Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

network application

Results 201 - 225 of 642Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Every inspiring organization, large or small, faced with the opportunities and challenges of digital business needs a digital-ready network. Agile, secure networks simplify IT and enable rapid innovation. Without a network that can actively enable and protect your business strategy, the applications, cloud services, and devices you deploy cannot live up to their potential
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Your business relies on a Microsoft® infrastructure that stretches from your network to the cloud to endpoints located around the world. In many ways, the success of your business relies on how secure your Microsoft infrastructure is. Your users do not care where the applications and data reside; they only care about getting their job done. SharePoint®, Skype for Business, or Active Directory® deployed on the network, in Azure®, or as part of your Office 365® subscription should have no impact on the success of your business.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security, microsoft
    
Palo Alto Networks
Published By: Riverbed     Published Date: Nov 30, 2016
Digital transformation on the 3rd Platform continues to present unprecedented opportunities and challenges for enterprise networks and the IT professionals who operate them. Indeed, the requirements associated with cloud computing have already reverberated through data center networking, with software-defined networking (SDN) arising as an architectural approach that provided the network with the agility and responsiveness that it lacked previously but has come to require. Now, the focus is turning to how the WAN must change to accommodate the requirements of cloud applications and services. Fortunately, technologies such as hybrid WAN and software-defined WAN (SD-WAN) are coming to the rescue, giving enterprise IT the means to allow the WAN to meet these challenges directly.
Tags : 
    
Riverbed
Published By: ThousandEyes     Published Date: Nov 17, 2016
Traditional performance management solutions were built for applications owned by the enterprise and run inside the corporate network. The explosive adoption of Software-as-a-Service (SaaS) and cloud applications have brought new performance management challenges that push the limits of the enterprise infrastructure and break these traditional approaches. In this white paper, we examine why existing solutions don’t work for the modern enterprise and discuss a fundamentally different approach that is needed to address the new challenges. Download now to learn more!
Tags : 
    
ThousandEyes
Published By: Ciena     Published Date: Nov 15, 2016
"Economic conditions have changed the operating landscape for government and educational organizations. Modern, converged networks utilize advanced optical and Ethernet technologies to form a highly flexible and scalable infrastructure capable of delivering many emerging applications and ready to scale far into the future. Additional benefits of building better networks for state and local governments include: >Better public service at lower taxpayer cost >Support for emerging applications in transportation, public safety, healthcare, and education >A graceful technology migration from legacy to converged network > Preparation for future, unplanned government applications Download ""Building Better Networks for State and Local Governments"" to discover more today."
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena
    
Ciena
    
Ciena
Published By: Citrix     Published Date: Nov 14, 2016
Modernize application networking with Citrix NetScaler and Cisco Application Centric Infrastructure (ACI)
Tags : 
cisco, citrix, citrix netscaler, cisco aci, data center automation, sdn, software defined networking, networking, enterprise applications
    
Citrix
Published By: Riverbed     Published Date: Nov 02, 2016
Digital transformation on the 3rd Platform continues to present unprecedented opportunities and challenges for enterprise networks and the IT professionals who operate them. Indeed, the requirements associated with cloud computing have already reverberated through datacenter networking, with software-defined networking (SDN) arising as an architectural approach that provided the network with the agility and responsiveness that it lacked previously but has come to require. Now, the focus is turning to how the WAN must change to accommodate the requirements of cloud applications and services. Fortunately, technologies such as hybrid WAN and software-defined WAN (SD-WAN) are coming to the rescue, giving enterprise IT the means to allow the WAN to meet these challenges directly.
Tags : 
    
Riverbed
Published By: Riverbed     Published Date: Nov 02, 2016
"Visibility into the live mix of network and application activity being hosted and delivered by the IT infrastructure has always is a 'must-have' for many aspects of IT planning and operations. But the greatest value and impact is achieved when those two viewpoints are blended together into one unified view. This paper reviews the primary challenges that IT teams face in establishing unified visibility, the key requirements that management solutions must meet to address those challenges, and examines a Riverbed solution that has been specifically designed to offer a path to success."
Tags : 
    
Riverbed
Published By: Riverbed     Published Date: Nov 02, 2016
"In the cloud era, businesses need levels of agility that traditional networks can’t provide. The software-defined WAN (SD-WAN) is emerging at branch offices and other remote locations to drive increased efficiencies and to optimize user experiences across cloud applications and services. What you’ll learn from this powerful resource: Why the SD-WAN market is expected to hit $6B by 2020. The products and services that form the SD-WAN landscape. Some essential guidance for SD-WAN planning and implementation."
Tags : 
    
Riverbed
Published By: Viavi Solutions     Published Date: Sep 30, 2016
IT today is more complex than ever. Public cloud, networks, storage systems, servers, and applications all combine to deliver today’s IT services. But how do you manage such a diverse and complex infrastructure? Can legacy tools help after this seismic shift? This document answers these questions and provides 20 tools you need to deliver services in this new hybrid IT world. Today’s IT environment provides greater promise than ever before. New technologies are driving new capabilities and even more opportunities to differentiate. The opportunity for innovation has never been greater: faster compute, more storage, and new applications all working together to drive greater efficiency and greater power. But this wave of innovations has also added greater complexity since one failure in this increasingly complex IT stack means a failure of the entire service. New consumer-focused cloud based applications are setting a high standard—nearly 100% up time with peak performance all while IT.
Tags : 
    
Viavi Solutions
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Even with more advanced features and supposed higher throughput than ever before, firewalls are not able to keep up with modern demands or advanced threats. Users are more distributed than ever, and so is data. Threats are changing rapidly, and traditional defense mechanisms that rely on layered security do not work.
Tags : 
palo alto, enterprise network firewall, custom applications, traffic classification
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : 
palo alto, firewall, applications, ssl, ssh
    
Palo Alto Networks
Published By: Polycom     Published Date: Sep 07, 2016
"Seeing is believing. How we connect and collaborate is changing. It’s no longer about reviewing a PowerPoint deck or a document sent out in advance in the meeting invite over a voice bridge. It’s now about collaborating and working in real time with voice, video and content sharing—as a team. Together, Microsoft and Polycom make it simple. Watch now an interactive session covering the following hot topics: How the new Office 365 Services and Skype for Business Online change the collaboration experience and reduce conferencing/communications costs. How you can turn your conference rooms and huddles spaces into productive, collaborative workspaces. Polycom RealPresence Trio and how it accommodates our 3 collaboration needs: Voice, Content and Video. How easy it is to set up and how easy it is for users to connect. How flexible your workspace transition plan can be. Don’t miss this session featuring Polycom and Skype for Business solutions experts, Peter Huboi and Jovito Salonga, for a d
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, collaboration, productivity
    
Polycom
Published By: Polycom     Published Date: Sep 07, 2016
"What are the benefits of moving your phone services to Office 365? How does the Skype for Business phone experience online differ from a traditional on-prem PBX phone experience? What are the important features to consider when selecting phones for your Office 365 cloud deployment? Join Polycom voice experts Randy Wintle and Peter Huboi as they cover these topics and more in one of our most accessed on-demand webinars."
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: Polycom     Published Date: Sep 07, 2016
View the on-demand webinar, “Create Exceptional Meeting Experiences with Skype for Business and Polycom: A Q&A with Jeff Schertz, Skype for Business MVP” for a conversation about Polycom’s newest solutions and see how they elevate the collaboration possibilities of Skype for Business. And how they can enhance your meeting experiences.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Together, VMware and F5 enable global IT leaders to empower the Anywhere Enterprise to deliver enterprise applications across all devices and clouds built on SDDC principles. Today VMware and F5 offer the most sophisticated, end-to-end solutions for mobility, application delivery and network security to help CTOs and CIOs: - Ensure unprecedented application agility with a software-defined infrastructure and application services platform; - Automate application delivery while ensuring performance, availability, scalability, efficiency and security; - Achieve simplified end-to-end networking through an application-centric approach.
Tags : 
anywhere enterprise, vmware, enterprise it, application agility, software-defined infrastructure, it infrastructure, networking, it management, enterprise applications
    
F5 Networks Inc
Published By: Ciena     Published Date: Aug 09, 2016
Download this white paper to learn more about these benefits of evolving to a higher-performance network: ? Scales capacity cost-effectively ? Extends the life of existing routers ? Simplifies network operations ? Improves service delivery time ? Lowers network space and power cost ? Supports growing variety of applications
Tags : 
    
Ciena
Published By: Okta     Published Date: Jul 27, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.