Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mac network

Results 1 - 25 of 69Sort Results By: Published Date | Title | Company Name
Published By: A10 Networks     Published Date: Aug 21, 2009
Troubleshooting network and security problems in a time of crisis is never easy and the need to resolve mysterious machine addresses such as MAC and IP Addresses back to individuals or hosts is often difficult and time consuming. Download this solution sheet and see how A10 Networks' IDentity Proxy Service can automate the task of resolving host addresses back to individuals to speed network and security troubleshooting and forensics.
Tags : 
ip address, identity, network security, identity management, mac address, network management, troubleshoot, a10, a10 networks
    
A10 Networks
Published By: Absolute Software     Published Date: Feb 23, 2010
A majority of environments today are cross-platform, combining both PCs and Macs. The result has become a common IT challenge: How can you maintain Macs in a network environment with a PC-centric infrastructure and with Windows-based network services?
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Social Media Risks and Benefits for the Pharmaceuticals Industry Drug makers are just beginning to realize how social networks can improve business processes. Social media helps your organization share information and exchange ideas with your customers quickly, but doing so can involve considerable risk. That’s because social media is subject to the scrutiny of regulators, legislators, and litigators. So, what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Not having technology in place to help manage these requirements and increasing risks, or doing so without careful planning, can be a costly mistake. Read this paper to gain an understanding of: What the regulatory landscape of the pharmaceuticals industry looks like What concerns you should be aware of f
Tags : 
social media, increased risks, business processes, regulatory requirements, it management
    
Actiance, Inc.
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : 
security, perimeter security, zero trust, cloud, enterprise security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8
Tags : 
    
Akamai Technologies
Published By: AlienVault     Published Date: Jul 22, 2016
Join us for this technical demo showing how USM can help you detect: Malware infections on end-user machines Insiders misusing network resources Users engaging in suspicious behaviors
Tags : 
    
AlienVault
Published By: AppSense     Published Date: Nov 26, 2012
Download this case study to learn how Chandler Macleod's CIO was able to utilize the AppSense solution to remove the possibility of any users introducing an executable file to their network while reducing the number of their servers by 25%.
Tags : 
appsense, license compliance, security, application licensing, application security, reduce servers, application management, server hardware, servers
    
AppSense
Published By: Astaro     Published Date: Jan 19, 2011
Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.
Tags : 
astaro, cloud computing, botnets, network, security, network management
    
Astaro
Published By: Avi Networks     Published Date: Mar 12, 2019
TCPdump may be old, but does that matter? Application proliferation as apps move from bare metal to virtual machine to containers Network teams are asked to do more with the same number of people Network analysis in public clouds and containers requires different tools
Tags : 
    
Avi Networks
Published By: AWS     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
    
AWS
Published By: Castelle     Published Date: Nov 01, 2006
Network fax servers take care of fax jobs more quickly, accurately and inexpensively than any standalone fax machine. Sending a fax with a network fax server takes less than one tenth of the time sending a fax manually. In fact, the higher the fax volume, the more money, time and resources computer-based, network faxing can save.
Tags : 
ip faxing, ip networks, communications, communications convergence, fax server, fax servers, network faxing, roi, return on investment, castelle, enterprise applications, infrastructure, ip telephony, network management, servers
    
Castelle
Published By: Centrify     Published Date: Sep 08, 2015
Adding Macs to a Microsoft-based corporate network can be a challenge. This paper will explore how Centrify can quickly and easily provide the necessary tools to allow Macs to be managed in the same way PCs are managed today.
Tags : 
device management, security management, mobility, application security, management solutions
    
Centrify
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix, linux, mac, nis
    
Centrify Corporation
Published By: Cisco     Published Date: Jan 05, 2015
Virtualization has transformed the data center over the past decade. IT departments use virtualization to consolidate multiple server workloads onto a smaller number of more powerful servers. They use virtualization to scale existing applications by adding more virtual machines to support them, and they deploy new applications without having to purchase additional servers to do so. They achieve greater resource utilization by balancing workloads across a large pool of servers in real time—and they respond more quickly to changes in workload or server availability by moving virtual machines between physical servers. Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
For nearly 10 years, viruses endured as the primary method of attack, and over time they were largely matched by defenders’ ability to block and protect against them. Motivated by the notoriety and the knowledge gained by the discovery and publicizing of new vulnerabilities, attackers continued to innovate. What ensued were distinct threat cycles, an “arms race,” so to speak. Approximately every five years attackers would launch new types of threats— from macroviruses to worms to spyware and rootkits—and defenders would quickly innovate to protect networks from them.
Tags : 
attacks, viruses, protection, networks, threats, arms race, vulnerabilities, macroviruses, worms, spyware, rootkits, defenders, security
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Service providers around the world share concerns about running out of bandwidth. Business challenges surrounding continued bandwidth growth, linked to video, mobility, and cloud applications, are significant. Service providers also report declining revenue from a cost-per-bit perspective, so not only does the network need to grow, it also needs to grow more cost effectively. The Cisco Virtual Networking Index™ (Cisco VNI™) predicts that over 50 billion devices will be connected over these networks by 2020. The network effects of the Internet of Things, LTE mobility, and mobile video are just beginning to be understood. In a world where mobile device network additions are growing four times faster than the population, and machine-to-machine (M2M) device network additions are growing five times faster than mobile device additions, this problem is clearly becoming highly important and requires a good solution.
Tags : 
cloud, growth, traffic, projection, account, network, it management, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Jan 08, 2016
Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment effectiveness (OEE), reduced downtime, and manufacturing flexibility can be achieved with a factory that is digitized and connected. By providing visibility to machines and processes, manufacturers can anticipate issues that create unplanned downtime. By putting in place a secure, converged and wireless-ready network, manufacturers can have a platform that enables the agility to quickly start up new machines, cells, and lines, and rapidly deliver new products.
Tags : 
cisco, factory accelerator, manufacturing, oee, overall equipment effectiveness, it management
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment effectiveness (OEE), reduced downtime, and manufacturing flexibility can be achieved with a factory that is digitized and connected. By providing visibility to machines and processes, manufacturers can anticipate issues that create unplanned downtime. By putting in place a secure, converged and wireless-ready network, manufacturers can have a platform that enables the agility to quickly start up new machines, cells, and lines, and rapidly deliver new products.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 22, 2016
Your network doesn’t just transport data. It serves a myriad of apps and endpoints—mobile devices, sensors, servers, machines, cameras, wearables—and all the employees, customers, and processes that use them. Which means it can produce invaluable contextual intelligence based on real-time analytics to help you navigate the growing demands of business, security, operations, and IT. Cisco DNA delivers crystal-clear visibility across your network so you can enhance mobile experiences and make business decisions quickly and accurately.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 12, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers
    
Cisco
Published By: Cisco     Published Date: Jun 16, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers
    
Cisco
Published By: Cisco     Published Date: Jun 16, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth.
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers
    
Cisco
Published By: Cisco     Published Date: Oct 08, 2018
Detect attacks that get past perimeter defenses across the digital business. Detect malicious patterns in encrypted traffic. No decryption is needed with our Encrypted Traffic Analytics technology and multilayer machine learning. Extend your network visibility.
Tags : 
encrypted traffic, digital business, security, network, network visibility, next generation firewall, digital transformation, advanced malware protection
    
Cisco
Published By: Citrix     Published Date: Jun 10, 2009
This paper explores common challenges associated with server virtualization deployments and the ways Citrix Essentials for Hyper-V together with Windows Server 2008 Hyper-V and Microsoft System Center Virtual Machine Manager can help organizations maximize the value of server virtualization.
Tags : 
citrix, virtualization, tco, virtual machine, total cost of ownership, hyper-v, microsoft, datacenter, server virtualization, servers, xenserver, network interface cards, nics, network architecture, server hardware, data center design and management
    
Citrix
Published By: Citrix     Published Date: May 27, 2009
Whether you're considering your first virtual desktop solution or trying to salvage an existing implementation, Citrix XenDesktop is the clear choice on the market that offers the performance, scalability and manageability required to meet your business needs.
Tags : 
citrix, virtualization, hdx, xendesktop, sla, service level agreement, scalable, streamline, tco, view composer, virtual machine, total cost of ownership, hyper-v, microsoft, datacenter, server virtualization, servers, xenserver, network interface cards, nics
    
Citrix
Start   Previous   1 2 3    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.