Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

data network

Results 1 - 25 of 967Sort Results By: Published Date | Title | Company Name
Published By: Zpas     Published Date: Apr 18, 2017
Download this white paper to explore ZPAS Group's selection of products.
Tags : 
cooling, datacenter, cabinet, network, outdoor, zpas_uk
    
Zpas
Published By: Viavi Solutions     Published Date: Nov 27, 2017
Testing and troubleshooting are imperative for data center operators to provide a continuous access to data via network connections. This case study provides useful knowledge of some of the key test use cases for data center operators.
Tags : 
testing, troubleshooting, multi-tenant, data center, test guide, viavi_series
    
Viavi Solutions
Published By: Schneider Electric     Published Date: Aug 21, 2017
This paper explains how to specify the physical infrastructure for an IT pod and describes optimum configurations based on available power feeds, physical space, and targeted average rack power densities.
Tags : 
data centers, networking, architecture, it pod, infrastructure, data center
    
Schneider Electric
Published By: Citrix     Published Date: Jul 14, 2016
This White Paper goes some way to finding a solution to your Data Center security problems. Citrix Netscaler, is the latest application delivery controller for building enterprise cloud networks. Today's enterprises can leverage their infrastructure to establishand extend a robust cost-effective for Nex Gen security. Download FREE today.
Tags : 
citrix_uk/eu, security, data center, cost effective, networking, it management, telecom
    
Citrix
Published By: Citrix     Published Date: Aug 17, 2017
This white paper discusses the requirements of GDPR and how they can be addressed with integrated Citrix technologies for contextual access, network security, application security, data security, and analytics and insights.
Tags : 
data center, gdpr, network security, data, application security, citrix_gdpr
    
Citrix
Published By: Commscope NL     Published Date: Nov 29, 2016
This white paper addresses some pain points for data center managers: > Uncertainty about future technologies > Complexity of the network > Scale/upgrade without disruption > Lack of engineering guidelines
Tags : 
commscopenl, data center
    
Commscope NL
Published By: Juniper Networks     Published Date: Mar 15, 2017
What is the business value of Juniper Networks' solutions?
Tags : 
data center, infrastructure, networks, bandwidth, fiber, ip networking, juniper_dcd, networking
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 28, 2017
In this exclusive eBook, we tackle these issues to help you map out a clear route to achieving successful cloud integration within your enterprise.
Tags : 
cloud, networks, ethernet, applications, automation, orchestration, datacenter
    
Juniper Networks
Published By: Commscope     Published Date: Nov 29, 2016
This white paper addresses some pain points for data center managers: > Uncertainty about future technologies > Complexity of the network > Scale/upgrade without disruption > Lack of engineering guidelines
Tags : 
commscope dach, data center
    
Commscope
Published By: Anixter     Published Date: Jun 16, 2015
Faster, denser technology is driving costs, and the right high performance cabling is needed to provide stability in the data center. Unsuitable infrastructure can become an expensive problem, delaying necessary upgrades and creating other potential obstacles needed to stay competitive. This report contains the four best practices needed to achieve a high performance, future-ready structured cabling solution for a data center.
Tags : 
network migration, cabling, data speed, network infrastructure, data center, infrastructure, network performance, data center design and management
    
Anixter
Published By: Nexans     Published Date: Apr 20, 2017
According to Cisco’s Global Cloud Index (2015), global data centre IP traffic will grow at a CAGR of 25% between 2014 and 2019 and data centre workloads within ‘traditional’ (as opposed to cloud) data centres will more than double. In this guide you will find best practices to meet the demands of the Digital Economy, with help from DatacenterDynamics and Nexans.
Tags : 
data center
    
Nexans
Published By: Eaton     Published Date: Sep 29, 2017
The possible “outages” that might have been forgotten. Uninterruptible Power Supplies and Power Distribution - Power Distribution + UPS
Tags : 
datacenter, power, outage, energy, network, series_of_eaton_white_papers
    
Eaton
Published By: Eaton     Published Date: Sep 29, 2017
The possible “outages” that might have been forgotten Uninterruptible Power Supplies and Power Distribution - Power Distribution + UPS - Part 2
Tags : 
datacenter, power, outage, energy, network, series_of_eaton_white_papers
    
Eaton
Published By: Eaton     Published Date: Sep 29, 2017
The possible “outages” that might have been forgotten - Power Distribution
Tags : 
datacenter, power, outage, energy, network, series_of_eaton_white_papers
    
Eaton
Published By: Eaton     Published Date: Sep 29, 2017
UPS installation safety requirements
Tags : 
datacenter, power, outage, energy, network, series_of_eaton_white_papers
    
Eaton
Published By: Nlyte     Published Date: Nov 16, 2017
The IT professional’s guide to moving beyond spreadsheets and diagrams.
Tags : 
cooling, power, energy, data center, network, infrastructure, capacity, space, series_of_nytle_nam_white_papers
    
Nlyte
Published By: LeGrand     Published Date: Oct 18, 2016
Efficiency is a key objective when designing a data center. Efficiency gains are typically focused completely on power and cooling. Efficiencies can be realized in many other areas resulting in additional cost savings, reliable network performance, easier maintenance, flexibility, and scalability.
Tags : 
data center, connection, design, performance, time, space, experience, legrand, networking, security
    
LeGrand
Published By: LeGrand     Published Date: Oct 18, 2016
What will the world we live, play and work in be like 10-15 years from now? One can only guess, but there are some important things to consider today, when we design the infrastructure to support tomorrow’s needs being driven by billions of IoT connected devices.
Tags : 
data center, iot, connection, networking, security
    
LeGrand
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
    
MalwareBytes EMEA
Published By: IBM APAC     Published Date: May 14, 2019
IBM PowerAI Enterprise helps to make deep learning easier and faster for organizations by bringing together some of the most popular open source frameworks for deep learning, with development and management tools in a single installable package. Designed to simplify end-toend deep learning, PowerAI Enterprise allows enterprises to spend less time on data preparation, implementation and integration, and more time training neural networks for results. IBM PowerAI Enterprise version 1.1.2 includes the most popular deep learning frameworks in one installation: - BVLC Caffe - IBMCaffe - TensorFlow - PyTorch - Keras (tensorflow-keras)
Tags : 
    
IBM APAC
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.