Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

network application

Results 276 - 300 of 636Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems     Published Date: Nov 23, 2015
The purpose of this study is to provide a framework for businesses to evaluate the potential financial impact that NetScaler can have in their organizations based on results from existing customers.
Tags : 
citrix, netscaler, business benefits, networks, applications, cost savings, networking, data center
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
Learn what traditional network security solutions can’t do and why your organization needs a web application firewall as a cornerstone of its IT security strategy
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
With its new TriScale Technology, Citrix is enabling a genuine revolution for enterprise cloud networks by providing an unrivaled set of capabilities that smartly scale application and service delivery infrastructures, affordably and with no additional complexity.
Tags : 
    
Citrix Systems
Published By: Blue Coat Systems     Published Date: Aug 07, 2012
For anywhere, anytime, any-device mobile engagement, implementing a stateless architecture calls for building protection in the application layer, moving from device management to risk-based device inspection, performing real-time threat detection and mitigation, and leveraging cloud technologies.
Tags : 
mobility, it security, security & risk, s&r, infrastructure operations, i&o, devices, augmented reality, apps. cloud, virtualization, managed network, remote access, applications
    
Blue Coat Systems
Published By: Riverbed     Published Date: Oct 16, 2012
As enterprises continue to grow, tools for collaboration are becoming more interactive. Read this to learn how to examine the need for acceleration, application control and visibility to improve and solve problems effectively for the future.
Tags : 
riverbed, wan optimization, wan, network management, enterprise application, networking
    
Riverbed
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
    
ForeScout
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: CDW     Published Date: Oct 10, 2013
An ambitious mobile strategy built around tablets is helping Hyatt Hotels reach new levels of customer service.
Tags : 
mobile strategy, case study, wireless strategy, customer service, modernizing hospitality, apple, ipad, technology for businesses, hospitality, hotels, hyatt hotels, convergence, network performance management, mobile applications
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Integrate and simplify mobility management with total mobility management from CDW.
Tags : 
byod, mobility management, total mobility, leverage practices, mobile device management, mdm, mobility strategies, wireless networks, mobile application management, mam, wireless
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits, website filtering, device control, buffer overflow, physical file transfer, desktop firewall, web filtering, email filtering, web gateway, email gateway, application control, application whitelisting, host ips
    
McAfee
Published By: Viavi Solutions     Published Date: Apr 14, 2017
NPMD solutions are typically not directly involved in the actual card cardholder transaction. However, given that many can potentially capture and transmit cardholder data they must be viewed as an integral part of a business’ PCI DSS compliance strategy, especially when investigating data breaches for the purposes of reporting or remediation. Therefore, beyond satisfying your service delivery monitoring and troubleshooting requirements, be sure to verify your NPMD solution protects cardholder data and aids your efforts in PCI DSS compliance.
Tags : 
network security, account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : 
sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
    
Viavi Solutions
Published By: Aruba Networks     Published Date: Jul 03, 2013
The increased performance and higher capacity of 802.11ac have tremendous appeal for organizations rapidly approaching the limits of their current Wi-Fi network, or for organizations that are striving to adopt next-generation applications or interactive network experiences. To help identify these opportunities, this brief represents the top use cases for adopting 802.11ac technology today.
Tags : 
802.11n, 802.11ac, ieee, enhancements, reliability, 5-ghz, capacity
    
Aruba Networks
Published By: Aruba Networks     Published Date: Jul 03, 2013
The next-generation workplace is all about mobility. It has to be. By the end of 2013, there will be more Internet-connected mobile devices than people. Networking for the next-generation workplace must ensure that each device and business application has reliable service tailored to its performance needs. And that the network is right sized for mobility. Download this white paper to access the key characteristics of the network for the next-gen workplace…
Tags : 
802.11ac, mobile technology, migration, 5ghz
    
Aruba Networks
Published By: Dell     Published Date: Sep 12, 2013
With the arrival of Dell 12th generation servers (12G) and Microsoft Windows Server 2012, your organization can now significantly simplify Windows Server deployment. Window Server 2012 delivers a number of new enhancements and features over your current Windows Server 2003 or Windows Server 2008 infrastructure. With Windows Server 2012, your organization can benefit from improved virtualization, identity and access control management, graphical interface, storage and networking, and Web and application hosting. Dell 12G servers provide a powerful platform for Windows Server 2012 and its advanced features, giving your organization better performance, reliability and management, all of which improve return on investment (ROI) and your bottom line. For more information on powering Dell servers with Windows Server 2012, see www.dell.com/ws2012.
Tags : 
dell poweredge, 12g servers, windows servers, performance, reliability, control management, graphical interface, storage, networking, web hosting, application hosting
    
Dell
Published By: Cisco     Published Date: May 14, 2015
This white paper examines the opportunity midmarket firms have in leveraging network infrastructure for competitive success in the new cloud and mobility era.
Tags : 
networking, api, applications, management, visualizing, best practices, cisco, infrastructure, network architecture, network management, network performance, network performance management
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
networking, api, applications, management, visualizing, best practices, design, cvd, cisco, migration, network architecture, network management, cloud computing, data center design and management
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
Cisco Unified Data Center unifies compute, storage, networking, virtualization, and management into a single platform. The result is operational simplicity and business agility -- essential for cloud computing and deploying IT as a Service.
Tags : 
data center, software, networking, infrastructure, applications, cisco, network management, network performance management, cloud computing, data center design and management
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
This edition of Unleashing IT showcases Cisco’s holistic approach to the future of networking: application Centric Infrastructure (aCI). Promoted by Cisco, Intel®, and ecosystem partners, aCI is a true innovation that changes the way technology is delivered in support of business priorities.
Tags : 
api, applications, monitoring, application management, communications, cisco, infrastructure
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
    
Cisco
Published By: AlienVault     Published Date: Jun 05, 2015
Practical security controls that won't break the bank
Tags : 
threat management, security, network, web application, network
    
AlienVault
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
What is SD-WAN? Software-Defined Wide Area Network (SD-WAN) is the application of software-based network technologies to WAN connections to more effectively route all network traffic between headquarters or data centers, remote and branch offices, and the cloud. More simply, it is the method of leveraging the benefits of the cloud, the bandwidth of broadband and existing enterprise-wide network infrastructure to more efficiently and cost effectively transmit media (data, video, voice) and quickly access cloud applications from every location in the network. SD-WAN dynamically utilizes multiple available connections (MPLS, broadband, LTE) to find the optimal delivery path for traffic across the entire network, shaping the bandwidth as needed to eliminate jitter and dropped data packets, thereby delivering an optimal user experience regardless of location. The more sophisticated solutions will first attempt to dynamically steer traffic to the best available link and if the available link
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
The network of yesterday is not the network that can take businesses into the future. As mission critical enterprise applications move to the cloud, wide area network (WAN) must adapt to become agile, flexible, and scale rapidly. Leading IT trends such as Internet of Things (IoT), Software as a Service (SaaS), cloud storage, enterprise mobility, emerging transport alternatives, and globalization increase the importance of how network assets are leveraged and how the network is conceptualized. The advantages of public and private data centers and cloud-based applications are significantly diminished if the network is slow, inflexible, and unpredictable. Erratic network performance with high latency, jitter and packet loss can significantly impact user adoption, satisfaction, and overall corporate productivity. As connectivity options continue to emerge, end users are no longer tethered to the office or to the localized applications and services that were trademarks of a primary or branc
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. Over the years, organizations consolidated many regional data centers into a few highly available data center locations which meant that remote locations had to connect to centralized applications over WANs and all internet traffic went through these data centers as well. This introduced bandwidth constraints and latency issues. The development in WAN optimization provided incremental and measurable improvement in WAN performance and provided some bandwidth cost containment. However, that technology typically was only deployed at the most problematic sites that struggled to achieve acceptable levels of performance and user experience. It did not solve all the issues with WAN connectivity. WAN infrastructure planning was limited to increases in capacity that were met by provisioning additional carrier MPLS (multiprotocol label switching)
Tags : 
    
VMware SD-WAN by VeloCloud
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.