TECH DIGITAL RESOURCE LIBRARY

Cloud

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Maximizing the Speed of Business: Case Study of Growth and Customer Engagement

by 8x8Dec 17, 2018

Having the right communications technology in place as your company grows can boost customer service and enable agility, productivity and collaboration across employees to improve your bottom line. Learn how one enterprise made it happen. In this webinar, Kevin Dunn, CIO at US Retirement Partners will join Irwin Lazar, VP at Nemertes Research for a deep dive on how to leverage a single cloud-based voice, video, collaboration and contact center solution to drive quantifiable business value,


Consistency is Key with Cloud Security

by FireMon (Secure Passage)Nov 27, 2018

When it comes to cloud security, consistency is everything ? your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments. Cloud security breaches have not been the result of brilliant criminal masterminds. Rather, they have been the result of self-inflicted errors that are often caused by faulty migration and deployment practices ? particularly when the right security personnel are excluded from the


The 3 Key Technologies to Transform Customer Experience

by SerenovaNov 15, 2018

Enterprises that seek to transform the customer experience have focused in on three critical technologies: Cloud Omnichannel Analytics But many enterprises remain unclear about exactly what these technologies are and how they will actually be used to create the customer experience of the future. In this expert-led webinar, Sebastian Menutti of Frost & Sullivan will provide research data and in-depth analysis that will help you understand the technologies that will drive the transformation of


Enterprise Software Options: Legacy vs. Cloud

by InformationWeekDec 05, 2018

InformationWeek's December Trend Report helps IT leaders rethink their enterprise software systems and consider whether cloud-based options like SaaS may better serve their needs.

Enterprise applications and software systems have a reputation for being clunky, expensive, and almost impossible to keep up to date, but that doesn't need to be the case. Rethinking your software strategy to include cloud options like SaaS can reap benefits, but beware the pitfalls.

IN THIS


Lamba Architecture with In-Memory Technology: Building the Data Warehouse of the Future

by Dell EMC Intel®Oct 23, 2018

Legacy data warehouses are no longer meeting today's need for fast, ongoing access to detailed analytics. Instead, organizations need a new type of data warehouse based on two-tier Lamba architecture accelerated by in-memory technology. This data warehouse of the future offers the performance they need while keeping costs low.

The easiest way to transition to this data warehouse of the future is a four-step process. Enterprises often begin by offloading their ETL processes to Hadoop,


Want Security in the Cloud? Look to Identity First

by OktaAug 15, 2018

Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations.


The Forrester Tech Tide on Everything You Need to Implement a Zero Trust Strategy

by CyxteraSep 21, 2018

Read the complimentary Forrester analysis of the maturity and business value of the 25 technology categories that support Zero Trust threat prevention.


Definitive Guide to Software-Defined Perimeters

by CyxteraSep 21, 2018

Today's network security reality has changed. It's time for an identity-centric, zero-trust approach and it's called a Software-Defined Perimeter. The Definitive Guide discusses the core principles of SDP, the technical architecture - 'authenticate-first, connect second,' and uses cases. Learn more about the most comprehensive SDP solution in the market that goes beyond the SDP-spec to provide an adaptive, identity-centric full network platform built for the hybrid enterprise.


How VPNs and Firewalls Put You at Risk

by CyxteraSep 21, 2018

Security threats, employee work habits, and IT infrastructure have all changed to make VPNs and Firewalls less relevant -- and potentially even dangerous -- to your organization.


Are Your Network Users Over-Privileged?

by CyxteraSep 21, 2018

Businesses today protect against all sorts of cyber threats - hackers, malicious insiders, inadvertent actors, and even state-sponsored cyber attacks. One category that often goes underrepresented in conversations about prevention is privileged users. Are your network users over-privileged?


SUBTOPICS:

Cyxtera

Headquarters: Coral Gables, Florida

Cyxtera provides data center colocation, enterprise application cloud computing provider, hybrid cloud, cybersecurity and analytics solutions.


Dell EMC Intel®

Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.


InformationWeek

Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Okta

Okta is the foundation for secure connections between people and technology. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. Today, thousands of organizations trust Okta to help them fulfill their missions as quickly as possible.


Serenova

Serenova