network infrastructure

Results 101 - 125 of 541Sort Results By: Published Date | Title | Company Name
Published By: Gigamon     Published Date: Dec 13, 2018
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Read “How to Strengthen Security While Optimizing Network Performance” to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability. NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by reading this new research now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Download “How to Strengthen Security While Optimizing Network Performance” to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability. NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by downloading this new research now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Explosive data growth and network complexity hindering your ability to deliver results? We get it: the more complex the application infrastructure, the harder it is to ensure apps are functioning optimally. Read our new eBook, “Driving Digital Transformation with Application Intelligence,” to learn how to provide insight into applications across complex infrastructure. Discover previously hard-to-get information about bottlenecks, suspicious data, and user experience.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Download “How to Strengthen Security While Optimizing Network Performance” to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability.  NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by downloading this new research now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
Need powerful visibility and insights into network traffic while reducing risk, complexity and costs? Download the new Definitive Guide™ to Next-Generation Network Packet Brokers to learn why you should shift your infrastructure strategy to include NGNPBs, which offer new, expanded feature sets that simplify your architecture, realize the true ROI of your security tools and give you visibility into critical security threats. Learn how to see, control and secure what matters -- download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
Download ESG’s Economic Validation Report, “Analyzing the Economic Benefits of Gigamon,” to see how Gigamon reduces false positives by 70%, decreases the cost of security personnel by 50%, eliminates redundant systems and tools and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can secure business, enable new ideas and facilitate growth. And, see why ESG believes the Gigamon Visibility Platform is a critical tool for success in today’s digital age.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 11, 2019
Download ESG’s Economic Validation Report, “Analyzing the Economic Benefits of Gigamon,” to see how Gigamon increases NetFlow performance by 100%, reduces hardware and tooling costs by 50%, decreases network downtime by 30% and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can help business and enable new ideas and growth. See why ESG believes the Gigamon Visibility Platform is a critical tool for network success in today’s digital age.
Tags : 
    
Gigamon
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Much has already been said and written about the infiltration of robotic process automation (RPA) and intelligent automation (IA) technologies into the workforce. In truth, it’s taken the corporate world a while to test, trust and commit to automation at work. To understand how far APAC/ANZ markets have advanced towards acting on these opportunities, the Shared Services and Outsourcing Network (SSON) surveyed the market and found that across the region corporations were forward thinking in building for scale, trusting technology and recognising the need to incorporate robotics into both IT infrastructure and enterprise strategy. This report explains how enterprises across APAC/ANZ are staying ahead of the global wave of RPA, the most popular solutions they are choosing, who the preferred consultants or 'integrators' are, the challenges, and how the digital workforce is being integrated into the human one.
Tags : 
analyst, artificial intelligence, intelligent automation, rpa
    
Automation Anywhere APAC
Published By: NTT Ltd.     Published Date: Aug 05, 2019
Enterprises preparing for a digital future have much to consider when they modernise their network infrastructure and have to contend with connectivity demands from their business units, staff, and customers. In this e-book, leaders from different parts of our business provide their perspectives on how to approach digital transformation. In our experience at Dimension Data, now part of NTT Ltd., you can’t look at any one piece of the infrastructure puzzle without looking at all of it. And it’s the network that holds all those pieces together.
Tags : 
    
NTT Ltd.
Published By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks
Published By: Cisco     Published Date: Dec 27, 2017
Hyperconvergence has been receiving a tremendous amount of attention because it represents the next step in the evolution of IT resource delivery. This technology takes the idea of integrating compute, storage and networking that started with converged systems design and has improved on those architectures by adding deeper levels of abstraction and automation. Hyperconverged infrastructure (HCI) vendors promise simplified operation and the ability to quickly and easily expand capacity by deploying and launching additional modules; simplicity has been the key selling point for the HCI pioneers. As HCI ventures even deeper into the enterprise and cloud environments, the architectures will need to become more efficient, agile and adaptable to help IT professionals shoulder the burden of rapidly growing data sets and workloads. This report discusses the benefits of HCI and the enhancements that must be made to expand HCI deeper into the mainstream enterprise datacenter.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and from Hewlett Packard Enterprise (HPE). The goal was to assemble the products of each vendor strictly according to their reccomended designs, and using their respectice software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and Huawei Technologies. The products of each vendor were configured and deployed strictly according to the vendors' recommended designs, and using their respective software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco
Published By: Pure Storage     Published Date: Apr 18, 2018
Deep learning opens up new worlds of possibility in artifi cial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-fl ash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
    
Pure Storage
Published By: Aerohive     Published Date: Jun 01, 2015
This whitepaper provides details about cloud networking, the state of the cloud market, and its benefits.
Tags : 
networks, cloud, cloud networking, network infrastructures, networking
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Ce document fournit des détails sur la mise en réseau dans le cloud, l’état du marché du cloud et ses avantages.
Tags : 
networks, cloud, cloud networking, network infrastructures, networking
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
In diesem Dokument sind Details über Cloud-Networking, die Situation auf dem Cloud-Markt und dessen Vorteile angegeben.
Tags : 
networks, cloud, cloud networking, network infrastructures, networking
    
Aerohive
Published By: Cisco     Published Date: Sep 17, 2015
This infographic illustrates how technologies, applications, and trends are driving a transformation in service provider business models and network infrastructures.
Tags : 
technology, network infrastructures, technology trends, smartphones, wearable devices, internet of things, network, cisco esp
    
Cisco
Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks
    
Arbor
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: Juniper Networks     Published Date: Feb 01, 2016
Download this report from IDG to learn how Juniper Unite can: Simplify your network with virtualization and automation Make your infrastructure more agile and cost-efficient Empower IT to focus on creating value through building apps and improving efficiencies
Tags : 
    
Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.