security performance

Results 126 - 150 of 289Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jun 16, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, cloud computing, infrastructure, design and facilities
    
Cisco
Published By: Cisco     Published Date: Jun 16, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth.
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, cloud computing, infrastructure, design and facilities
    
Cisco
Published By: Macquarie Telecom     Published Date: Mar 30, 2015
This white paper reveals a list of top 10 trends in cloud computing to help you take advantage of all the greatest new innovations in cloud technology.
Tags : 
virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud computing trends, cloud security, cloud performance, mobile cloud computing, virtualization
    
Macquarie Telecom
Published By: Symantec     Published Date: Jan 31, 2013
PassMark Software conducted objective performance testing on Windows Defender and Symantec Endpoint Protection, on Windows 8 in August 2012. Read this comparison report for detailed results from performance tests.
Tags : 
endpoint protection, security, performance test, comparison, windows 8
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
PassMark Software conducted objective performance testing on six Enterprise Endpoint Security products. Download the report to find out results from these performance tests.
Tags : 
endpoint protection, security, performance test, comparison
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. Download the report to find out how each of the security solutions performed.
Tags : 
endpoint protection, security, performance test, comparison
    
Symantec
Published By: F5 Networks Inc     Published Date: Apr 17, 2012
Learn how to unburden your VDI infrastructure and gain added security, network performance improvements and optimizations, while improving the architecture for non-VDI application specific systems.
Tags : 
virtual desktop, virtual desktop infrastructure, vdi, vdi impact on the network, vdi performance, vdi security, vdi management, vmware view, citrix, microsoft vdi, data quality, virtualization
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
While the promises of reduced costs and greater flexibility are driving companies to the cloud, these benefits can be negated by new management and processes which are often manual and disconnected from existing systems. This white paper explores strategies that enables IT departments to embrace the shift to being a services-based organization without relinquishing the control necessary to ensure the security, performance, and reliable delivery of applications.
Tags : 
cloud, security, performance, reliable delivery, networking, data management, cloud computing, infrastructure
    
F5 Networks Inc
Published By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance and still get the same performance as if the storage remained local to the branch. Learn how organizations can now consolidate remote infrastructure to increase security and efficiency, without impacting performance in branch offices
Tags : 
consolidate remote servers, data center, storage architecture, remote infrastructure, increase security, increase efficiency, performance, networking, security
    
Riverbed Technology, Inc.
Published By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center, information security
    
Webroot
Published By: ProfitBricks     Published Date: Jan 01, 2013
Performance testing and benchmarking of cloud computing platforms is a complex task, compounded by the differences between providers and the use cases of cloud computing users. IaaS services are utilized by a large variety of industries and, performance metrics cannot be understood by simply representing cloud performance with a single value. When selecting a cloud computing provider, IT professionals consider many factors: compatibility, performance, cost, security and more. Performance is a key factor that drives many others including cost. In many cases, 3 primary bottlenecks affect server performance: central processing unit (CPU) performance, disk performance, and internal network performance.
Tags : 
cloud computing, iaas, profitbricks, amazon ec2, rackspace cloud, central processing unit, disk performance, internal network performance
    
ProfitBricks
Published By: ProfitBricks     Published Date: Apr 01, 2013
The value of conventional on-premises servers is eroding. As with all decay, it starts slowly and declines steadily. Bits and pieces of the physical server market are peeling off as businesses turn away from conventional data center and IT closet deployments in favor of cloud-based infrastructure-as-a-service (IaaS). And there’s no shortage of IaaS; hosting and service-provider companies are flooding the market with low-cost access to hosted servers. The challenge for adopting businesses is leveraging hosted assets that guarantee data security and integrity with fine-grained levels of adjustable capacity, high performance and price predictability.
Tags : 
iaas, solution, cloud-based
    
ProfitBricks
Published By: Red Hat     Published Date: May 07, 2014
As Linux grows in importance in terms of value to the business, managing Linux environments to high standards of service quality — availability, security, and performance — becomes an essential requirement for business success. Download to learn more about the ROI study focused on the quantitative benefits gained from using the Enterprise Linus systems.
Tags : 
red hat, linux, it environments, service quality, web servers, utility workloads, security, performance, it management, enterprise applications
    
Red Hat
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
    
CA Technologies EMEA
Published By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
    
Trend Micro
Published By: Trend Micro     Published Date: May 03, 2018
NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000 (Hardware model 4100) v3.8 SP5 and OfficeScan (OSCE) v12.0.1807. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v4.0 available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Trend Micro’s participation. While the companion Comparative Reports on security, performance, and total cost of ownership (TCO) will provide information about all tested products, this Test Report provides detailed information not available elsewhere.
Tags : 
    
Trend Micro
Published By: Riverbed     Published Date: Feb 26, 2015
In order to be successful today, operations teams require complete application-level visibility across the entire environment.
Tags : 
customer relationship management, security, human resources, sales force automation, application integration, data protection, network performance
    
Riverbed
Published By: Kaspersky     Published Date: Feb 05, 2015
This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.
Tags : 
security, virtualization, security approaches, kaspersky
    
Kaspersky
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
Organizations in every industry rely on applications to drive customer engagement, employee productivity and revenue. Deployed between users and the applications are a wide variety of “application services” designed to enhance security, improve performance and ensure reliability. F5 set out to evaluate the state of these services by asking IT professionals about their current and planned use of application services. Read the report to learn which strategic initiatives are driving application deployments including the most important trend for the next 2-5 years.
Tags : 
application delivery, app services, cloud, devops, automation, networking, enterprise applications, business technology
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: May 03, 2017
Application delivery services are critical for successful applications. Whether such services add scalability, reliability, or security, most applications rely on one or more. Application Delivery Controllers (ADCs), therefore, occupy a critical place in most application, cloud, and data center designs. But what does "performance" actually mean? In general, ADC vendors publish four main types of metrics to demonstrate performance: Requests per second (RPS) Connections per second (CPS) Transactions per second (TPS) Throughput (often measured in gigabits per second, Gbps) Download now to learn more!
Tags : 
application delivery controllers, cloud, data center, performance metrics
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: May 03, 2017
Building out a dedicated infrastructure with the agility, scalability, and effciency of a public cloud—while enjoying increased levels of control and security—can help enterprises boost agility and improve operational ef?ciency. However, while most private cloud networking services provide basic load balancing functionality, they lack important application delivery features, putting the performance, availability, and security of applications at risk. As private clouds increasingly host mission-critical production applications, advanced application delivery services for layers 4 through 7 are becoming essential. End-to-end integration, orchestration, and automation of the needed application delivery networking and security services are also critical to improve application time-to-market and operational ef?ciency.
Tags : 
cloud, cloud security, efficiency, security, public cloud
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Hundreds of organizations around the world use Microsoft® SharePoint® with  over 80 million implementations, allowing them to develop intelligent portals that seamlessly connect users, teams, and knowledge. With the release of Microsoft Offi ce SharePoint Server 2007, F5 has specifi cally developed and tested a comprehensive Application Ready infrastructure that enhances the security, availability and performance of SharePoint deployments, whether it’s over the LAN or across a global WAN.
Tags : 
application ready network guide, microsoft office sharepoint 2007, sharepoint deployments. wan, tcp, roi, sharepoint, portal, microsoft, big-ip, application, networking, it management
    
F5 Networks Inc
Published By: HP Data Center     Published Date: Feb 18, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained. This invariably leads to facility infrastructure problems such as thermal “hot spots”, lack of UPS (uninterruptible power supply) rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : 
hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments, energy assessments, it security and risk assessments, performance analysis for hp-unix
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that when properly designed, built and operated, are an integral part of the business strategy driving the success of any enterprise, yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems, with little thought given to the structure and space in which it is to be housed, serviced and maintained. This invariably leads to facility infrastructure problems, such as thermal hot spots, lack of UPS, rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : 
hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments, energy assessments, it security and risk assessments, performance analysis for hp-unix
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained.
Tags : 
hp data center, data center, optimization, business strategy, hot spots, mission critical loads”, the it infrastructure, the availability, it architecture, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments
    
HP Data Center
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.