Whitepaper Library
 

cloud computing practices

Results 1 - 25 of 60Sort Results By: Published Date | Title | Company Name
Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters, virtualization technologies, cloud computing practices, data center
    
Red Hat
Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise, best practices, business mobility, operating systems, data center
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise, best practices, business mobility, operating systems, data center
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise, best practices, business mobility, operating systems, data center
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise, best practices, business mobility, operating systems, data center
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise, best practices, business mobility, operating systems, data center
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise, best practices, business mobility, operating systems, data center
    
VMware AirWatch
Published By: AppDynamics     Published Date: Sep 20, 2017
Cloud computing has been gaining momentum for years. As the technology leaves the early adopter phase and becomes mainstream, many organizations find themselves scrambling to overcome the challenges that come with a more distributed infrastructure. One of those difficulties is getting through a major cloud migration. It is one thing to roll out a few applications and cloud pilot projects, it is an entirely different challenge to start using the cloud across multiple lines of business at massive scale. That is the point that organizations are beginning to reach, and the time has come to take a serious look at cloud migration best practices.
Tags : 
migration, business, cloud, workload, performance applications
    
AppDynamics
Published By: Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
    
Schneider Electric
Published By: Qualys     Published Date: Feb 17, 2016
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find. Thankfully, the CIS Top 20 Critical Controls provides a pragmatic approach, offering prioritized guidance on the important steps for implementing basic cyber hygiene practices. With the CIS Top 20 Critical Security Controls, CISOs now have a blueprint for reducing risk and managing compliance. By automating each of these controls, CISOs enable their information security teams to do much more with less, essentially operationalizing good cyber hygiene.
Tags : 
qualys, cis, critical security, cloud computing, cyber security, networking
    
Qualys
Published By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
cloud computing, cloud applications, best practices, applications, access management
    
Okta
Published By: Schneider Electric     Published Date: Feb 17, 2017
In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
best practices, business applications
    
Schneider Electric
Published By: Red Hat     Published Date: Apr 18, 2011
In this whitepaper, we examine: Some of the key governance issues affecting both private and public clouds; Frequently cited risks and ways to mitigate them; Approaches that Red Hat is taking to help customers implement effective cloud governance; And Best practices that are part of a savvy cloud strategy.
Tags : 
red hat, it governance, hybrid cloud, cloud computing, risk mitigation, best practices
    
Red Hat
Published By: Macquarie Telecom     Published Date: Mar 30, 2015
This Guide will help companies to improve the effectiveness of their existing strategy or are looking to make their first move into the cloud.
Tags : 
virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud, cloud solutions, make first move into the cloud, best practices cloud computing, security data, virtualization, infrastructure
    
Macquarie Telecom
Published By: Oracle     Published Date: Apr 22, 2015
This paper explores the benefits of modern EPM tools for finance organisations.
Tags : 
enterprise performance management, epm, finance, epm trends, finance leaders, cloud computing, mobile technology, big data finance, modern planning practices, oracle, finance departments, reporting, benefits of epm
    
Oracle
Published By: CareCloud     Published Date: Aug 13, 2013
This white paper explains: • Why some physicians are wary of Meaningful Use incentives • The workflow benefits of cloud-based electronic health records • How Intel, Terremark and CareCloud set the standard for cloud services • How cloud computing eliminates the need for larger IT departments • How a large doctor group overcomes common challenges with the cloud
Tags : 
cloud computing, solve. it, healthcare, security threats, compliance changes, private practices
    
CareCloud
Published By: Plex Systems     Published Date: Feb 26, 2014
Cloud is the perfect solution for food and beverage processors looking for an extremely safe and secure ERP system. Plex ERP is quickly becoming the preferred choice for food and beverage processors with security and availability concerns.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: Plex Systems     Published Date: Feb 26, 2014
Plex is the easy way for a processor to ensure compliance, have complete quality assurance and traceability, and have a record of ingredients movements up and down the supply chain. Using Plex means a processor can always know the product genealogy in high detail.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: Plex Systems     Published Date: Feb 26, 2014
For Food & Beverage processors an ERP system a must; and a flexible Internet-based solution like Plex ERP brings F & B manufacturers all 8 of the features they must have to meet their health and safety requirements, produce high-quality products, operate efficiently & maximize profitability.”
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: Plex Systems     Published Date: Feb 26, 2014
Growth is good, but it may not feel that way when the business has outgrown your ability to manage it. Old Mill Kettle Corn had never used an ERP platform but with imminent expansion and new market opportunities, the Plex Manufacturing Cloud was chosen to support their rapid growth.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: Plex Systems     Published Date: Feb 26, 2014
Cloud computing has the potential to completely revolutionize the A&D industry, with immediate cost gains from greater supplier collaboration and visibility, more effective demand management, and higher levels of compliance and quality management.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: Plex Systems     Published Date: Feb 26, 2014
Aerospace and Defense manufacturers manage complex programs. With cyclical demands and tight time-to-market expectations, manufacturing is both an art and a science. You need an ERP system with close integration between engineering and manufacturing operations while supporting regulatory compliance.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: Zebra Technologies     Published Date: Jun 27, 2017
This eight-page overview highlights Zebra’s portfolio of solutions for the healthcare industry, including asset tracking, inventory management and access control. Harnessing the potential of cloud computing and the Internet of Things (IoT), and combining technologies such as barcoding, RFID and mobile computing, Zebra’s advanced healthcare technology solutions go beyond standard machine-to-machine communication to create a seamlessly integrated solution that facilitates best practices.
Tags : 
zebra technologies, healthcare, inventory management, cloud computing, mobile computing, internet of things
    
Zebra Technologies
Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security
    
Intralinks
Start   Previous   1 2 3    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.