• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

it networks

Results 801 - 825 of 825Sort Results By: Published Date | Title | Company Name
By: Samsung     Published Date: Feb 02, 2016
The sensors and actuators of the Internet of Things are becoming the programming chiefs for digital signage networks.
Tags : 
samsung, sensors, internet, digital, brand, data, displays, digital signal processing, embedded systems and networking, optoelectonics & displays, sensors & actuators
    
Samsung
By: Silver Peak     Published Date: Aug 18, 2016
There’s been a lot of numbers passed around when it comes to software-defined wide area networks (SD-WANs). IDC predicts the market will reach $6 BILLION BY 2020. Gartner suggests 30 percent of enterprises will have deployed an sd-wan BY 2019.
Tags : 
    
Silver Peak
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
In an innovation-powered economy, ideas need to travel at the speed of thought. Yet even as our ability to communicate across companies and time zones grows rapidly, people remain frustrated by downtime and unanticipated delays across the increasingly complex grid of cloud-based infrastructure, data networks, storage systems, and servers that power our work.
Tags : 
    
Hewlett Packard Enterprise
By: Palo Alto Networks     Published Date: Sep 30, 2016
in our 36-criteria evaluation of automated malware analysis providers, we identified the 11 most significant ones — Blue coat, check Point, cisco, cyphort, Fidelis cybersecurity, Fireeye, Fortinet, intel Security, Palo Alto networks, lastline, and trend Micro — and researched, analyzed, and scored them.
Tags : 
palo alto, automated malware, security, cloud, forrester report
    
Palo Alto Networks
By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and greater convenience through the capabilities of better networking technologies, opportunities have never been greater to use technology to make for a truly seamless hospitality experience. However, growing dependence on your network for everything from booking to entertainment can also mean that hospitality networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business
By: Cox Business     Published Date: Dec 19, 2016
As the healthcare industry continues to move forward into an age of big data, optimization, and greater coordination of care through the capabilities of better networking technologies, opportunities have never been greater to use technology to truly improve how healthcare professionals interacts with patients. However, growing dependence on your network for everything from medical records to billing information can also mean that healthcare networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business
By: Cox Business     Published Date: Dec 19, 2016
In this white paper, we’ll look at Distributed Denial of Service (DDoS) attacks, why they pose a threat to healthcare and other networks, and how to protect against them. As we are expected to host more and more key information on our network, we increase our risk at risk for an attack that can shut down vital services or serve to support a malicious actor out to steal private data.
Tags : 
    
Cox Business
By: Cox Business     Published Date: Dec 19, 2016
In this white paper, we’ll look at Distributed Denial of Service (DDoS) attacks, why they pose a threat to hospitality networks, and how to protect against them. As we are expected to host more information on our network, we increase our risk for an attack that can shut down vital services or serve to support a malicious actor out to steal private data. Customers expect to be able do everything online, and won’t tolerate any interruption in service. This expectation inhibit a situation where an attacker is holds your web services hostage, and you have to choose between paying them off or apologizing to a lot of angry customers.
Tags : 
    
Cox Business
By: Juniper Networks     Published Date: Jun 22, 2017
Hybrid cloud is your IT platform of the present. Juniper Unite Cloud helps you win the race to the hybrid cloud because it offers the flexibility of hybrid cloud and hybrid operations models while effectively confronting and addressing the overabundance of variables in hybrid IT technologies. Juniper’s product portfolio offers the ultimate flexibility, so that you can seamlessly integrate cloud stacks and unify policy in and across today’s and tomorrow’s private and public clouds. Contact your Juniper Networks representative to learn more about this hybrid cloud solution.
Tags : 
cloud computing, cloud mobility, cloud security, esignature, digital signature, transaction security, financal security
    
Juniper Networks
By: Juniper Networks     Published Date: Jun 22, 2017
Juniper’s security solutions seamlessly extend across private and public cloud architectures without compromising security, flexibility, and manageability. With midrange, high-performance, space-efficient, next-generation firewalls, smarter and faster centralized management, and highly evolved security intelligence and automation tools, Juniper Networks allows you to secure your network, keep operational costs down, and easily migrate to a hybrid cloud architecture. For more information about Juniper’s security solutions, please visit us at www.juniper.net/us/en/products-services/security and contact your Juniper Networks representative.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Juniper Networks
By: Juniper Networks     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Juniper Networks
By: Juniper Networks     Published Date: Jun 29, 2017
The bank wanted to modernize its global data center core and edge networks to move to the next stage of its private cloud journey. The bank has long recognized the advantages of server virtualization, and it wanted to move more aggressively to a software-defined data center. The bank was virtualizing all services, including compute, storage, and network, to gain greater business flexibility and deliver cost savings. But first, it needed an elastic, flexible, and production ready network to connect its data centers. The bank wanted a dynamically scalable network to interconnect its data centers in Europe, Asia, and North America, so that it could move toward a fully automated, self provisioned cloud. The global network needed to deliver performance at scale for the company’s highly virtualized resources, while also supporting integration of legacy assets into its software-defined data centers.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : 
security, switching, routing, operating system, secure network, sdsn, solutions
    
Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
As networks scale, they become difficult to manage. A different command line interface (CLI) or operating system (OS) is required for every device type in your network, such as routers, switches, and firewalls. Learning a new OS for every device is a complex task for your operations team and can slow them down—not a very efficient way to run a network.
Tags : 
r&d, drive innovation, automation delivery, critical networks, solutions, lifetime warranty, juniper networks
    
Juniper Networks
By: Pure Storage     Published Date: Jul 03, 2019
Deep learning opens up new worlds of possibility in artifi cial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-fl ash storage infrastructure that is built specifi cally to work with high-powered analytics.
Tags : 
    
Pure Storage
By: Pure Storage     Published Date: Jul 03, 2019
Deep learning opens up new worlds of possibility in artificial intelligence within the Financial Services industry, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-flash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
    
Pure Storage
By: OKTA     Published Date: Oct 11, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
    
OKTA
By: Butler Technologies     Published Date: Jul 03, 2018
MPO connectors increase your data capacity with a highly efficient use of space. But users have faced challenges such as extra complexities and time required for testing and troubleshooting multi-fiber networks. VIAVI helps overcome these challenges with the industry's most complete portfolio of test solutions for MPO connectivity.
Tags : 
    
Butler Technologies
By: SAP     Published Date: Oct 11, 2018
For years, high-tech companies have relied on manual, linear, design-to-deliver processes when selecting, managing, and collaborating with suppliers of components and raw materials. But the digital marketplace has transformed the nature of how business gets done. Digital networks are disrupting business and changing the nature of direct spend management – and just in time to deliver new efficiencies and cost savings needed to compete in today’s complex marketplace.
Tags : 
    
SAP
By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
An opportunity for Chief Procurement Officers (CPOs): As business models evolve and technology advances, CPOs can elevate their value across enterprises and extended supplier networks with Cognitive Procurement capabilities that can sense and act.
Tags : 
    
Group M_IBM Q2'19
By: UPS Capital     Published Date: Feb 13, 2019
Commerce today involves an increasingly complicated supply chain ecosystem. Companies rely on suppliers and buyers across the globe, most of whom they’ve never met. They use multiple carriers and modes of transportation, across international borders, with different languages, currencies and laws. This ever-changing landscape means that companies of all sizes must be more diligent than ever when it comes to managing their supply chain — and their risk. In addition, e-commerce has revolutionized purchase behaviors, creating loftier customer expectations, and putting increased pressure on sellers to find new ways to meet those needs. Global networks and tight time constraints can amplify the impact from unpredictable events, like theft, damage, weather and natural disasters. This puts even more pressure on a company’s supply chain, and its bottom line.
Tags : 
    
UPS Capital
By: Gigamon     Published Date: May 23, 2019
A new report from Gigamon ATR helps security practitioners understand how Emotet, LokiBot and TrickBot traversed enterprise networks without detection in 2018. It particularly focuses on the malwares’ command and control (C2) and lateral movement, as these behaviors expose opportunities to observe network traffic, discover these threats and reduce risk. The goal: shorter mean time to detection and response, a more mature security program and a balanced approach to mitigating risk.
Tags : 
    
Gigamon
By: Intel     Published Date: Apr 09, 2019
Get a glimpse into the workshop hosted in Milan, Italy, where participants learn about industrial protocols and sensors, computer vision, time-sensitive networks, and more.
Tags : 
    
Intel
Start   Previous    19 20 21 22 23 24 25 26 27 28 29 30 31 32 33     Next   End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter