application traffic

Results 26 - 50 of 85Sort Results By: Published Date | Title | Company Name
Published By: TIBCO Software     Published Date: May 31, 2018
The use of SaaS applications within an organization is the new normal. There is a good chance that just your marketing department is using more than 10 SaaS products, which is reflected in the amount you are spending on SaaS. According to Gartner, the 2015 worldwide market for SaaS software application sales was $33.4 billion, with projections to double that to $67.2 billion by 2019.1 Clearly, your integration needs are changing. SaaS applications, as well as mobile traffic, social networks, IoT, suppliers, partners, and customer channels are new integration points that will need to be captured in your business processes. This paper presents five principles for successful hybrid integrations.
Tags : 
    
TIBCO Software
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
As a secure internet gateway, Cisco Umbrella helps you tackle the challenges of mobility, SaaS, and branch transformation by offering a single platform that secures access to and use of the cloud, SaaS applications, branch offices, and endpoints. It's your first line of defense against threats -- anytime and anywhere your users access the internet, traffic goes through Umbrella first. To understand how a secure internet gateway provides 360-degree security for access to and use of the cloud, read the ebook.
Tags : 
    
Cisco Umbrella EMEA
Published By: Schneider Electric     Published Date: Jan 26, 2018
The 4th and final event in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." Customers have lots of decisions to make as they feel their way through the changing IT landscape. Which infrastructure and applications should stay on their own premises (if any) and what can they safely move to the cloud? Fill out your information and click "Register" to watch the fourth and final event in our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Should I Stay or Should I Go?” This webinar originally aired on December 7th, 2017. This final webinar in our webinar series is focused on ways partners can help customers answer the types of questions above and, in the process, become trusted advisors. We’ll go over how to use tools including the EcoStruxure IT suite to analyze customer traffic and help them decide the best home for each application, whether on-premises or in the cloud. (Hopefully we’ll figure out a way to work in the classic Clash tune as well!)
Tags : 
    
Schneider Electric
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling these applications in order to discover and mitigate new hidden security threats.
Tags : 
fortinet, web application security, web application control, application threats, web 2.0, network security
    
Fortinet, Inc.
Published By: Citrix Systems     Published Date: Jul 28, 2015
Learn about the most prevalent application delivery challenges and the advantages of real-time network visibility by viewing the infographic, "Gain 20/20 Vision Into Network and Application Traffic"
Tags : 
    
Citrix Systems
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Even with more advanced features and supposed higher throughput than ever before, firewalls are not able to keep up with modern demands or advanced threats. Users are more distributed than ever, and so is data. Threats are changing rapidly, and traditional defense mechanisms that rely on layered security do not work.
Tags : 
palo alto, enterprise network firewall, custom applications, traffic classification
    
Palo Alto Networks
Published By: Avi Networks     Published Date: Mar 06, 2018
Can your current ADC solution elastically scale load balancers and application servers? Does it provide real-time insights and visibility into traffic? There is a lot to consider when it comes to the future of your load balancing strategy. Download our free e-book today!
Tags : 
    
Avi Networks
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
The Application Usage and Risk Report from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide.
Tags : 
palo alto networks, risk report, application usage
    
Palo Alto Networks
Published By: F5 Networks Inc     Published Date: Feb 19, 2013
The application delivery controller has evolved into a key component of the data center architecture, and enterprises should evaluate ADCs based on how they integrate with this architecture and support more-advanced features, such as user and traffic control and monitoring.
Tags : 
application, delivery, controllers, evolved, data center, adcs, advancements
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
The application delivery controller has evolved into a key component of the data center architecture, and enterprises should evaluate ADCs based on how they integrate with this architecture and support more-advanced features, such as user and traffic control and monitoring.
Tags : 
gartner, f5 networks, application delivery, data center architecture, enterprises, adcs, infrastructure, application management, deployment, traffic control, monitoring, data center, data center architecture, architecture
    
F5 Networks Inc
Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint
Published By: Brocade     Published Date: Nov 25, 2015
Your business demands more than the basic load balancing solution offered by Amazon Web Services. Boost application performance by adding a sophisticated Brocade vADC to seamlessly integrate with any application deployed on AWS—improve user experience, scalability, and control.
Tags : 
amazon, brocade, aws, fucntionality, amazon elb, web services
    
Brocade
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Cloud computing and the "bring your own device" (BYOD) trend will impact the design of future datacenters and their supporting networks. To attain the kind of business agility that companies now demand, network infrastructure needs to provide the flexibility required by cloud application workloads and the changing traffic patterns fostered by BYOD. To make networks more agile, new approaches to network implementation need to be enabled. As these trends continue, application delivery controllers (ADCs) will be critical elements in the new network infrastructure. This Technology Spotlight examines these trends and the role that F5 Networks' integrated scalable platform plays in this strategic market.
Tags : 
f5 networks, idc, cloud, cloud computing, bring your own device, byod, datacenter, network, network infrastructure, infrastructure, application workload, application delivery, application delivery controllers, adc, platform
    
F5 Networks Inc
Published By: Riverbed     Published Date: Feb 26, 2015
Riverbed® SteelHeadTM SaaS addresses cloud services/software as a service (SaaS) performance challenges by providing an easy-to-deploy optimization solution that meets customer needs for application performance over WAN and Internet connections. Combining private wide area network (WAN) and public internet optimization, the SteelHead SaaS is a first-of-its-kind solution, which optimizes traffic across the public Internet with Riverbed’s award-winning SteelHead optimization system (formerly RiOS or Riverbed Optimization System) technology to accelerate data and application protocols. SteelHead SaaS delivers optimized performance up to 30x for cloud services/SaaS applications, such as Microsoft Office 365 or Salesforce.com, regardless of where the end user is located.
Tags : 
saas, cloud services, internet connections, application performance, wide area network, optimization
    
Riverbed
Published By: Riverbed     Published Date: Apr 24, 2015
Read this white paper to learn how to: • Architect an integrated WAN to support evolving application deployment models using the Internet in concert with MPLS. • Create a WAN solution that can optimize traffic flows between the Internet and the MPLS for all applications and between both internal and external users. • Deploy a solution across all independent network services that can monitor, report, control and optimize end-to-end path forwarding for all endpoints.
Tags : 
enterprise wan, integrated wan, public cloud services, connectivity, application performance
    
Riverbed
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
Organizations considering moving enterprise applications to the public cloud should ensure that they also move the application delivery services their applications rely on in the data center. In addition, cloud migration presents an opportunity to organize and rationalize security and access, gain visibility into cloud-based application traffic, and architect a strong disaster recovery plan. Download to read the 5 rules to follow when lifting and shifting apps to the the cloud.
Tags : 
apps, cloud, enterprise applications, public cloud
    
F5 Networks Inc
Published By: Infoblox     Published Date: Feb 03, 2009
Today’s networks support more applications, traffic, users, and devices than ever before – a trend that only increases on a daily basis. At the heart of all IP networks live core network services, like DNS, DHCP, and  RADIUS that are crucial for keeping traffic flowing, users connected, and applications available.
Tags : 
infoblox, core network services, dhcp, ip networks, radius, ip address assignment, ipam, ip telephony
    
Infoblox
Published By: Citrix Systems     Published Date: Nov 23, 2015
Learn about the most prevalent application delivery challenges and the advantages of real-time network visibility by viewing the infographic, "Gain 20/20 Vision Into Network and Application Traffic"
Tags : 
citrix, network, application traffic, application delivery, network visibility, data
    
Citrix Systems
Published By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : 
sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
    
Viavi Solutions
Published By: Aruba Networks     Published Date: Nov 15, 2013
The content for this excerpt was taken directly from the IDC MarketScape: Worldwide Enterprise WLAN 2013-2014 Vendor Analysis by Rohit Mehra (Doc # 231686). All or parts of the following sections are included in this excerpt: IDC Opinion, In This Study, Situation Overview, Future Outlook, Essential Guidance, and Synopsis.
Tags : 
idc, marketscape, enterprise wlan, vendor analysis, brod, wireless lan, increase mobility, mission-critical mobility applications, cloud services, alternative architects, traffic flow, enterprise communications, unified communications, service providers, wlan infrastructure, wlan market
    
Aruba Networks
Published By: Cisco     Published Date: May 14, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
    
Cisco
Start   Previous    1 2 3 4    Next    End
Search Resource Library