Network Provisioning White Papers

The Provisioning process monitors access rights and privileges to ensure the security of an enterprise's resources and user privacy. As a secondary responsibility, it ensures compliance and minimizes the vulnerability of systems to penetration and abuse. As a tertiary responsibliity, it tries to reduce the amount of custom configuration using boot image control and other methods that radically reduce the number of different configurations involved.
Results 1 - 25 of 65Sort Results By: Published Date | Title | Company Name
By: VCE     Published Date: Jun 26, 2015

Learn how to increase application performance and speed provisioning while reducing data center footprint and increase performance, availability and scalability.

Tags : applications, performance, provisioning, scalability, data center, network provisioning, application integration, application performance management
    
By: Cisco     Published Date: May 15, 2015

Nous assistons à une profonde transformation du data center en infrastructure partagée. Pour faciliter cette transition pour les entreprises, Cisco et NetApp ont conçu FlexPod, une plate-forme de cloud privé, validée par Microsoft pour l'exécution des applications Microsoft. Reposant sur les meilleurs serveurs, commutateurs, systèmes de stockage et logiciels du secteur, la plate-forme FlexPod aide les entreprises à satisfaire rapidement leurs besoins en matière de virtualisation et simplifie l'évolution vers une infrastructure ITaaS (IT en tant que service) tout en réduisant le coût et les risques associés à un tel effort.

Tags : cloud computing, erp, productivity, applications, efficiency, cisco, migration, network architecture
    
By: Aerohive     Published Date: May 14, 2015

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Aerohive     Published Date: May 14, 2015

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : internetworking hardware, network architecture, network management, network performance, network provisioning, network security, mobile computing, mobile data systems
    
By: Aerohive Networks     Published Date: May 06, 2015

This paper describes how to eliminate the complexity and cost of traditional wireless networks and create one that is ready for mobility.

Tags : mobility, networking, wi-fii, wireless, network architecture, network management, network performance, network provisioning
    
By: IBM     Published Date: Apr 29, 2015

IBM InfoSphere BigInsights for Hadoop enables organizations to efficiently manage and mine large volumes of diverse data for valuable insights. IBM builds on a 100% Apache Hadoop foundation with common tools such as spreadsheets, R analytics and SQL access for greater usability.

Tags : bigsheets, data management, business intelligence, workload optimization, data, sql, network management, network performance
    
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: TIBCO     Published Date: May 15, 2013

This informative webinar focuses on the impact that mobile brings to your enterprise- to your enterprise architecture, changes in development, and how you can use mobile as a driver for change moving forward. Continue for an analysis of the challenges surrounding enterprise mobility.

Tags : mobile, enterprise architecture, development, enterprise, change management, network architecture, network management, network performance
    
By: Wolfe     Published Date: Apr 18, 2013

Cloud services create a compelling case to move application processing and storage out of the data center and onto the network.

Tags : ethernet, cloud, application processing, storage, data center, network, voip, unified communications
    
By: SunGard     Published Date: Aug 13, 2012

Today's IT organizations are faced with the daunting task of optimizing all aspects of their departments, including people, processes and technology. Optimizing and streamlining server utilization through virtualization represents one particularly exciting example. We found that one of the most popular usage models for virtualization is to drive down server procurements in development, test and production environments. When this model is followed, future server purchases are avoided; instead, new workloads are established on existing systems.

Tags : leveraging, visualization, optimizing, processes, technology, optimizing, server utlization, storage
    
By: SunGard     Published Date: Aug 13, 2012

Unicous marketing improves reliability and flexibility, reduces costs, and increases performance with SunGard Enterprise Cloud Services.

Tags : unicous marketing, sungrad, cloud, services, improve performance, efficiency, enterprise applications, infrastructure
    
By: Box     Published Date: Jun 04, 2012

Enter Box. Our partner integrations and robust security suite ensure employees get any-device, on-the-go content sharing and collaboration... while IT retains control and visibility of all user accounts. Get Your FREE Box IT Strategy Kit!

Tags : free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools
    
By: Palo Alto Networks     Published Date: May 09, 2012

In this on-demand video broadcast, hear Nir Zuk, CTO and co-founder of Palo Alto Networks and Rich Mogull, Analyst and CEO of Securosis, provide insights and recommendations on how to handle consumerization and the proliferation of devices.

Tags : palo alto, palo alto networks, consumerization, proliferations, applications, mobile, mobile devices, controls
    
By: Box     Published Date: Mar 14, 2012

Let's take a look at the emerging trends shaping business today, trends that are driving us to rethink and retool response.

Tags : sharing, cloud, content management, emerging trends, enterprise, ecm, demand, software
    
By: PC Mall     Published Date: Mar 03, 2012

With impressive performance scalability, the HP ProLiant DL385 G7 and ProLiant BL465c G7 attained outstanding results for two-processor platforms on the two-tier SAP® Sales and Distribution (SD) standard application benchmark.

Tags : servers, server, hp servers, hp server, scalability, servers, giant, proliant
    
By: HP & Intel     Published Date: Feb 18, 2012

This guide provides practical information to help you prepare your data center for the cloud with Unified Networking, scaled-out storage, trusted server pools, and intelligent power management.

Tags : convergence, infrastructure, network architecture, network provisioning, storage virtualization, configuration management, data integration, data protection
    
Start   Previous   1 2 3    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.