Search results

  1. Red Hat Storage Server as a Hybrid Storage Solution for Splunk Enterprise

    Big Data, we all have it in some shape or form. The trick to making valuable proactive decisions is tucked away inside that mass of data. We use products like Splunk to help you find that needle in your haystack. Any analyst will tell you that trending ov ...

    Jon - 11/30/2018 - 14:34

  2. NetApp E-Series for Splunk Enterprise

    Splunk Enterprise, as deployed on NetApp’s E-Series Storage Systems, represents a cost-effective solution for indexing, collecting, monitoring, and analyzing machine data for a wide variety of applications. The Splunk workload, which includes indexing, se ...

    Jon - 11/30/2018 - 14:34

  3. Fortune 100 Healthcare Organization Transforms Customer-facing Portal Ecosystems

    Show on page:  Digital Experience Category:  Web Experience Management External Link:  Fortune 100 Healthcare Organization Transforms Customer-facing Portal Ecosystems ...

    Jon - 11/30/2018 - 14:37

  4. Global Nonprofit Case Study

    Show on page:  Digital Experience Category:  Web Experience Management External Link:  Global Nonprofit Case Study ...

    Jon - 11/30/2018 - 14:38

  5. Financial Asset Management Firm Revolutionizes Web Offerings

    Multi-billion Dollar Financial Asset Management Firm Revolutionizes Web Offerings with Cutting-Edge Omnichannel Visitor Experiences Show on page:  Digital Experience Category:  Web Experience Management External Link:  Financial Asset Management Firm Revo ...

    Jon - 11/30/2018 - 14:38

  6. World’s Largest Credit Union Heightens Fraud Monitoring for Extensive Cost Savings and Massive Reductions in Response Time

    Show on page:  Operational Intelligence Category:  Operational Intelligence External Link:  World’s Largest Credit Union Heightens Fraud Monitoring for Extensive Cost Savings and Massive Reductions in Response Time: ...

    Jon - 11/30/2018 - 14:44

  7. Protecting The CIA

    Given the central role that the misuse of technology plays in the commission of cybercrime, organizations have adopted an approach to defending against cybercrime that focuses almost exclusively on technology. 2014 was filled ith indications that defenses ...

    Jon - 11/30/2018 - 14:45

  8. Cutting Risk in Half with Multi-Factor Authentication

    A username and password are the most commonly used forms of computer credentials in use today. Each day, millions of people all over the world input a username and password to prove their identities to computer systems and to access resources. Many large ...

    Jon - 11/30/2018 - 14:45

  9. Web Applications: The Open Front Door to Your Data

    Web applications (to include websites) are increasingly being used to disseminate to and/or collect information from users who are not physically or logically connected to an organization’s network. Attackers are able to abuse communication paths leading ...

    Jon - 11/30/2018 - 14:45

  10. It's HTTPS Time

    I've been seeing an increase in requests for recommendations on adding the protection of HTTPS to client sites. Questions of cost and overall need are the most common. Do you need HTTPS? The standard response to this for years has been  yes,  if  you ...

    Jon - 01/14/2019 - 10:11

Stay In Touch