aws

Results 51 - 75 of 428Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Nov 13, 2017
Read the ebook and learn how to guard your MS Office 365 data against malicious or accidental data loss with NetApp Cloud Control and AWS.
Tags : 
    
NetApp
Published By: AWS     Published Date: Jun 15, 2016
Cloud in the enterprise has grown up. It’s no longer just a sandbox for developers, or a sneaky backdoor way for business units to get more IT resources fast. Now, IT leaders are seeing the big picture: cloud as the de facto model for delivering the whole of IT to the whole of the business. Increasingly, they’re adopting a Cloud-First mindset.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 15, 2016
If cloud architectures were human beings, their development stage would fall squarely in the middle of adolescence. Enterprises are at an inflection point with their cloud deployments as they migrate from ad hoc projects to full-fledged, mature, integrated cloud architectures. The discussion around cloud reflects the trepidation and uncertainty that come with adolescence: Cloud advocates express excitement, whereas others voice concern about these developments.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 15, 2016
The cloud is now the center of most enterprise IT strategies. Many enterprises find that a well-planned “lift and shift” move to the cloud results in an immediate business payoff. This whitepaper is intended for IT pros and business decision makers in Microsoft-centric organizations who want to take a cloud-based approach to IT and must modernize existing business-critical applications built on Microsoft Windows Server and Microsoft SQL Server. This paper covers the benefits of modernizing applications on Amazon Web Services (AWS) and how to get started on the journey.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 15, 2016
Learn about the key benefits of extending your IT infrastructure to the highly reliable, scalable, low-cost infrastructure platform in the AWS cloud.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 15, 2016
Netflix, one of the world’s leading Internet television networks, is using AWS to deliver billions of hours of content monthly, and run its analytics platform for optimum performance of its global service.
Tags : 
    
AWS
Published By: AWS     Published Date: Aug 30, 2017
SAP workloads represent the backbone of your business, supporting critical systems and processes across organizations: inventory planning, HR, payroll, sales, and more. Learn how running SAP on AWS cuts costs, improves performance, and ensures the reliability and compliance scalable companies need. Download your copy now!
Tags : 
aws, accenture, sap, payroll, efficiency
    
AWS
Published By: CA Technologies     Published Date: Sep 13, 2017
"Companies have complied with data protection directives and regulations for more than two decades. But the General Data Protection Regulation (GDPR), an overhaul of existing European Commission data protection legislation, aims to strengthen and unify those laws for EU citizens. Primary GDPR objectives are to give citizens back control over their personal data and simplify the regulatory environment for international business. For organizations already compliant with Directive 95/46/EC, what do they need to do from a technology perspective to comply with GDPR? Read this solution brief to see how CA can help you with GDPR compliance."
Tags : 
    
CA Technologies
Published By: Wasabi     Published Date: Oct 26, 2017
At Wasabi, we believe that storage should be simple, inexpensive, interchangeable, reliable, fast and readily available to anyone who needs it. Just like bandwidth or electricity. Not only that it is mission critical. As data storage needs grow, both in terms of volume and leverage-ability, next generation cloud storage will become more and more of a necessity. In this White Paper Wasabi discusses that and more through their ‘5 Immutable Laws for Storing ALL Your Data in the Cloud.’ Free Trial Available: 1 TB. 30 Days. No Credit Card Required.
Tags : 
cloud storage, big data, hot storage, data protection, amazon s3
    
Wasabi
Published By: Bluecore     Published Date: Oct 23, 2018
If you’re not one of those retailers, you’re likely busy playing catch-up to them – and that’s not a position in which anyone wants to be. Since eCommerce began, a small handful of leaders have set the pace. They’ve innovated quickly and delivered incredibly valuable and convenient shopping experiences. And in doing so, they shaped consumer expectations. Take Amazon. Over a decade ago, the online giant seemingly rewrote the natural laws of retail by managing to deliver more, better, faster – all with unmatched accuracy and ease. Now, consumers expect an Amazon-like experience everywhere they shop, and anything else feels subpar.
Tags : 
email, personalization, retailer, shopping, consumer, bluecore
    
Bluecore
Published By: Turbonomic     Published Date: Jul 05, 2018
Turbonomic enables organizations to understand - and compare - the precise costs of migrating optimized workloads from on-premises data centers to the public cloud, including licensing models and discounting mechanisms such as RIs and Azure Hybrid Use Benefit (AHUB). This on demand webinar explains the Turbonomic process, including customer case studies.
Tags : 
    
Turbonomic
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations using machine data platforms like Splunk recognize the importance of consolidating disparate data types for top-down visibility, and to quickly respond to critical business needs. Machine data is often underused and undervalued, and is particularly useful when managing infrastructure data coming from AWS, sensors and server logs. Download “The Essential Guide to Infrastructure Machine Data” for: The benefits of machine data for network, remote, web, cloud and server monitoring IT infrastructure monitoring data sources to include in your machine data platform Machine data best practices
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
    
SecureAuth
Published By: Dell EMC     Published Date: Apr 18, 2017
In this report we’ll explore comparing the cost of an on-site hyperconverged solution with a comparable set up in the cloud. The on-site infrastructure is a Dell EMC VxRailTM hyperconverged appliance cluster and the cloud solution is Amazon Web Services (AWS).
Tags : 
cost, cloud, hyperconverged, hyperconverged infrastructure, aws, amazon web services, dell emc
    
Dell EMC
Published By: IBM     Published Date: Oct 26, 2017
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so starting May 25, 2018.
Tags : 
gdpr, data protection, right to access, data breach, personal data
    
IBM
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : 
byod, device discovery, data privacy, data security, it security, security, it management, data management, business technology
    
Kaspersky Lab
Published By: Workforce Software     Published Date: Feb 02, 2015
Leave administration is one of the most challenging aspects of workforce management and an area that continues to become more complicated as leave regulations—and lawsuits—increase. For employers, having to understand and comply with complex federal regulations, such as the Family and Medical Leave Act (FMLA), in addition to myriad local laws, union rules and company policies can be overwhelming. The task of complying with these many regulations often consumes a great deal of time for HR teams, especially those operating across multiple geographies.
Tags : 
workforce software, software, automate, outsource, fmla, act, cloud, management, employee leave, strategy, human resource technology
    
Workforce Software
Published By: Workforce Software     Published Date: May 26, 2015
New labor laws are a regular occurrence these days… and yet they’re just a small slice of your compliance demands. To help you stay informed and effective, our Director of Compliance takes an annual look at some of the biggest upcoming challenges and lets you know how to prepare.
Tags : 
workforce software, software, automation, budgets, costs, compliance, visibility, labor, productivity, risk, attendance, work ours, pay rate, absence, alerts, support, policies, integration, cloud, enterprise
    
Workforce Software
Published By: Intralinks     Published Date: Feb 23, 2016
To explore the impact of evolving data privacy regulations and data sovereignty, Ovum was commissioned in Q3 2015 by Intralinks to conduct an international survey of 366 IT decision-makers.
Tags : 
intralinks, data privacy, ovum, data security, security, data management
    
Intralinks
Published By: Akamai Technologies     Published Date: Nov 14, 2018
You’ve created a great game, so why do players keep abandoning it? The answer is frictions— the obstacles and flaws that erode player satisfaction, disrupt immersion, and ultimately cause players to look elsewhere. This abandonment not only impacts your game and revenue but also your studio’s reputation for years to come. In “Understanding Frictions” Akamai’s Nelson Rodriguez, a gaming industry insider who’s helped launch successful titles like Halo 3, will explain how to minimize frictions so you can maximize player enjoyment, loyalty, and revenue. Read “Understanding Frictions” so you can analyze your game’s points of friction using our matrix and learn how to manage, reduce, or eliminate frictions at every development stage.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 14, 2018
Delivering a hit PC game isn’t easy. You’ve got to worry about frictions like slow downloads, unstable connections, and security flaws — any of which can cause players to abandon for good and doom your game to failure. Akamai’s Quick Start Guide: Global Game Launch, PC Edition can take some of the complexity— and anxiety— out of your next game launch. You’ll learn how Akamai can help you succeed at each of the four key steps of game release — Develop, Promote, Deliver, and Play — so you can keep your players engaged with a seamless, secure game experience.
Tags : 
    
Akamai Technologies
Published By: Fiserv     Published Date: Nov 08, 2017
Featuring Andy Schmidt, Principal Executive Advisor Knowing your customer is key to driving a successful strategy for client security and retention. Watch this video to get a picture of how KYC can be deployed for risk minimization, work with compliance, and make security measures more frictionless using cutting edge technology.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
    
Fiserv
Published By: Fiserv     Published Date: Nov 09, 2017
Financial institutions seeking to attract new customers and revenue channels are expanding into digital services, real-time payments and global transactions. However, with every new service, criminals are developing innovative ways to infiltrate financial systems, and older technologies that mitigate fraud no longer work as effectively. So how can financial institutions respond to this growing threat? Fortunately, more advanced technologies hold great potential for real-time financial crime mitigation. Learn about five current and emerging technologies that could impact money laundering and fraud mitigation, including artificial intelligence/machine learning, blockchain, biometrics, predictive analytics (hybrid model) and APIs. Read the latest Fiserv white paper: Five Tech Trends That Can Transform How Financial Institutions Detect and Prevent Financial Crime.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
    
Fiserv
Published By: Carbon Black     Published Date: Apr 10, 2018
For decades, the financial services industry has endured constant change and uncertainty, from the depths of a financial crisis to widespread regulation overhauls. With the advent of more advanced cybersecurity threats, the industry has responded with rapid digital transformation to remain competitive while also pushing the envelope. Today, managing and mitigating cyber-related risks not only draws government scrutiny, but increased consumer scrutiny as well, with longstanding brand reputations anchored to institutions’ ability to protect its most sensitive data. In a recent survey of Americans, financial information was considered by consumers to be their most valuable personal information, worth even more than personal or family photos and videos. For consumers, failing to protect their data is a grave violation of trust, to the point where 72% would consider leaving their current financial institution if their sensitive information was taken hostage by ransomware.1 Not only does the
Tags : 
    
Carbon Black
Published By: Turbonomic     Published Date: Nov 27, 2018
Want to learn how to design and deploy infrastructure-as-a-service (IaaS) solutions in the cloud using Amazon Web Services? This ebook will take you through practical examples, design patterns, and tips to help you confidently build a working IaaS solution. Download to find out: The key components of the AWS public cloud platform How to launch your compute and storage resources on the AWS Virtual Private Cloud (VPC) platform How to add compute resources to your VPC with AWS Elastic Compute Cloud (EC2) The types of storage in AWS Elastic Block Storage (EBS) with cost, performance impact, and examples of operational tasks By the end of this ebook, you’ll master AWS core components and how to design for resiliency. You’ll even be able to launch and manage your cloud solution using either the AWS command-line interface or the AWS web console.
Tags : 
    
Turbonomic
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept