• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

it networks

Results 426 - 450 of 849Sort Results By: Published Date | Title | Company Name
By: Vectra Networks     Published Date: Nov 05, 2015
Intrusion Detection Systems have ceased to live up to their name and have lost their ability to spot today’s sophisticated intrusions. Consequently, cyber attackers are taking advantage of it by launching more evasive and strategic threats that spread rapidly within networks. And security teams are left without the proper tools or insight to identify intrusions that pose the biggest risk.
Tags : 
intrusion detection systems, cyber attackers, sophisticated intrusions, intrusion detection, security
    
Vectra Networks
By: iZigg90210     Published Date: Feb 07, 2011
Who is the the most important person to promote and brand in today's economy? YOU! Personal branding on Facebook. Personal branding on Twitter. Personal branding on countless social networks.
Tags : 
"go where the eyes are"
    
iZigg90210
By: Tidal Software     Published Date: Sep 03, 2008
IT groups must support many applications and servers across multiple platforms that frequently operate independently of each other. However, coordinating job scheduling across all these applications and networks is often required to optimize resource utilization. The traditional approach of applying more staff, toolkits, and rudimentary scheduling software to cobble together automated batch processing solutions becomes cost-prohibitive, inefficient, and error-prone, as the number of moving parts increases and the environment becomes more heterogeneous.
Tags : 
job scheduling, job scheduler, batch scheduling, batch processing, cron, workload automation, application scheduling, enterprise scheduling
    
Tidal Software
By: ALE USA, Inc     Published Date: Nov 01, 2019
Advanced technology in elementary, middle and high schools creates new ways for students to learn, and changes how teachers plan and deliver lessons. It also provides the digital tools for school administrators to simplify operations, better comply with regulations, and deliver a safer environment for students and teachers. Is your K-12 network ready for the digital education innovations of the future? This guide provides school administrators and IT teams information and strategies for designing efficient and cost-effective IT networks that enable dynamic digital learning experiences. This secure, highperformance platform supports administrative innovation for today and into the future.
Tags : 
    
ALE USA, Inc
By: Comcast Business     Published Date: Apr 13, 2017
Of all the industries targeted by cyber-attackers, financial services is one of the most attractive. As noted bank robber Willie Sutton once said, “Go where the money is … and go there often.” That, it seems, is what cybercriminals are doing, launching malware, Trojans, spear phishing and ransomware attacks at banks and institutions to compromise networks and gain access to valuable data. Download now!
Tags : 
    
Comcast Business
By: KEMP Technologies     Published Date: Aug 04, 2008
KEMP Technologies LoadMaster Application Delivery Controller and Server Load Balancer appliances provide full support for Microsoft Windows Terminal Services (WTS). The LoadMaster WTS capabilities helps organizations maximize the efficiency and effectiveness of their networks. KEMP delivers this at an affordable price.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies
By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis
    
Nevis Networks
By: VMware AirWatch     Published Date: Oct 14, 2016
Advances in the technologies of the electronic components essential to mobility continue to yield powerful and productive mobile computers and communicators, with an amazing range of function and raw capabilities that even seasoned professionals find remarkable. There also have been dramatic improvements in wireless networks—from Wi-Fi to the broadband cellular services that continue to expand in both coverage and capacity—that offer throughput and related performance characteristics that rival what’s possible on wire. Finally, add in apps, cloud solutions and related management capabilities, and there’s never been a better time than right now to profit from a strategy that reaps the benefits of a mobile workforce—and, really, a mobile organization.
Tags : 
    
VMware AirWatch
By: Data Center Frontier LLC     Published Date: Nov 11, 2019
This business and technical White Paper is an exploration of the data centre fiber optic networking infrastructure requirements needed to meet current and future demands for data volumes and data rates. It covers how 200Gigabit (Gbps) and 400Gbps Ethernet (GE) fiber optic technologies evolved and how they should advance to 800GE and 1.6TE. It also explores what the right technologies are for sustainable investment strategies to future proof data centre networks.
Tags : 
    
Data Center Frontier LLC
By: Cisco Systems     Published Date: Dec 23, 2013
Faced with trends like cloud and the rapid rise of mobile devices, IT needs a new, simpler model of building networks to support and optimize applications. In this Lippis Report, learn how the Cisco ISR Application Experience Router helps you improve application speed, security, and control. Read Now
Tags : 
cisco, lippis, centric networking, cloud computing, network engineers, bandwidth, wan, wide area networks
    
Cisco Systems
By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
By: IBM     Published Date: Nov 08, 2011
IBM System Networking RackSwitch provides ultralow-latency switching inside a collocated network. Read more now.
Tags : 
rackswitch, collocated networks, ibm sytem, networking, ultra low latency configurations, data networking, enterprise hardware, software management
    
IBM
By: Cisco     Published Date: Dec 22, 2016
Today the network is critical in driving change in virtually all organizations as they take their digital transformation journey. This transformation journey will help organizations increase agility, improve productivity, better engage with customers, and protect key intellectual property and assets. The network edge has a pivotal role to play in this transformation and carries perhaps the broadest set of responsibilities when compared to the core and to data center networks. As shown in Figure 1, when comparing each layer of the network, the network edge has a broad breadth of responsibility in the campus. This is also true for the branch
Tags : 
    
Cisco
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
By: BubblewrApp     Published Date: Jan 20, 2015
The Company (name withheld) provides data center management and monitoring services to a number of enterprises across the United States. The Company maintains multiple network operations centers (NOCs) across the country where engineers monitor customer networks and application uptimes around the clock. The Company evaluated BubblewrApp’s Secure Access Service and was able to enable access to systems within customer data centers in 15 minutes. In addition, the Company was able to: a. Do away with site-to-site VPNs – no more reliance on jump hosts in the NOC b. Build out monitoring systems in the NOC without worry about possible IP subnet conflicts c. Enable NOC engineers to access allowed systems in customer networks from any device
Tags : 
systems management, customer data centers, network operation centers, secure access service, enterprise applications
    
BubblewrApp
By: Cambium Networks     Published Date: Oct 03, 2016
In this paper we’ll go over some of these challenges and how a network administrator can use the features of Cambium NEtworks cnPilo Wi-Fi solutions to resolve them.
Tags : 
wi-fi, solutions, it solutions, wireless networks, schools, service management
    
Cambium Networks
By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once they’re inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate “stealth” attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : 
risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach
    
Illusive Networks
By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS, Inc.
By: SPSS Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS Inc.
By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS
By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems
By: netVigilance     Published Date: Aug 21, 2009
Managing network vulnerabilities will be the biggest challenge for C-Level executives in the coming years. Intrusions are more frequent and more malicious, so the security of corporate networks, and therefore the security of the entire corporation are dependent on the ability to quickly identify, prioritize and remediate vulnerabilities in the network.
Tags : 
cost control, it spending, network security, budget, ids, intrusion prevention, vulnerability management, net vigilance
    
netVigilance
By: Akamai Technologies     Published Date: May 08, 2017
This paper, which has been jointly developed by Akamai and Wuaki.tv — an OTT service provider — covers the importance of satisfying viewer expectations for a broadcast-quality experience by quickly and reliably streaming video online. It explains why it is challenging to do so and outlines best practices for online video delivery. It also explores the option of splitting traffic across multiple content delivery networks (CDNs) versus tightly integrating video player technology with a single CDN in order to improve online video delivery in a strategic manner. Finally, the paper shows how Wuaki.tv chose the latter option and boosted customer retention, customer referrals, and revenues as a result.
Tags : 
content delivery, online video delivery, broadcast quality, viewer expectations, video streaming
    
Akamai Technologies
By: Meru Networks     Published Date: Aug 21, 2009
Pervasive wireless LAN deployments require much larger, broader deployment of Wi-Fi access points than hot spots, cafes or isolated guest access in the enterprise. Clearly new solutions and deployment methodologies should be considered to make pervasive wireless LAN deployments feasible and economical.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells
    
Meru Networks
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter