Skip to main content
 

networks

Results 276 - 300 of 1783Sort Results By: Published Date | Title | Company Name
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : 
data research, big data, virtualization, applications, networks
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
As the networks become ever more essential to business processes, they are also increasing rapidly in size and complexity. Many factors can affect network availability and performance—increasing traffic, configuration problems, failed network elements, changes, and more. Since not all of these problems are hard failures, managing the network to detect and correct business-impacting problems requires new tools, strategies, and initiatives. To deliver the availability and performance business demands, network management teams need to optimize fault management and ensure availability, unify fault and performance management, automate change and configuration management to ensure compliance, and automate IT processes. This integrated approach is called Automated Network Management (ANM).
Tags : 
network management, network
    
HP - Enterprise
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Private cloud computing can better align IT with business concerns by making IT efficient, responsive, and cost-effective. Learn how to start your private cloud with automation and orchestration to gain operational efficiency and financial benefits.
Tags : 
private cloud, cloud automation, cloud orchestration, cloud security, secure cloud computing, applications in the cloud, data in the cloud, scalable private cloud
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : 
cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Because of its location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both function and finance. This paper explores elements to evaluate, like network performance, and security.
Tags : 
application delivery controller, load balancer, load balancing, adc, application delivery, application availability, application security, application scalability, application access, finance
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
In this Magic Quadrant, Gartner examines the role of SSL VPNs in remote access and the state of the market. Read this report to learn how to evaluate the suitability of SSL VPNs in a range of remote-access use cases.
Tags : 
ssl vpn, virtual private networks, magic quadrant, remote access, marketing research
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
The demand for access to email anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn why a service-oriented security perimeter improves security for Exchange.
Tags : 
microsoft exchange, exchange security, email security, email availability, exchange availability, secure exchange access, remote access to exchange, application security, preventing application attacks, application-layer attacks, application firewall, web application firewall
    
F5 Networks Inc
Published By: iCims     Published Date: Jan 24, 2017
here are many benefits to social recruiting. To start, social recruiting enables organizations to hire the best talent. This can be done by connecting, educating, and inspiring people through social networks. While some businesses have dabbled in the social arena, the majority are hesitant to fully pursue social recruiting.
Tags : 
    
iCims
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems UK
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls, anti-virus, threats, solutions, webpulse, defense, cloud
    
Blue Coat Systems UK
Published By: Tellabs     Published Date: Mar 23, 2012
Tellabs' white paper explains how IPsec addresses the security issues inherent in LTE networks. It also reviews the end-to-end protection solutions available in the IETF IPsec standard.
Tags : 
deploy, tellabs, network migration, migration, synchronization, ethernet, backhaul, backhaul network, scalability, revenues
    
Tellabs
Published By: ClickExpress     Published Date: May 01, 2013
The cost of ineffective customer service visits isn't just in money: the greater cost is in customer satisfaction. When a mobile workforce employee doesn't arrive on time, is missing equipment, or doesn't resolve the issue on the first visit, it leads to customer dissatisfaction, lost business, and today, public complaints in the media and social networks. Every single service organization understands the crucial value of great customer service. Every single visit to a customer is critical. In this paper, we reveal the 3 steps to a great visit every time.
Tags : 
employees, customer, mobile, workforce, organization, service
    
ClickExpress
Published By: Juniper Networks     Published Date: Jan 11, 2016
Wenn Sie erfahren möchten, wie Juniper Networks und VMware gemeinsam daran arbeiten, die Infrastruktur zu vereinfachen, die Provisionierung zu automatisieren und die Orchestrierung zu integrieren, sollten Sie unser White Paper lesen. Erfahren Sie, wie ein software-definiertes Rechenzentrum die Cloud optimieren kann.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
Da Anwendungs-Workloads neu definiert werden, müssen sich auch Rechenzentren ändern. In diesem IDC-Whitepaper wird beleuchtet, wie Netzwerk-Automatisierung und -Orchestrierung bei diesem Wandel helfen können und somit einfachere, agilere Netzwerke entstehen.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
In der neuen Studie der RAND Corporation „The Defender’s Dilemma: Charting a Course Toward Cybersecurity“ wird ein bisher einzigartiges heuristisches Modell vorgestellt, das Unternehmen dabei unterstützt, ökonomische Faktoren und Herausforderungen zu erkennen.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
Unsere Anleitung mit fünf Schritten zur Firewall-Planung bietet Ihnen eine Zusammenfassung zur Gestaltung der Netzwerk-Firewall. Sie enthält außerdem Links zu noch detaillierteren Websites und Veröffentlichungen zu diesem Thema. Wenn Sie die Firewall-Architektur für Ihr Unternehmen gestalten, sollten Sie zunächst diesen Text lesen.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
Sicherheit im Rechenzentrum ist eine der wichtigsten Prioritäten für Unternehmen. Laden Sie sich dieses IDC White Paper herunter, um einen topaktuellen, umfangreichen Einblick in die Themen zu erhalten, von der Bedrohungslandschaft bis hin zu Vorhersagen sowie aktuellen Lösungen.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
Erfahren Sie, wie Sie Ihr Netzwerk heute und in Zukunft schützen können. Lesen Sie unsere Broschüre und entdecken Sie, wie Sie sich dank der Firewall der nächsten Generation vor inhalts- und anwendungsbasierten Bedrohungen schützen, die Bandbreite verwalten und die Komplexität herunterschrauben können.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
Erfahren Sie, wie Juniper Networks ein globales Finanzinstitut beim Aufbau eines flexibleren und sicheren Netzwerk unterstützte. Dies resultierte in Senkungen der Betriebskosten durch die Vereinfachung der Sicherheit und die Konsolidierung von Rechenzentren.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
Wenn Sie erfahren möchten, wie die Agilität des Unternehmens und der Netzwerkarchitektur gesteigert werden kann, sollten Sie sich unser White Paper zum Thema Virtualisierung und Unternehmen herunterladen. Finden Sie heraus, wie Ihr Netzwerk ein neues Niveau in Sachen Leistung und Ausfallsicherheit erreichen kann.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
Wenn Sie wissen möchten, wie 7ticks von Interactive Data über ein Netzwerk mit äußerst niedriger Latenz Milliarden Datenpakte von Kunden verwalten, sollten Sie sich die Fallstudie lesen. Erfahren Sie, warum zuverlässige, skalierbare Netzwerke Hunderte Finanzdienstleister weltweit zufriedenstellen.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
Téléchargez notre livre électronique sur la virtualisation pour apprendre à améliorer la flexibilité de votre entreprise et la prestation de services via un réseau ouvert et flexible. Découvrez comment rapprocher les mondes virtuels et physiques et simplifier les connexions entre plusieurs data centers.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
Consultez le livre blanc pour découvrir comment Juniper Networks et VMware travaillent en étroite collaboration pour simplifier les infrastructures, automatiser le provisionnement et intégrer l'orchestration. Découvrez comment un data center défini par logiciel peut permettre d'optimiser le cloud.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
À l'heure où les charges de travail des applications sont redéfinies, les data centers doivent évoluer. Ce livre blanc IDC étudie comment l'orchestration et l'automatisation des réseaux peuvent faciliter cette transition en créant des réseaux plus simples et plus flexibles.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
Une nouvelle enquête menée par RAND Corporation, intitulée The Defender’s Dilemma: Charting a Course Toward Cybersecurity (Le dilemme de la défense : orientation en matière de cybersécurité), présente un modèle heuristique inédit permettant d'aider les entreprises à identifier les moteurs économiques et les défis liés à la défense.
Tags : 
    
Juniper Networks
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.