ad network

Results 1 - 25 of 1436Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Aryaka Networks     Published Date: Sep 06, 2018
Makino, a leader in manufacturing, required a global network to transfer massive amounts of data from their HQ to regional tech departments. Learn why Makino replaced their MPLS circuits with Aryaka.
Tags : 
    
Aryaka Networks
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Coyote Point Systems     Published Date: Aug 25, 2010
Application Delivery Controllers understand applications and optimize server performance - offloading compute-intensive tasks that prevent servers from quickly delivering applications. Learn how ADCs have taken over where load balancers left off.
Tags : 
coyote point, systems, slbs, server load balancers, adc, adcs, ssl, load balancing, load balancer, application delivery, application delivery controller, application delivery network, ssl acceleration, ssl offloading, server offload, server offloading, server acceleration, content switch, content switching.
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing
    
Coyote Point Systems
Published By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : 
strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers, emarketing, roi, networks, social networking, email marketing services/software
    
StrongMail
Published By: PCRecruiter     Published Date: Oct 28, 2010
Only a decade or so ago, those human resources professionals who hadn't yet found their way onto the Internet were finding themselves increasingly left out in the cold.As we slip swiftly into the second decade of the 21st century, it's those who haven't yet begun to participate in 'social media and networking' that are starting to feel the chill.
Tags : 
pcrecruiter, recruiting, social networking, network, facebook, twitter, email program, networking, databases
    
PCRecruiter
Published By: PCRecruiter     Published Date: Oct 28, 2010
Only a decade or so ago, those human resources professionals who hadn't yet found their way onto the Internet were finding themselves increasingly left out in the cold. As we slip swiftly into the second decade of the 21st century, it's those whohaven't yet begun to participate in 'social media and networking' that are starting to feel the chill.
Tags : 
pcrecruiter, recruiting, social networking, network, facebook, twitter, email program, networking, databases
    
PCRecruiter
Published By: Cisco     Published Date: May 24, 2019
Your network is the foundation to build digital capabilities. Deliver wired, wireless and SD-WAN connectivity with full network intelligence that leads to immersive user experience, simplified operations, and fastest breach detection. Cisco’s next-generation Secure Network solutions are designed for business of all sizes.
Tags : 
    
Cisco
Published By: Cisco     Published Date: May 24, 2019
Today’s organizations are becoming more innovative and dynamic by adopting mobility, IoT, analytics and cloud technologies. With this, come growing demands for network scale, agility and threat protection which call for an intent-based network. The Cisco® Digital Network Architecture (Cisco DNA) gives you comprehensive intent-based networking across your campus, branch and WAN with robust wired, wireless, and routing solutions.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 22, 2019
Cisco ACI, the industry-leading software-defined networking solution, facilitates application agility and data center automation. With ACI Anywhere, enable scalable multicloud networks with a consistent policy model, and gain the flexibility to move applications seamlessly to any location or any cloud while maintaining security and high availability.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 26, 2019
Uncover the riskiest 1% of threats you’ve been missing. In hours. Not days or months. Nearly all endpoint security solutions claim to block 99% of malware. But what about the 1% of threats they miss? The most dangerous 1% of threats will wreak havoc on your network. If you rely solely on traditional point-in-time technologies, such as antivirus, those threats can go undetected for 200 days on average. For months on end, they can be creeping in and moving laterally across your network causing damage through stealthy malware campaigns without you even knowing it—until it’s too late.
Tags : 
    
Cisco
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Automation Anywhere APAC     Published Date: May 17, 2019
Much has already been said and written about the infiltration of robotic process automation (RPA) and intelligent automation (IA) technologies into the workforce. In truth, it’s taken the corporate world a while to test, trust and commit to automation at work. To understand how far APAC/ANZ markets have advanced towards acting on these opportunities, the Shared Services and Outsourcing Network (SSON) surveyed the market and found that across the region corporations were forward thinking in building for scale, trusting technology and recognising the need to incorporate robotics into both IT infrastructure and enterprise strategy. This report explains how enterprises across APAC/ANZ are staying ahead of the global wave of RPA, the most popular solutions they are choosing, who the preferred consultants or 'integrators' are, the challenges, and how the digital workforce is being integrated into the human one.
Tags : 
    
Automation Anywhere APAC
Published By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : 
security, enterprise network, firewall, cisco, gartner, magic quadrant
    
Cisco
Published By: Cisco     Published Date: Dec 11, 2018
WAN edge infrastructure is changing rapidly as I&O leaders responsible for networking face dynamic business requirements, including new application architectures and on-premises and cloud-based deployment models. I&O leaders can use this research to identify vendors that best fit their requirements. By year-end 2023, more than 90% of WAN edge infrastructure refresh initiatives will be based on virtualized customer premises equipment (vCPE) platforms or software-defined WAN (SD-WAN) software/appliances versus traditional routers (up from less than 40% today).
Tags : 
    
Cisco
Published By: HERE Technologies     Published Date: Jan 22, 2019
Rising urbanization has brought unprecedented levels of traffic and congestion to our major towns and cities. Departments of transport are battling to ensure their regions aren’t negatively impacted by increased pressure on their road networks. On the frontline are traffic operators and planners. Every day, they face complex challenges as they attempt to improve traffic flow, minimize incidents, and unearth solutions to network issues. This eBook explains how traffic planners and operators can use data to help overcome some of the challenges they face.
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jan 22, 2019
To improve safety and mobility across its 5,600km road network, the City of Toronto forged a partnered with HERE Technologies for the provision of traffic, incident, and historical traffic data. Access to this data allows the city authority to see exactly what’s happening on its roads and more easily and affectively run studies on improvement projects. This case study details how HERE Technologies enabled the City of Toronto’s transportation team to: Work smarter with comprehensive network coverage and accurate data to aid analysis Examine the impact of city projects without significant forward planning or expenditure Ensure travel volume models used to drive decision making are calibrated to represent real-world truths
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : 
malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Cisco designs and sells broad lines of products, provides services, and delivers integrated solutions to develop and connect networks around the world, building the internet. As a global market leader in our industry, we help our customers connect, digitize, and thrive. Together, we change the way the world works, lives, plays and learns.
Tags : 
ransomware, threat landscape, operations, risks, enforcement, defend, firewalls, network
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Dec 13, 2017
Cisco Meraki MS switches are 100% cloud-managed and can be fully configured from any Internet-accessible location before ever being powered on. Simply add the switch serial number (or order number for large deployments) to your network using the Meraki web-based dashboard. Once added, the switch is fully configurable. When the switch is first powered on and connected to the Internet, it will pull its settings from the cloud.
Tags : 
configuration, zero touch, deployment, ports, bandwidth, wire security, trends
    
Cisco EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.