cloud managed

Results 1 - 25 of 26Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Mar 06, 2017
This whitepaper explores how Oracle Database Exadata Express Cloud Service is the ideal entry-level service for running Oracle Database in Oracle Cloud. It delivers an affordable and fully managed Oracle Database 12c Release 2 experience, with enterprise options, running on Oracle Exadata.
Tags : 
    
Oracle
Published By: IBM     Published Date: Jan 18, 2017
You’ve taken the first step and already know that a document- oriented database is the right database for your application. From here, you still have to decide where and how you’ll deploy the software and its associated infrastructure. These decisions lead to additional considerations around administrative overhead, technical support, open-source options, data sovereignty and security, and more. This paper aims to outline the deployment options available when you select IBM® Cloudant® as your JSON store.
Tags : 
ibm, cloud, analytics, cloudant managed service, cloudant local, apache couchdb, databases, enterprise applications
    
IBM
Published By: Dell EMC     Published Date: Sep 12, 2016
Cloud computing is transforming IT in terms of how services are delivered, how infrastructure is deployed and managed, and how IT organizations structure themselves. For the purposes of this study, Forrester is defining a cloud solution as having three major characteristics: “self-service access, full automation of processes and policies, and metering and tracking of usage.”1 It then becomes a question of whether you manage your cloud(s) yourself, outsource it, or use a hybrid combination of private and public cloud resources.
Tags : 
    
Dell EMC
Published By: Datto Inc.     Published Date: Jan 31, 2013
Business continuity, data insurance, local storage flexibility, cost benefits, standards compliance and infrastructure control. This is just some of what Datto and hybrid cloud backup can do for you, and your clients.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
A challenge for many MSPs is how to best sell business continuity solutions to the SMB market. In this whitepaper Datto presents six tips to help MSPs maximize their sales, revenue and profit.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
Datto shares 10 tips for MSPs to increase profit, improve visibility, and strengthen customer satisfaction -- all without breaking the bank.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
This IT solutions provider’s experience with enterprise storage vendors taught his one thing; you can’t cram an enterprise storage solution into a small to midsize business.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
Understanding RTO (recovery time objective) is a key to knowing the difference between BDR and intelligent business continuity. Read this article to learn more.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
There’s a big difference between traditional backup methods and what intelligent business continuity offers. Get the facts.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
Learn how an MSP uses Datto’s business continuity solutions as a valued profit center - all while giving their clients value peace of mind.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
Not all backup and disaster recovery (BDR) solutions are created equal. Read how one MSP found the BDR solution that works best for them, and their clients.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Feb 05, 2013
In this white paper Datto explores the different types of risk in IT infrastructure and the ways intelligent business continuity can best mitigate that risk.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: May 08, 2013
What’s important to your SMB clients? This Brief looks at four key benefits that a?backup and disaster recovery (BDR) solution based on hybrid?cloud will deliver to your SMB clients.
Tags : 
hybrid cloud, business continuity, msp, managed service provider, backup and recovery, disaster recovery
    
Datto Inc.
Published By: Aerohive     Published Date: Oct 14, 2014
A whitepaper on how to enable modern classrooms to deliver immersive, personalised learning experiences, enhance campus productivity, and adopt new curriculum standards.
Tags : 
cloud for education, personalised learning, mobility adoption in schools, virtualization, cloud computing, infrastructure
    
Aerohive
Published By: Microsoft     Published Date: Jul 07, 2016
Every organization and every industry is being transformed by the trend towards cloud and mobility. There is no shortage of narrow point solutions that can provide bits and pieces of the overarching solution you need – but modern IT departments face enough day-to-day challenges without having to constantly fine tune and integrate a bunch of different products. We’ve assembled a step-by-step guide to help you address the challenges you face as you work to go mobile, stay mobile, and protect your data with an end-to-end solution. Download this free e-book to learn: • How application policy relates to providing secure e-mail • How to set up policy for MAM without enrollment apps via application managed policy • How to create device configuration policies for both corporate-owned and personally owned devices • How to authenticate and authorize access to your company resources • How to get end-to-end protection for mobile e-mail up and running in your own environment.
Tags : 
technology, best practices, data, enterprise
    
Microsoft
Published By: IBM     Published Date: Jan 27, 2017
Download this webcast to discover general applicability for public vs. private cloud, and whether a managed service is right for you.
Tags : 
    
IBM
Published By: Equinix     Published Date: Jul 06, 2016
Internet delivery and cloud hosting has transformed all aspects of content and media value chain, impacting how content is created, managed and delivered. Consumers now demand content on any device at any time, regardless of the network they are using.
Tags : 
media, media companies, broadcasters, content, create content, audience, deliver content, content management
    
Equinix
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security
    
Akamai Technologies
Published By: Cisco Systems     Published Date: Jun 27, 2013
From the cloud or hosted, outsourced or as a managed service—what is the best way to deploy collaboration services? In this report, Forrester helps IT pros identify key priorities and create an optimal strategy for implementation.
Tags : 
cloud solution, outsourcing, managed service, collaboration, optimal strategy, implementation, technology, empowerment
    
Cisco Systems
Published By: IBM     Published Date: Jan 27, 2017
As with most innovations in business information technology, the ultimate truth about cloud lies somewhere in between. There is little doubt that cloud-based infrastructures offer an immediate opportunity for smaller organizations to avoid the costly investment needed for a robust on-premises computing environment. Data can be found, processed and managed on the cloud without investing in any local hardware. Large organizations with mature on-premises computing infrastructures are looking to Hadoop platforms to help them benefit from the vast array of structured and unstructured data from cloud-based sources. Organizations have feet in both cloud and on-premises worlds. In fact, one could easily argue that we already live in a “hybrid” world.
Tags : 
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.