> Home

broker

Results 1 - 25 of 86Sort Results By: Published Date | Title | Company Name
Published By: Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
Cylance
Published By: Memorial Hermann     Published Date: Sep 19, 2014
As a broker, your customers look to you to provide guidance, education and cost savings in a world filled with ever-changing regulations and skyrocketing costs. See where Houston businesses find the most value in their brokers and what new options exist to help contain costs. • Learn where Houston businesses see brokers adding value • See the impact carrier satisfaction has on changing carriers • Read about new cost-containing options to help your clients
Tags : 
healthcare costs, approach, carrier, choice, location, impact, educated, reliable, providers, solution, business, manager, organization, employees, negotiations
    
Memorial Hermann
Published By: Nutanix, Inc.     Published Date: Oct 12, 2012
Join us for this hands-on, technical VDI Design Workshop where everything from choosing the right broker to zero clients and multi-site design will be discussed and analyzed.
Tags : 
vdi, desktop, technology, workshop, nutanix, business analytics, web services, analytical applications
    
Nutanix, Inc.
Published By: Nutanix, Inc.     Published Date: Oct 17, 2012
Join us for this hands-on, technical VDI Design Workshop where everything from choosing the right broker to zero clients and multi-site design will be discussed and analyzed.
Tags : 
vdi, desktop, technology, workshop, nutanix, backup and recovery, storage area networks, storage management, storage virtualization
    
Nutanix, Inc.
Published By: Nutanix, Inc.     Published Date: Oct 17, 2012
Join us for this hands-on, technical VDI Design Workshop where everything from choosing the right broker to zero clients and multi-site design will be discussed and analyzed.
Tags : 
vdi, desktop, technology, workshop, nutanix, backup and recovery, storage area networks, storage management
    
Nutanix, Inc.
Published By: Nutanix, Inc.     Published Date: Oct 17, 2012
Join us for this hands-on, technical VDI Design Workshop where everything from choosing the right broker to zero clients and multi-site design will be discussed and analyzed.
Tags : 
vdi, desktop, technology, workshop, nutanix, business analytics, analytical applications, data quality
    
Nutanix, Inc.
Published By: Symantec     Published Date: Jul 31, 2017
Uncover shadow data lurking in the cloud with the industry’s first integrated cloud security solution that combines the best-in-class data loss prevention (DLP) and cloud access security broker (CASB) technologies from Symantec.
Tags : 
cloud, cloud security, dlp, casb
    
Symantec
Published By: Infosys     Published Date: May 30, 2018
While mainframes have dominated computing across industries for several decades, the need for speed and However, modernizing these systems is every enterprise’s nightmare, considering the complexities and high costs involved, besides the fear of business disruption. The need for a trusted partner has never been more. A leading global brokerage firm was looking to simplify and speed up the mainframe systems powering their trading platforms that supported billions of transactions each day. See how Infosys helped and the five key takeaways from the project.
Tags : 
mainframes, speed, trading, system, modernize
    
Infosys
Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt
Published By: VMWare - vFabric     Published Date: May 10, 2012
Join IDC Analysts and NewEdge's Global Head of Data to hear how a new approach to applications and data is driving revenue growth and cost savings.
Tags : 
vfabric, applications, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, newedge, revenue growth, cost savings, networking, data management
    
VMWare - vFabric
Published By: Clustrix     Published Date: Sep 04, 2013
Find out how AdScience has been able to increase their revenue potential by five times using Clustrix to optimize bidding for their online ad broker agency. AdScience runs complicated algorithms to process bids for ad space based on click history. It's critical for AdScience to have instant access to smart data.
Tags : 
adscience, revenue, technology, clustrix, algorithms, case study, best practices, networking, it management, knowledge management, enterprise applications
    
Clustrix
Published By: Dynatrace     Published Date: May 20, 2016
The 2016 Digital Experience Report provides a comparative performance assessment for the largest companies across six major industries — banking, brokerage, insurance, media, retail, and travel.
Tags : 
dynatrace, devops, digital experience, customer experience, digital interactions, performance, software development, knowledge management, enterprise applications
    
Dynatrace
Published By: Gigamon UK     Published Date: Dec 13, 2018
Read “How to Strengthen Security While Optimizing Network Performance” to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability. NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by reading this new research now.
Tags : 
    
Gigamon UK
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Cloud Access Security Brokers are one of the fastest growing security technologies today because they provide cloud service visibility, data security, threat protection, and compliance. CASBs are an effective and easy way to mitigate the top cloud security threats and security practitioners look to trusted CASB providers as strategic partners to help advise on key cloud security decisions.
Tags : 
    
Oracle Security Solutions
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Whether you are leveraging the cloud for software as a service (SaaS), infrastructure as a service (IaaS), or platform as a service (PaaS), cloud security is a mandatory cost of doing business. In June 2016, Gartner issued a press release identifying the top information security technologies and included cloud access security brokers (CASBs) at the top of that list. Protecting your data and IP in the cloud is not an option. Knowing that an ROI for a CASB could be longer term, how do you quickly quantify the additional value a CASB provides so that it gets a high priority in your already stretched information security budget? This white paper helps you to build a business case by walking you through the cost considerations and payback of a CASB. It demonstrates that a CASB provides stronger cloud protection at a lower cost than traditional security processes and tools.
Tags : 
    
Oracle Security Solutions
Published By: NetApp     Published Date: Feb 19, 2015
With cloud computing usage growing rapidly, the role of I&O must expand to ensure the most effective and efficient use of cloud offerings. These eight steps teach I&O professionals how to act as internal cloud service brokers and facilitate a successful transition to hybrid IT.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Feb 19, 2015
According to a worldwide survey of IT executives,their organizations are already deploying multiple cloud models, and they expect that more than half of their IT services will be delivered via the cloud three years from now.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Aug 14, 2015
Hybrid cloud requires a transition.
Tags : 
transition, cloud computing, applications, storage, data, storage management
    
NetApp
Published By: BMC Control M     Published Date: Jul 16, 2009
Gartner has positioned BMC CONTROL-M in the Leaders Quadrant of their "2009 Magic Quadrant for Job Scheduling." The report assesses the ability to execute and completeness of vision of key vendors in the marketplace. Read a full copy today, courtesy of BMC Software.
Tags : 
quadrant, magic quadrant, job scheduling, bmc control-m, workload, automation broker, gartner, data, job, itwab, it workload automation broker, platforms, data management, linux, sap, windows, service oriented architecture, sla, international computing
    
BMC Control M
Published By: NetApp     Published Date: Nov 12, 2014
With cloud computing usage growing rapidly, the role of I&O must expand to ensure the most effective and efficient use of cloud offerings. These eight steps teach I&O professionals how to act as internal cloud service brokers and facilitate a successful transition to hybrid IT.
Tags : 
hybrid it, cloud enabler, internal cloud service, transition, efficiency, networking
    
NetApp
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
For many years, traditional businesses have had a systematic set of processes and practices for deploying, operating and disposing of tangible assets and some forms of intangible asset. Through significant growth in our inquiry discussions with clients, and in observing increased attention from industry regulators, Gartner now sees the recognition that information is an asset becoming increasingly pervasive. At the same time, CDOs and other data and analytics leaders must take into account both internally generated datasets and exogenous sources, such as data from partners, open data and content from data brokers and analytics marketplaces, as they come to terms with the ever-increasing quantity and complexity of information assets. This task is clearly impossible if the organization lacks a clear view of what data is available, how to access it, its fitness for purpose in the contexts in which it is needed, and who is responsible for it.
Tags : 
    
Waterline Data & Research Partners
Published By: Emulex Corporation     Published Date: Nov 07, 2013
An intelligent, searchable recording fabric with 100% accuracy sounds pretty useful. But can you calculate a solid ROI to justify it? We all know intuitively that there are substantial bottomline benefits to reducing unplanned network downtime and improving the management of corporate risk. It follows that it also pays dividends to free up highly skilled Tier 1 and Tier 2 engineers to handle resolving the most difficult and costly network issues while using less expensive personnel to handle easier ones. But justifying a network investment on a soft, intuitive argument like this alone doesn’t usually suffice. And, depending on what industry you are in, the cost savings potential will vary. At the high end, in many financial and brokerage institutions, a minute of downtime can cost the company millions of dollars. So being able to shave even a single minute off network downtime with a pervasive monitoring tool represents an immediate recovery of the fabric investment.
Tags : 
network monitoring, network visibility, technology, endace, best practices, networking
    
Emulex Corporation
Published By: Liaison Technologies     Published Date: Apr 03, 2012
Read Cloud Services Brokerage for Dummies® to learn about the state of cloud computing today, how CSBs add business value, what's important to think about when considering a CSB, and predictions about what's to come.
Tags : 
liaison, cloud, cloud services, cloud services brokerage, for dummies, dummy, dummies, csb, business, business value, customer, predictions, enterprises, suppliers, opportunities, transaction, accuracy, flexibility, agility, adapt
    
Liaison Technologies
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
Organizations are increasingly adopting a hybrid cloud computing strategy to realize the benefits without compromising on security and control. The integration at the network, infrastructure, and process layers that is required by hybrid models can be addressed by three new cloud-focused solution types: bridges, brokers, and gateways. This paper gives you the insight you need to better understand which architectural approach will meet your requirements and expectations.
Tags : 
cloud, data centers, cloud computing, bridges, brokers, gateways, network, infrastructure, hybrid models, it management, application integration, data integration
    
F5 Networks Inc
Start   Previous   1 2 3 4    Next    End
Search Home