Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

network manager

Results 51 - 75 of 80Sort Results By: Published Date | Title | Company Name
Published By: OKTA     Published Date: Oct 23, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
    
OKTA
Published By: Qualys     Published Date: Jan 08, 2015
Imagine putting first responders on your operational team instantly on alert about new network vulnerabilities – and how to fix them? This capability is called “continuous monitoring” (CM) and a new guide from Qualys shows you how it can dramatically boost security of your network. Learn how CM provides you with an always-on view of potential security holes. The guide explains how using CM is a vital step toward achieving continuous security of your network – the Holy Grail for every network security manager! In the guide, you will learn how to automatically leverage vulnerability scans with CM for stronger security. Continuous Monitoring: A New Approach to Proactively Protecting Your Global Perimeter offers an easy blueprint for using automation to achieve continuous security and compliance. Download the guide now to learn more about CM: Requirements—why CM is vital Scanning—value of continuous vulnerability scans Best Practices—for using CM Benefits—examples of how CM improves se
Tags : 
continuous monitoring, network security, vulnerability, best practices, security
    
Qualys
Published By: Cisco     Published Date: Jul 11, 2016
It is the purpose of this white paper is to provide guidance to network planners, engineers, and managers who are deploying Cisco Nexus 9000 Series Switches in a data center as replacements for Cisco Catalyst® 6500 Series Switches.
Tags : 
    
Cisco
Published By: Akamai     Published Date: Apr 10, 2015
Enterprise network architectures are evolving as a result of the growth of public cloud, proliferation of mobile devices, and organizational requirement to collaborate with global users. In this on-demand webinar, Gartner Research VP and Distinguished Analyst Mark Fabbi and Akamai Technologies' Enterprise Web Experience Product Manager, Greg Lord, will provide insight into this new trend.
Tags : 
akamai, web performance, cloud services, network management, cloud networking, digital enterprise
    
Akamai
Published By: IBM     Published Date: May 09, 2013
Federal agencies must take a proactive approach to information and network security due to increasing cybersecurity threats. IBM Tivoli Endpoint Manager, built on BigFix technology, is the leading enterprise cybersecurity solution to help combat cyber threats and eliminate vulnerabilities.
Tags : 
network, security, cybersecurity, endpoint manager, solution, eliminate vulnerabilities, technology
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Increasingly demanding IT requirements are necessitating change to the data center network (DCN). Like servers and storage, the network needs to evolve to deliver the flexibility and scalability required by a more virtualized IT environment. In this interview, Michele Girola, IBM network integration services product manager, explains how to enhance your DCN to support evolving technologies today and in the future. Listen to the full 12-minute interview or read the two-page abbreviated version to learn how IBM is working with clients to build a better data center network.
Tags : 
data center network, new technologies, data center, supporting technology, dcn, flexibility and scalability, product manager, network integration
    
IBM
Published By: Cisco     Published Date: Sep 15, 2015
This Technology Spotlight examines key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing these ongoing challenges for enterprise IT and network managers.
Tags : 
iot, datacenter, aci, enterprise, networking, convergence, network architecture, network management
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
    
Cisco
Published By: Raritan     Published Date: Jan 05, 2015
As an IT administrator, Lab, or Network Manager, you need to access and control multiple computer systems, perhaps widely dispersed, for routine maintenance as well as for real-time troubleshooting and repair. The tools must enable you to work quickly and securely to access any system regardless of type, brand, or location.
Tags : 
raritan, remote management, network management, data center, remote access, remote network management, server hardware, servers
    
Raritan
Published By: Cisco     Published Date: Nov 17, 2015
This document is intended to help network planners, engineers, and managers who are deploying Cisco Nexus 9000 Series Switches in a data center as replacements for Cisco Catalyst® 6500 Series Switches.
Tags : 
cisco, data center, switches, optimization, scalability, storage, applications, enterprise support
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
cisco, zk research, infrastructure, hybrid wan, networking
    
Cisco
Published By: Focus VoIP     Published Date: Jan 19, 2011
NEWLY UPDATED: Save time researching business phones with our free Midrange IP Phone Comparison Guide.
Tags : 
altigen communications, nortel networks, ip phone, cisco systems, shoretel, polycom, avaya, phone system
    
Focus VoIP
Published By: Astaro     Published Date: Aug 10, 2009
Frontier Nursing Services (FNS, Inc.) of Hyden, Kentucky provides health care to the underserved population in rural areas of southeast Kentucky and is committed to advancing nursing through education.
Tags : 
frontier nursing, astaro, cisco, barracuda, pix, fns, network, it department
    
Astaro
Published By: Cisco     Published Date: Jan 05, 2015
In Forrester’s 24-criteria evaluation of videoconferencing infrastructure and cloud services vendors, we identified the 10 most significant OEMs — Acano, AGT, Avaya, Blue Jeans Network, Cisco Systems, Lifesize, Pexip, Polycom, Videxio, and Vidyo — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help technology managers select the right videoconferencing infrastructure or service for their environment.
Tags : 
it management
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The four pillars of computing — cloud, mobility, social, and analytics — are driving new levels of network innovation in datacenter networks. These forces are now buffeting the datacenter along with virtualization and the Internet of Things (IoT), resulting in sweeping changes in traffic patterns that expose the limitations of traditional networks and their operational models. To become a resource rather than a bottleneck to overall datacenter performance, the network must deliver not just exceptional performance and scalability but also unprecedented automation and orchestration that can yield agility, flexibility, and service velocity. This Technology Spotlight examines these key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing these ongoing challenges for enterprise IT and network managers.
Tags : 
cloud computing, infrastructure, marketplace, application, hybrid, enterprise, it management, enterprise applications
    
Cisco
Published By: HP     Published Date: May 05, 2014
Leveraging HP breadth to increase security, lower risk, increase efficiency: Find out how CapitalOne has improved compliance, lowered risk, eliminated bottlenecks, reduced cost, and moved from silos to integration by leveraging the HP Software portfolio. Headquartered in McLean, Virginia, Capital One offers a broad array of financial products and services to consumers, small businesses and commercial clients in the U.S., Canada and the UK.
Tags : 
bsm, business service management, it operations group, it case study, capital one, automation, it management
    
HP
Published By: Polycom     Published Date: Dec 18, 2014
In Forrester’s 24-criteria evaluation of videoconferencing infrastructure and cloud services vendors, we identified the 10 most significant OEMs — Acano, AGT, Avaya, Blue Jeans Network, Cisco Systems, Lifesize, Pexip, Polycom, Videxio, and Vidyo — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help technology managers select the right videoconferencing infrastructure or service for their environment.
Tags : 
forrester, vmr, cloud-computing, scalability, interoperability, networking, it management, enterprise applications
    
Polycom
Published By: AirDefense     Published Date: Apr 24, 2007
This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.
Tags : 
sox, sarbox, sarbanes oxley, sarbanes-oxley, compliance, hipaa, wlan, wlans
    
AirDefense
Published By: HP     Published Date: Jul 08, 2009
This white paper looks at what it takes to deliver a broad set of network storage solutions that address the ongoing needs of IT managers while accommodating their current business requirements. Learn more today!
Tags : 
smbs, small and medium-sized businesses, idc, das, directattached, storage, storage, availability
    
HP
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Mobile and remote workers of all types need high-quality connections to the Internet and to their corporate networks. They need connections from branch offices, homes, airports, hotels and other locations around the world. This truly becomes a security challenge as network managers scramble to meet these needs.
Tags : 
mobile workforce, remote access, network security, wireless security, off-site, remote workers, internet security, internet security systems
    
Internet Security Systems
Published By: Neterion     Published Date: Dec 05, 2006
The relentless growth of data and network-intensive applications such as digital imaging, multimedia content, and broadcast/video continues to drive volumes of enterprise data and network traffic. As growth continues, IT managers are challenged with implementing solutions without interrupting critical business processes.
Tags : 
network infrastructure, traffic management, bandwidth management, bandwidth, network management, neterion, networking, ethernet networking
    
Neterion
Published By: CCSS     Published Date: May 01, 2008
IT Managers are not in the business of luck. They need to prepare for every disaster scenario, every contingency and ensure that even when every object, job and process is running 100% perfectly on the system, some other unforeseen network element doesn't swoop in and ruin all their efforts, just because it resides outside the parameters of the System i. After all, in a situation like this, people remember the one thing that went wrong – not the millions of things that went right – it's unfortunate, but that's life.
Tags : 
network, network management, network monitoring, ccss, networking, monitoring, network performance
    
CCSS
Published By: AT&T     Published Date: Jun 25, 2008
Class of Service (CoS) functionality can help optimize network performance. For a successful deployment, network designers should identify all applications, understand requirements associated with each application, designate appropriate mapping for groups of applications and provide mechanisms in the underlying network to deliver CoS. CoS mapping and deployment are important; adhering to tested strategies and avoiding common misconceptions helps IT managers advance optimization across the wide area network.
Tags : 
class of service, service management, traffic management, bandwidth, at&t, att, network performance management, network management
    
AT&T
Published By: HP - Enterprise     Published Date: Jun 05, 2013
The term “network management” encompasses a broad range of solutions from single point products to element managers to large enterprise-class solutions. For the purpose of this ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) report, the term Enterprise Network Management Systems (ENMS) includes network-centric management solutions that are used by large organizations’ operations and engineering teams to discover, monitor, assess, troubleshoot, and generally maintain highly distributed enterprise networks. For this EMA™ Radar, the focus was put specifically on core capabilities and features primarily associated with network operations’ need to ensure health and availability of the network. Supporting functional capabilities such as performance monitoring, configuration management, asset management, as well as integrated management of connected non-network devices were also considered, but as non-critical (albeit helpful/valuable) extensions.
Tags : 
ema radar, network management, systems, network, management, infrastructure, network architecture, network performance
    
HP - Enterprise
Published By: Athena Security     Published Date: Nov 20, 2009
Making routine changes to the infrastructure should not be an additional source of stress, but with the additional roles of monitoring and troubleshooting often times it is. The reasons for this added stress are described in this paper along with an effective solution for addressing these problems using SolarWinds Orion Network Configuration Manager (NCM) and Athena FirePAC for firewall analysis.
Tags : 
solarwinds, solarwinds orion, solarwinds ncm, firewall management, firewall rules, cisco firewall, netscreen firewall, check point firewall
    
Athena Security
Start   Previous    1 2 3 4    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.