Servers

There's no shortage of ways to design infrastructure to solve a specific problem. Look at server choices and ways to maintain them.

  • White Papers // Oct 2014

    Ovum Decision Matrix: Selecting a Virtualization and Cloud Management Solution

    This report provides a side-by-side comparison of leading virtualization and cloud management solutions, looking at IT modernization from a data center infrastructure perspective. It considers the significance of management in the virtualization and cloud environments and how this influences the way in which technology is deployed, used, and controlled. Learn...

    Sponsored By HP

  • White Papers // Oct 2014

    Firewall Buyers Guide 2014

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: • The fundamentals of modern firewall technology • The ten critical business requirements your next firewall needs to address • Information on how to create a vendor request for proposal...

    Sponsored By Palo Alto Networks

  • White Papers // Sep 2014

    A Manager's Guide to Unified Threat Management and Next-Gen Firewalls

    A lot of security vendors use the terms Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) interchangeably — so it’s easy to get confused about which type of protection is right for you. This Manager’s Guide helps you answer these questions: Is a UTM solution right for my organisation? What...

    Sponsored By Sophos

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Sponsored By Webroot

  • White Papers // Sep 2014

    Performance Benchmark Report 2014

    PassMark Software® conducted objective performance testing on 8 security software products using 13 performance metrics. Find out how Webroot’s SecureAnywhere Business Endpoint Protection product performs against 7 competitor products. Download this research to learn more.

    Sponsored By Webroot

  • White Papers // Sep 2014

    The Future of Email and Applications is Social - (RTE)

    A social email and application experience takes advantage of the impact of social networking technologies on business processes and worker expectations.

    Sponsored By IBM

  • White Papers // Sep 2014

    Horizon View 6 Blast Performance Features

    With VMware's recent release of the Horizon Suite (specifically View 6), VMware has taken the performance and usability features and put them all under the Blast moniker. This category of features is grouped from a marketing perspective but will retain their technical terms in the documentation, similar to how the...

    Sponsored By Global Knowledge

  • White Papers // Sep 2014

    Troubleshooting Fibre Channel Boot from SAN on the Cisco UCS B Series Chassis

    Cisco Unified Computing Solution (UCS) has experienced an enormous growth trend in the last several years becoming the standard server hardware platform in many enterprises and cloud service providers alike. One of the main differentiators in Cisco's server solution is the implementation of stateless computing, which allows all the hardware...

    Sponsored By Global Knowledge

  • White Papers // Sep 2014

    Failover Strategies on the Cisco UCS B Series Chassis

    Cisco Unified Computing Solution (UCS) has experienced an enormous growth trend in the last several years, becoming the standard server hardware platform in many enterprises and cloud service providers alike. One of the main differentiators in Cisco's server solution is the capacity for two totally redundant failover paths for every...

    Sponsored By Global Knowledge

  • Research // Sep 2014

    IT Service Provider Breaks Into Storage Services With Disaster Recovery as a Service for Hitachi Content Platform Owners

    In this fast-changing technology landscape, are you looking for cost-effective ways to expand the services your enterprise offers while retaining your share of the market? At first glance, branching out into cloud storage services might appear to be a risky proposition, considering the formidable competitors who occupy that space....

    Sponsored By Hitachi

  • White Papers // Sep 2014

    How Network Connections Drive Web Application Performance

    Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the challenges and solutions for effectively delivering applications in today’s global marketplace.

    Sponsored By Equinix

  • White Papers // Sep 2014

    Why App Performance Matters More than Ever

    The expectation for superior end-user Quality of Experience (QoE) has never been greater. What does this mean for your consumers? And why is superior application performance more important than ever? Failure to deliver quality apps can lead to lower productivity, decreased revenue and market share, and permanent damage to brand...

    Sponsored By Equinix

  • White Papers // Sep 2014

    The Importance of Interconnectivity

    The Internet of Everything is bringing exciting growth to the digital world. But sometimes that growth can mean latency, bandwidth and security challenges for companies that aren’t prepared. To succeed, you’ll need to be better connected than your competitors. Read our interconnectivity infopaper to find out how tapping into our...

    Sponsored By Equinix

  • Research // Sep 2014

    IDC 13G Overview White Paper

    Industries have seen tremendous change in the dynamics of IT datacenters and workloads. But companies require servers that can deliver faster application performance, provide better availability to meet stringent SLAs, handle complex and evolving workloads, and maximize operational efficiency. This white paper also outlines how Dell is delivering improvements in...

    Sponsored By Provided by Dell and Intel Core i5 Processors, October 2014

  • eBooks // Sep 2014

    Blue Coat's Encrypted Traffic Management Interactive E-Guide

    According to Gartner, 50% of ALL network attacks will hide in SSL by 2017. SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points. This is creating a significant data security, privacy and compliance risk for businesses. Get up to...

    Sponsored By Blue Coat Systems

  • eBooks // Sep 2014

    Stop Attacks Hiding Under the Cover of SSL Encryption

    Wasn't encryption supposed to improve network security? All too often SSL is a carrier of new and successful attacks. Discover how to transform the increased risk into an effective strategy for encrypted traffic management.

    Sponsored By Blue Coat Systems

  • White Papers // Sep 2014

    Blue Coat SSL Visibility

    To be secure against targeted attacks, organizations need complete visibility into the SSL traffic coming across the WAN. Discover the risks posed by the use of SSL encryption, and the products that can help you defend your business.

    Sponsored By Blue Coat Systems

  • White Papers // Sep 2014

    Get Maximum Benefit from Windows Server 2012

    Microsoft Windows Server 2012 is poised to be the cornerstone of today’s more modern, scalable and functionally advanced IT environment. Getting the maximum benefit from the operating system starts with having a clear understanding of all the potential advantages Windows Server 2012 can provide. Download this CIO Guide to learn...

    Sponsored By Provided by Dell and Intel Core i5 Processors, October 2014

  • White Papers // Sep 2014

    Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft

    IT Managers and administrators constantly seek strategies on how to holistically manage and orchestrate server and networking infrastructure and the software stack. Download this Information guide on best practices to optimally manage the data center using systems management tools from Cisco and Microsoft.

    Sponsored By Cisco Systems

  • White Papers // Sep 2014

    CSO: Safeguarding the Next-Generation Data Centre

    Read this research-based white paper to learn how to build a security solution that addresses the full spectrum of challenges a hybrid data centre faces when securing physical, virtual and cloud environments.

    Sponsored By White AU: McAfee/Intel

  • White Papers // Sep 2014

    Is your server security system leaving you hanging in the cloud?

    Are you in need of a server security system that can protect your cloud servers, as well as physical and virtual environments? The new McAfee Server Security Suite can.

    Sponsored By White AU: McAfee/Intel

  • White Papers // Sep 2014

    McAfee on Top

    AV-TEST performed a comparative review of three leading Endpoint Protection solutions to determine how they fared on proactively protecting against kernel-mode and MBR rootkits, the so called "day zero attacks". Once again, McAfee achieved the highest scores.

    Sponsored By White AU: McAfee/Intel

  • White Papers // Sep 2014

    A Buyers Guide to Endpoint Protection Platforms

    Endpoint protection platforms offer a diverse array of features. Leading analyst firm Gartner produced a comprehensive guide to help you pinpoint the solution which best prioritize their requirements to address the needs of your specific business, technical and regulatory environment.

    Sponsored By White AU: McAfee/Intel

  • White Papers // Sep 2014

    Announcing the New Intel VTune Amplifier XE 2015

    Intel VTune Amplifier XE 2015 is the premier performance profiler for C, C++, C#, Fortran, Assembly, and Java. Get the data to meet a wide variety of tuning needs and the tools to mine the data and assess next steps. Powerful analysis lets you sort, filter, and visualize results on...

    Sponsored By Intel Software

  • White Papers // Sep 2014

    Video: HP 5400R Switch Series

    Watch this three minute video about the key features and benefits of the HP 5400R zl2 Switch Series. HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please review HP’s privacy statement.

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Sep 2014

    Blog: Infonetics Research on How HP is Best Positioned to Take on Cisco

    Infonetics Research’s report titled “Data Center and Campus Ethernet Switch Vendor Leadership: North American Enterprise Survey” provides insight on IT decision makers opinions about switch vendors, factors considered during product evaluation, and deployment plans. The results of the survey showed HP making a strong showing in enterprises that are evaluating...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Sep 2014

    HP Powers Test Equipment for The Technology Revolution

    Read what the Director of IT Infrastructure at Teradyne has to say about HP’s solutions for his company. Teradyne is a leader in the field of automatic test equipment, with business lines that develop test solutions for wireless products, semiconductors and systems. HP is the sponsor of this material....

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Sep 2014

    Mitigating Targeted Attacks Requires Integrated Solutions

    Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organisations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    NSS Lab Comparative Analysis Report (Security Effectiveness)

    Implementation of breach detection systems (BDS) can be a complex process with multiple factors affecting the overall security effectiveness of the solution. These should be considered over the course of the useful life of the solution, and include Detection rate and Device stability and reliability. In order to determine the...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Harvard Business Review: Using Frameworks to Defend Against Cyber Attacks

    IT and Business Managers are scared of targeted attacks on their data and systems, but the fact that senior decision makers are unsure or sceptical of the exact business risks and impacts of such attacks makes it harder to secure funding to be prepared and fight them.

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Osterman: Why a New Business Model is needed for SSL Certificates

    This Osterman research paper discusses why there are three fundamental problems with the current state of SSL; SSL is underutilised as a way to increase security and business, there have been numerous security breaches, the current certificate acquisition model is fuelling the problem and focuses on why a new business...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Evolving Data Centres: Defending Against Data Breach Attacks

    Enterprises transform IT structures to include virtualisation and cloud computing because they reduce company costs and optimise resource utilisation. Adopting these new platforms, however, opens new windows of exposure that attackers may leverage in data breach attacks.

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Best Practices for Security and Compliance with Amazon Web Services

    Researchers predict cloud security will become one of the primary drivers for adopting cloud computing. The Gartner Global IT Council for Cloud Services Report revealed that over 50% companies cited security as their top concern for transitioning to the cloud.This paper will discuss what part of the shared responsibility equation...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Process Powered Change Management - Japanese

    Deliver change with accuracy and speed. This new infographic shows how companies have achieved 50% improvement in speed and accuracy with server change management. Get more facts and insights by downloading the infographic now.

    Sponsored By HP

  • Research // Sep 2014

    Secrets of Effective Server Change Management - Japanese

    Take control of change. Only 23% of IT organizations have an acceptable change-related incident rate. Download HP’s new eBook and learn how to dramatically decrease the number of incidents caused by poor server change management.

    Sponsored By HP

  • White Papers // Sep 2014

    Testing Times for Ecommerce

    For development organizations to remain competitive, their developers and testers require an enterprise-class solution that delivers automated software application performance and load testing. In this whitepaper, learn how to deliver realistic, dependable performance tests across the latest technologies, including front and back-office systems, by simulating loads and network speeds for...

    Sponsored By Micro Focus

  • Downloads // Sep 2014

    Your FREE 60-Day Trial Starts Here

    Get instant access to the Brocade Vyatta 5400 vRouter. Download your free virtual router trial now and enjoy 24/7 support. KEY FEATURES INCLUDE: Advanced IPv4 and IPv6 Unicast and Multicast Stateful firewall, IPsec, SSL-Based OpenVPN and DMVPN Linux-based extensible network OS Hypervisors Supported: VMware ESX, Citrix...

    Sponsored By Brocade

  • Downloads // Sep 2014

    You're A Few Steps Away From Future-Proofing Your Career

    Prepare for the future of networking today with free 60-day trial software, web-based training, and a Brocade Network Function Virtualization Certification ($650 value). BE A BROCADE CERTIFIED PROFESSIONAL NOW. Build your skills by creating a virtualized network with the Brocade Vyatta vRouter Stay ahead of the industry's...

    Sponsored By Brocade

  • White Papers // Aug 2014

    Announcing the New Intel Parallel Studio XE 2015

    Intel Parallel Studio XE 2015 is an advanced, comprehensive tool suite that simplifies debugging and tuning, and speeds development. Available in C, C ++, and FORTRAN. Speed time to market: Composer Edition: Includes industry-leading compilers and libraries that are optimized for creating fast parallel code. Professional Edition: Everything in...

    Sponsored By Intel Software

  • White Papers // Aug 2014

    5 Strategies for Modern Data Protection

    It’s no secret that today’s unprecedented data growth, datacenter consolidation and server virtualization are wreaking havoc with conventional approaches to backup and recovery. Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that you’re poised to meet...

    Sponsored By CommVault Systems