• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

it networks

Results 351 - 375 of 816Sort Results By: Published Date | Title | Company Name
By: Citrix Systems     Published Date: Nov 23, 2015
Learn how SDN helps address the challenges of virtualization. You will learn practical tips that can help you get started immediately.
Tags : 
citrix, sdn, virtualization, networks, networking, storage, data management
    
Citrix Systems
By: Citrix Systems     Published Date: Nov 23, 2015
In the competitive business world IT organizations need to respond rapidly to the ever-changing needs of their users for resources to support their business applications.
Tags : 
citrix, networks, application delivery, sdn, networking, storage, data management
    
Citrix Systems
By: Citrix Systems     Published Date: Nov 23, 2015
If you’re ready to explore the advantages of SDN, and want to know how it should be implemented within your enterprise, start by reading our introductory whitepaper.
Tags : 
citrix, sdn, networks, application delivery, networking, enterprise applications, data management
    
Citrix Systems
By: Citrix Systems     Published Date: Nov 23, 2015
Learn how NetScaler fared and provided up to 480% the performance of F5.
Tags : 
citrix, netscaler, data centers, networks, tolly, networking, storage, data management
    
Citrix Systems
By: Citrix Systems     Published Date: Nov 23, 2015
Learn how NetScaler delivers data-driven networking by reading the Network World QuickPulse report, "Gaining 20-20 Insight into Network and Application Performance"
Tags : 
citrix, networks, applications, performance, netscaler, networking, storage, data management
    
Citrix Systems
By: Citrix Systems     Published Date: Nov 23, 2015
Citrix NetScaler is helping prepare enterprises for today’s network challenges while supporting modern virtual, cloud, mobile, social and big data environments. For more information on ADCs, and the cutting edge benefits of NetScaler, read the Network World QuickPulse report, "Take a Load Off Your Data Center"
Tags : 
citrix, data center, netscaler, adc, networks, networking, storage, data management
    
Citrix Systems
By: Citrix Systems     Published Date: Nov 23, 2015
Read this paper to see how NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
citrix, netscaler, networks, adc, networking, storage, data management
    
Citrix Systems
By: Citrix Systems     Published Date: Nov 23, 2015
A key element of Citrix TriScale Technology for the market-leading NetScaler ADC, TriScale Clustering enables enterprises of all sizes to evolve from basic HA pairs to more efficient and scalable clustering deployments, and realize multiple benefits
Tags : 
citrix, clustering, networks, adc, applications, networking, enterprise applications, storage, data management
    
Citrix Systems
By: Citrix Systems     Published Date: Nov 23, 2015
A market leader, Citrix NetScaler is an all-in-one web ADC that makes applications run five times faster, reduces web app ownership costs and ensures that apps are always available.
Tags : 
citrix, triscale technology, netscaler, cloud, networks, networking, enterprise applications, storage, data management
    
Citrix Systems
By: Citrix Systems     Published Date: Nov 23, 2015
In this paper we will describe the fundamentals of a load balancing system and its evolution to an ADC
Tags : 
citrix, adc, networks, applications, networking, storage
    
Citrix Systems
By: Citrix Systems     Published Date: Nov 23, 2015
The purpose of this study is to provide a framework for businesses to evaluate the potential financial impact that NetScaler can have in their organizations based on results from existing customers.
Tags : 
citrix, netscaler, business benefits, networks, applications, cost savings, networking, storage, data management
    
Citrix Systems
By: Citrix Systems     Published Date: Feb 10, 2016
With its new TriScale Technology, Citrix is enabling a genuine revolution for enterprise cloud networks by providing an unrivaled set of capabilities that smartly scale application and service delivery infrastructures, affordably and with no additional complexity.
Tags : 
    
Citrix Systems
By: Cotendo     Published Date: Nov 18, 2011
Learn about the technology limitations killing the performance of mobile websites and mobile applications, plus how innovations in mobile content delivery networks (CDNs) can transform users' experience of the mobile Web.
Tags : 
mobile cloud, mobile web performance, mobile website performance, mobile application performance, mobile content delivery, mobile acceleration, mobile cdn, cotendo mobile, mobile internet performance, mobile rtt, mobile round trip time, mobile spdy, cotendo, white paper, cdma, mobile computing, mobile data systems, mobile workers, smart phones, wifi
    
Cotendo
By: Riverbed     Published Date: Nov 12, 2012
This Forrester white paper examines the trends driving the new wave of dynamic web content in enterprises to understand its sources, its shape, and its impact on current web architectures and networks. Learn more about the keys to content management
Tags : 
dynamic web, web content management, wcm, web architecture, enterprise applications, contact management
    
Riverbed
By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
By: ForeScout     Published Date: Jan 24, 2013
This IDC study surveyed IT managers about the number of consumer devices on their networks, they underestimated the number by 50%. Whether you are prohibiting, tolerating or embracing BYOD, you need to define policy and security.
Tags : 
bring your own device, byod, idc survey, it managers, devices on network, networking, knowledge management, data management
    
ForeScout
By: CDW     Published Date: Nov 13, 2012
Mobility and Bandwidth-hungry apps demands faster and more efficient networks.
Tags : 
cdw, network, data, organizational it, video conferencing, enterprise networks
    
CDW
By: CDW     Published Date: Oct 10, 2013
Integrate and simplify mobility management with total mobility management from CDW.
Tags : 
byod, mobility management, total mobility, leverage practices, mobile device management, mdm, mobility strategies, wireless networks, mobile application management, mam, wireless, access control, employee performance, productivity, software compliance
    
CDW
By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW
By: McAfee     Published Date: Feb 06, 2013
Windows 8 includes many new security features, such as secure password storage, secure boot functions, anti-malware defenses, and even enhanced reputation capabilities. Will these features be enough to mitigate risks to users and corporate networks?
Tags : 
windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000, windows xp, windows defender, boot time protection, 2012 windows server security, endpoint protection 2012, smartscreen technology, adobe flash security, security, windows
    
McAfee
By: Cisco     Published Date: Apr 08, 2014
As the industry moves forward to meet the enormous demand for data with video, mobile, and cloud, the core networks need to transition from 10G to 100G and beyond.
Tags : 
cisco, 100g, data, video, mobile, cloud, core networks, transition, 10g, software development, it management
    
Cisco
By: Cisco     Published Date: May 14, 2015
Où qu'elles se trouvent et quel que soit leur secteur d'activité, les PME sont de plus en plus soumises à des impératifs d'amélioration de la productivité et des performances. Les entreprises de 100 à 1 000, voire 2 500 employés, sont toujours suffisamment agiles pour saisir de nouvelles opportunités.
Tags : 
cisco, lbs, it technology, wifi, analytics, wireless networks, infrastructure, network architecture, network management, network performance management, best practices
    
Cisco
By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
    
Cisco
By: Cisco     Published Date: Dec 21, 2016
Across organizations from all sectors, the network is becoming more integral to daily operations. This is acutely felt by public sector organizations in the United States, namely federal, state, and local governmental organizations. Public sector organizations contend with the challenge of ensuring the security of highly sensitive data on the network in the midst of uncertain budgets and, in many cases, outdated infrastructure. At the same time, many public sector organizations grapple with a complex web of compliance protocols that must be supported on the network. This Analyst Connection explores the need for network infrastructure upgrades that include "foundational security."
Tags : 
    
Cisco
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter