Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

network service

Results 101 - 125 of 595Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: Gigamon     Published Date: Feb 20, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
    
Gigamon
Published By: Intel     Published Date: Aug 26, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: HP - Enterprise     Published Date: Jun 04, 2013
HP Business Services Management (BSM), which includes HP Network Management Center, HP Systems Management, and HP Application Performance Management, is a comprehensive performance management solution designed to enable IT organizations to manage a diversity of in-house and cloud based services at a lower cost to the business. HP commissioned Dimensional Research to interview customers who have deployed HP BSM solutions to obtain detailed feedback on the real world benefits provided by these solutions. Dimensional Research conducted 26 in-depth interviews with HP customers as well as researched documented case studies. This report summarizes those findings.
Tags : 
business service, management solutions, bsm, business services management, network management, systems management
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Published By: ClickExpress     Published Date: May 01, 2013
The cost of ineffective customer service visits isn't just in money: the greater cost is in customer satisfaction. When a mobile workforce employee doesn't arrive on time, is missing equipment, or doesn't resolve the issue on the first visit, it leads to customer dissatisfaction, lost business, and today, public complaints in the media and social networks. Every single service organization understands the crucial value of great customer service. Every single visit to a customer is critical. In this paper, we reveal the 3 steps to a great visit every time.
Tags : 
employees, customer, mobile, workforce, organization, service
    
ClickExpress
Published By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : 
dyn, internet performance management, online performance, ipm, apm, npm, cloud computing
    
Dyn
Published By: Silver Peak     Published Date: Feb 11, 2016
This case study reveals how Interroll, a leading provider of high-quality core products for internal logistics, became frustrated with the high cost and complexity of MPLS and turned to Silver Peak to build an SD-WAN.
Tags : 
wan, networking, broadband, sd-wan, cloud computing, cloud services, software defined wan, silver peak
    
Silver Peak
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Manufacturers, in an effort to succeed with digital transformation, are relying on the Internet and public cloud to deliver key enterprise applications and processes. As manufacturers continue to become more digital enterprises, their network architecture must as well. Read this paper to learn key considerations for architects to create a holistic network that takes today’s, and tomorrow’s, requirements into consideration.
Tags : 
network management, manufacturing, network optimization, network applications, cloud services, enterprise applications, network architecture, network performance
    
Akamai Technologies
Published By: AWS     Published Date: Jun 15, 2016
Netflix, one of the world’s leading Internet television networks, is using AWS to deliver billions of hours of content monthly, and run its analytics platform for optimum performance of its global service.
Tags : 
    
AWS
Published By: Evariant     Published Date: Nov 08, 2018
Health systems gain a competitive edge when they identify the right physicians and target those physicians to develop unsurpassed loyalty. Learn how to cultivate relationships with physicians that lead to an increase in cases being referred, which results in smarter provider engagement, increased margins, optimized network utilization and health system growth. But which doctors? In which service lines? And what kinds of cases? And what touch points? This guide discusses how to reimagine how network development teams work that results in the ability to demonstrate indisputable ROI from network development activity and liaison outreach.
Tags : 
physician relationship management, network utilization, market development
    
Evariant
Published By: Juniper Networks     Published Date: Jan 23, 2018
Bringing your vision to life is no small undertaking. So the last thing you need are network security threats looming over head. That’s why our security products and services build an unprecedented level of security into the DNA of your network. That way, you can focus on your dreams with absolute confidence.
Tags : 
    
Juniper Networks
Published By: Intel     Published Date: May 15, 2017
Mitel* delivers voice over Wi-Fi faster and with less disruption to existing network services. Read on to find out more.
Tags : 
mobile, network, wi-fi, mitel, mobile devices, remote working
    
Intel
Published By: Intel     Published Date: May 15, 2017
This paper proposes a Service Provider Network Maturity Model — a framework by which Service Providers can prioritize activities, measure their progress, and benchmark against best-in-class developments.
Tags : 
service providers, prioritization, sdn, nvf, networking
    
Intel
Published By: Intel     Published Date: May 17, 2017
The network functions virtualization (NFV) revolution – where software-based services running in virtualized environments on Intel® architecture servers replace purpose built appliances – has taken communications service providers by storm.
Tags : 
intel, vmware, nfv infrastructure, nfvi, network functions virtualization, architecture, infrastructure, network architecture
    
Intel
Published By: Intel     Published Date: May 19, 2017
Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) deployments are challenged by a lack of broadly accepted industry benchmarks to drive conformance to carrier-grade requirements.
Tags : 
network services, sdn, nfv, network, infrastructure, network management, network performance
    
Intel
Published By: Intel     Published Date: May 19, 2017
Intel is accelerating Network Functions Virtualization (NFV) with unique capabilities that enable optimal use of data center resources to deliver communications services.
Tags : 
nfv, security, virtualisation, data, network architecture
    
Intel
Published By: Intel     Published Date: May 19, 2017
Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) deployments are challenged by a lack of broadly accepted industry benchmarks to drive conformance to carrier-grade requirements.
Tags : 
nfv, network services, virtualization, sdn, infrastructure, network architecture, network management, network performance
    
Intel
Published By: Intel     Published Date: May 19, 2017
An unprecedented level of network traffic is driving enterprises and communications service providers (CommSPs) to look for equipment that delivers greater operational agility and economics.
Tags : 
infrastructure, data, software, nfv, intel, network architecture
    
Intel
Published By: Intel     Published Date: May 24, 2017
An unprecedented level of network traffic is driving enterprises and communications service providers (CommSPs) to look for equipment that delivers greater operational agility and economics.
Tags : 
    
Intel
Published By: TIBCO Software     Published Date: Aug 13, 2018
The use of SaaS applications within an organization is the new normal. In fact, there's a good chance that just your marketing department alone is using over 10 SaaS products. According to Gartner, the 2015 worldwide market for SaaS software application sales was $33.4 billion, with projections to double to $67.2 billion by 2019. Integration needs are changing, with SaaS applications, as well as mobile traffic, social networks, IoT, suppliers, partners, and customer channels all new integration points that will need to be captured in your business processes. Read “Five Principles for Integrating Software as a Service Applications” to learn: Key principles for successful hybrid integrations New integration use cases to grow your business upward and outward The why and how of integration as both an enabler and a differentiator Benefits of the TIBCO integration platform and its various offerings
Tags : 
    
TIBCO Software
Published By: Fortinet EMEA     Published Date: Dec 11, 2018
If you’re dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you’re probably considering some form of software-defined wide area networking (SD-WAN). With the variety of constraints that you face, selecting the right SD-WAN solution for your enterprise may require a few compromises. Security, however, should not be one of them. There are various models for combining SD-WAN and network security, but only one that can truly be called “secure SD-WAN.” Fortinet, the most trusted name in network security, has leveraged its industry-leading FortiGate Next Generation Firewall (NGFW) to deliver integrated best-of-breed SD-WAN capabilities. Powered by the new FortiOS 6.0 operating system, SD-WANenabled FortiGate solutions provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.
Tags : 
    
Fortinet EMEA
Published By: Gigamon     Published Date: Mar 26, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
    
Gigamon
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.