it networks

Results 76 - 100 of 849Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Sep 21, 2017
At the network edge, where your apps meet the road and where new IoT devices will drive fundamental business change, consistent connectivity and strong networks keep users for good, improve device performance and drive the insights needed to stay competitive. Today’s security leaders are tasked with protecting an attack surface that has never been more diverse or more complex Download this eBook to find the elements of complexity we have to deal with today.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Cisco
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Published By: Oracle     Published Date: Aug 08, 2013
The era of social networking clearly has arrived, creating significant implications for enterprises. Today, there are compelling rewards for embracing social networks—and potentially severe penalties for putting it off any longer. This white paper outlines four key ground rules for engaging with social networks in order to maximize their potential for improving customer service.
Tags : 
social, customer experience, oralce, social networking, customer service
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
The era of social networking clearly has arrived, creating significant implications for enterprises. Today, there are compelling rewards for embracing social networks—and potentially severe penalties for putting it off any longer. This white paper outlines four key ground rules for engaging with social networks in order to maximize their potential for improving customer service.
Tags : 
social, customer experience, oralce, social networking, customer service
    
Oracle
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: Juniper Networks     Published Date: Oct 25, 2017
THE FUTURE IS WHAT YOU MAKE IT. Juniper Networks creates innovative technologies to help customers connect their ideas, compete, and thrive in an ever-changing world. Partner with Juniper Networks and start creating the road map to your future-ready network. VISIT JUNIPER.NET/UNITE TO START LOOKING TOWARD THE FUTURE, TODAY.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 25, 2017
eBay Classifieds supports multiple internal clients and all of their requirements in more than 1,000 cities around the world. The company adopts cloud and virtualization services to get to market faster with new features, services, and campaigns using Juniper Networks Contrail Networking, Contrail Cloud Platform and QFX5100 Switch.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Absolute Software     Published Date: May 31, 2016
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the internet—and probably the corporate network. Back in the 1990s, most computer hackers were interested in gaining access to networks purely for kudos among their peers. Today hackers have monetized their skills and make their living from finding vulnerabilities in IT networks.
Tags : 
data, big data, security, corporate network, mobility
    
Absolute Software
Published By: IBM     Published Date: Nov 08, 2011
This paper looks at cloud architecture in which the servers and networks in the data center can rapidly respond to changing demands.
Tags : 
ibm, system networking, network architecture, cloud, datacentre, datacenter, ibm system networking, network architecture, cloud datacentre, datacenter
    
IBM
Published By: IBM     Published Date: Nov 08, 2011
IBM System Networking RackSwitch provides ultralow-latency switching inside a collocated network. Read more now.
Tags : 
rackswitch, collocated networks, ibm sytem, networking, ultra low latency configurations, data networking, enterprise hardware, software management
    
IBM
Published By: Cleversafe     Published Date: Mar 29, 2013
Scalability has always been an important characteristic of enterprise storage systems, maybe the most important, since the rationale of consolidating storage assumes that the system can easily grow with aggregate demand.
Tags : 
object storage, cloud storage, access nodes, scalability, metadata, storage controller, backup and recovery, network attached storage, raid, storage area networks, storage management, storage virtualization, application integration, application performance management, best practices, data deduplication
    
Cleversafe
Published By: Limelight     Published Date: Feb 16, 2018
When it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questions. In this paper we’ll explore the 5 things you should know about multi-CDN in order to determine if it might make sense for your business.
Tags : 
content delivery network, cdn, multi-cdn, multiple cdns, website performance, website acceleration, digital content delivery, mobile delivery, global content delivery, live streaming, digital streaming, video on demand, vod, video delivery, over the top content delivery
    
Limelight
Published By: Juniper Networks     Published Date: Oct 20, 2015
The SRX Series features a carrier-grade next-generation firewall with layered security services such as application security, unified threat management (UTM), integrated IPS, and advanced integrated threat intelligence to guard against cyber threats and malware.
Tags : 
juniper, network, srx, gateway, reliability analysis, firewall, threat management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 20, 2015
This paper explores automation and orchestration tools as well as the architectural simplifications that enable these tools to work well, paving the way for software-defined networks (SDNs) and greater operational efficiencies across the enterprise.
Tags : 
juniper, automation, efficiency, sdn, software, network
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 20, 2015
With nearly every organization implementing some degree of cloud computing, virtualization security is as integral a component as traditional firewalls are in today’s networks.
Tags : 
juniper, network, virtualization, data center, virtual security, firewall
    
Juniper Networks
Published By: Butler Technologies     Published Date: Jul 03, 2018
MPO connectors increase your data capacity with a highly efficient use of space. But users have faced challenges such as extra complexities and time required for testing and troubleshooting multi-fiber networks. VIAVI helps overcome these challenges with the industry's most complete portfolio of test solutions for MPO connectivity.
Tags : 
    
Butler Technologies
Published By: Pure Storage     Published Date: Apr 10, 2019
Deep learning opens up new worlds of possibility in artificial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly, and legacy storage systems are not keeping up. Advanced AI applications require a modern all-flash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
    
Pure Storage
Published By: Limelight Networks     Published Date: Jul 01, 2011
Create your own tablet-worthy site, and make your marketing work harder. This report shows you how to: . Take advantage of the tablet as a high-end media experience . Create experiences that support unique tablet behavior . Increase engagement by leveraging user-generated content
Tags : 
mobile marketing, tablet-worthy site, mobile website, ipad site, limelight networks, content delivery, content delivery network, cdn, cdn network, limelight website, limelight networks inc, content delivery networks, content delivery network services, cdn services
    
Limelight Networks
Published By: Arbor     Published Date: Mar 13, 2014
In this white paper, we’ll examine how the Pravail® portfolio from Arbor Networks can empower your network operations and security teams to more efficiently help protect the integrity and availability of your enterprise network against advanced attacks.
Tags : 
arbor, arbor networks, enterprise network, global attack, connecting workforces, internal operations, growing revenue, retaining customers, increase competitive edge, cyber attackers, pravail portfolio, pravail solutions, attack intelligence, enterprise defense
    
Arbor
Published By: Juniper Networks     Published Date: Sep 10, 2014
To find out how new applications and virtualized environments are driving the need for increased bandwidth and network scale, download our Report on the 10GbE data center. Read how scalability is fuelling the need for 10GbE networks.
Tags : 
data center, virtualization, increased bandwidth, scalable networks
    
Juniper Networks
Published By: Juniper Networks     Published Date: Nov 06, 2014
Hear the views of 250 network professionals in this Webinar with GigaOM Research and Juniper Networks. Like-minded professionals speak on effective cloud adoption, the potential of software-defined networking and network automation.
Tags : 
gigaom, cloud adoption, network professionals, software-defined networking, network automation, cloud
    
Juniper Networks
Published By: Juniper Networks     Published Date: Nov 06, 2014
Simplified and automated networks deliver business agility. In this Webinar, experts from IDC, Shutterstock and Juniper discuss how to transition to network virtualization and look at benefits of SDN and automating their networks.
Tags : 
automated networks, network virtualization, benefits of sdv, business agility, simplified networks
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
As application workloads are redefined, data centers must change. This IDC Whitepaper looks at how network automation and orchestration can aid this transition, building simpler and more agile networks.
Tags : 
network automation, cloud datacenter, data traffic, network architecture, seamless integration, cloud orchestration
    
Juniper Networks
Published By: Clustrix     Published Date: Sep 04, 2013
Online advertising is a highly competitive and innovative market being driven to new levels by the rise of ad exchanges, real-time bidding alongside traditional ad networks. With advertisers increasingly buying one impression at a time, advertising market growth is soaring. If your database is the bottleneck limiting the growth of your advertising business, this is the white paper for you. Find out how Clustrix will give you access to functionality, such as ad segmentation and targeting based on up-to-the minute campaign performance, as well as instant access to smart data, so your clients can make the right buy decisions. This free whitepaper considers the technical challenges this rise presents for the database, and discusses the unique technology that enables Clustrix to solve these challenges and give your advertising business a competitive advantage.
Tags : 
technology, clustrix, online advertising, real time bidding, database, analytics
    
Clustrix
Published By: Vectra Networks     Published Date: Nov 05, 2015
Intrusion Detection Systems have ceased to live up to their name and have lost their ability to spot today’s sophisticated intrusions. Consequently, cyber attackers are taking advantage of it by launching more evasive and strategic threats that spread rapidly within networks. And security teams are left without the proper tools or insight to identify intrusions that pose the biggest risk.
Tags : 
intrusion detection systems, cyber attackers, sophisticated intrusions, intrusion detection
    
Vectra Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library