM)-but is cloud delivery right for your business? Learn about the changing face of ITSM and gain the perspective needed to make the right ITSM decision for your organization. Get the free white paper from Enterprise Management Associates.

Cloud Benefits for the IT Service Management Market [ Source: BMC Software ]

February 2014- Analysts predict that soon, half of all new IT service desk tools will be adopted as cloud-based services. While shifting to an on-demand model can be a complex decision that requires organizations to carefully assess the potential impact on business operations, a growing number of companies are clearly finding the move worthwhile.

This paper explores the reasons for the rapid growth of cloud-based IT service management (ITSM) solutions and the benefits they offer ...

The Perfect Combo : ITIL, ITSM and Social Media [ Source: BMC Software ]

February 2014- What happens when you take best practices for IT service management (ITSM), add technology to support those practices, and then throw social media into the mix? BMC explores how best-in-class organizations are leveraging these to drive user satisfaction and organizational success. Download the white paper now.

Next 25