> Home

suse enterprise

Results 1 - 15 of 15Sort Results By: Published Date | Title | Company Name
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Complexity, globalization and digitalization are just some of the elements at play in the risk landscape—and data is becoming a core part of understanding and navigating risk. How do modern finance leaders view, navigate and manage enterprise risk with data? Dun & Bradstreet surveyed global finance leaders across industries and business types. Here are the top trends that emerged from the study: 1. The Enterprise Risk & Strategy Disconnect—Finance leaders are using data and managing risk programs, but over 65% of finance leaders say there’s missing link between risk and strategy. 2. The Risks of the Use and Misuse of Data—Up to 50% of the data used to manage modern risk is disconnected. Only 15% of leaders are confident about the quality of their data. 3. Risky Relationships—Only 20% of finance leaders say the data they use to manage risk is fully integrated and shared. Download the study to learn how finance leaders are approaching data and enterprise risk management
Tags : 
    
Dun & Bradstreet
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 02, 2016
Effective metrics and measurements are critical to running a high performance business. Properly applied, they lead you to better insights, better decisions and better business outcomes. They provide feedback to spark improvement and create learning opportunities. They help you identify the right outcomes that drive you toward your business goals. Unfortunately, many businesses misuse these powerful tools in ways that actively destroy the agility they seek to create. In this paper, we highlight nine mistakes organizations make involving agile measurement at enterprise scale—and how to do it right.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
    
CA Technologies EMEA
Published By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : 
email security, internal threats, mimecast, forrester
    
Mimecast
Published By: Amazon Web Services     Published Date: Oct 30, 2018
Enhance the Availability & Performance of SAP HANA Apps Abstract: SAP HANA delivers powerful analytics capabilities that can help you improve business performance and drive digital transformation. You can more easily build reliable and performant SAP HANA-powered landscapes with SUSE Linux Enterprise Server for SAP Applications and Amazon Web Services (AWS). That’s because SUSE can help you achieve near zero downtime and sustain high-performance levels, while AWS delivers a broad and deep set of cloud services that are certified to fulfill the compute, memory, and storage requirements of SAP HANA.
Tags : 
availability, performance, sap, hana, apps
    
Amazon Web Services
Published By: IBM     Published Date: Jun 02, 2009
Linux reliability has come of age. Several major Linux distributions including Novell SUSE, Red Hat Enterprise Linux and Ubuntu scored high in reliability, improved over 2006 uptime statistics and achieved near parity with Unix distributions. Security incidents plagued Windows Server 2003, which saw uptime decrease by roughly 10% during last year. Corporations must continue to adhere to best practices in configuration, management and security to ensure optimal server operating system and application reliability.
Tags : 
reliability, uptime, performance, management, service-level agreement, sla, compliance, linux, unix, ibm, red hat enterprise linux, rhel, ubuntu, debian, real-time resources, smbs, small and medium businesses, operating system, total cost of ownership, tco
    
IBM
Published By: IBM Corporation     Published Date: May 22, 2012
The SUSE Enterprise Linux Server, now on the IBM PureFlex System, provides an open, reliable and secure IT environment with faster deployment,better business agility, lower power consumption, better hardware utilization and lower total cost of owners
Tags : 
suse linux enterprise server, ibm pureflex system, mission-critical computing, cloud computing, integrated systems strategy, open virtualization format, ovf
    
IBM Corporation
Published By: IBM     Published Date: Jul 07, 2016
With SUSE Linux Enterprise Server on IBM Power Systems, you gain the benefits of the latest generation of Enterprise Linux OS with the power and reliability of IBM hardware. This combination provides the performance and flexibility to run the most demanding business-critical workloads.
Tags : 
ibm, ibm power systems, suse, suse linux enterprise server, linux, ibm hardware, open source, knowledge management
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
Open-source is becoming an increasingly critical component being leveraged by agile enterprises. The capital investment required to develop next generation business solutions demands that components be built and targeted to the platform best suited for the task. Understanding the tools available for you or your developers to gain efficiencies to build solutions once, and deploy on a choice of scalable and reliable platforms is of paramount importance.
Tags : 
ibm suse, suse enterprise linux server, linux, ibm power systems, open source, agile, knowledge management
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
See how and why businesses everywhere are using SAP HANA on SUSE Linux Enterprise Server and IBM Power Systems to improve productivity, reduce cost, and gain insight.
Tags : 
ibm, ibm power systems, sap, sap hana, linux, suse linux enterprise server, open source, knowledge management
    
IBM
Published By: IBM     Published Date: Oct 11, 2016
Topics to be discussed include: - The need for new RAS characteristics in next-gen applications - The benefits of having an agile and scalable platform for workloads running SUSE Linux Enterprise Server on IBM Power Systems
Tags : 
ibm, hardware, systems hardware, linux, linux on power, security, software development, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2014
The SUSE Enterprise Linux Server, now on the IBM PureFlex System, provides an open, reliable and secure IT environment with faster deployment, better business agility, lower power consumption, better hardware utilization and lower total cost of ownership.
Tags : 
suse enterprise, linux, ibm, enterprise, pureflex system, linux enterprise, open virtualization, mission critical, security, storage, data management
    
IBM
Search Home