packet

Results 51 - 75 of 100Sort Results By: Published Date | Title | Company Name
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Drive smart grid transformation with Ethernet-based packet-optical networks. Download the white paper to learn how.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Discover how a converged network allows government and educational organizations to offer better service with lower taxpayer cost.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
    
Ciena
    
Ciena
Published By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : 
sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
    
Viavi Solutions
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
The network of yesterday is not the network that can take businesses into the future. As mission critical enterprise applications move to the cloud, wide area network (WAN) must adapt to become agile, flexible, and scale rapidly. Leading IT trends such as Internet of Things (IoT), Software as a Service (SaaS), cloud storage, enterprise mobility, emerging transport alternatives, and globalization increase the importance of how network assets are leveraged and how the network is conceptualized. The advantages of public and private data centers and cloud-based applications are significantly diminished if the network is slow, inflexible, and unpredictable. Erratic network performance with high latency, jitter and packet loss can significantly impact user adoption, satisfaction, and overall corporate productivity. As connectivity options continue to emerge, end users are no longer tethered to the office or to the localized applications and services that were trademarks of a primary or branc
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Ciena     Published Date: Jun 12, 2017
Explore "The Utility of the Future, Considerations for Evolving to a Smart Grid Infrastructure" by downloading it today.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
    
Ciena
    
Ciena
Published By: Apstra     Published Date: Aug 19, 2019
AOS delivers powerful, intent-driven automation of network services in vendor-agnostic environments by delivering it as an easily consumable service in response to consumer-specified intent. Network devices serve packets, AOS services serve application workloads. According to numerous studies, 70-80% of outages are due to configuration change applied to a living system, and not due to initial deployment. Initial, one-time deployment can be seen as sort of a “hello world” application; the real complexities arise as the system evolves. With AOS, configuration, telemetry, and expectations are derived from the single source of truth - the intent - in an idempotent fashion, and as such there is no implementation difference between initial deployment or change management.
Tags : 
    
Apstra
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
The network of yesterday is not the network that can take businesses into the future. As mission critical enterprise applications move to the cloud, wide area network (WAN) must adapt to become agile, flexible, and scale rapidly. Leading IT trends such as Internet of Things (IoT), Software as a Service (SaaS), cloud storage, enterprise mobility, emerging transport alternatives, and globalization increase the importance of how network assets are leveraged and how the network is conceptualized. The advantages of public and private data centers and cloud-based applications are significantly diminished if the network is slow, inflexible, and unpredictable. Erratic network performance with high latency, jitter and packet loss can significantly impact user adoption, satisfaction, and overall corporate productivity. As connectivity options continue to emerge, end users are no longer tethered to the office or to the localized applications and services that were trademarks of a primary or branc
Tags : 
sd-wan, saas, cloud storage
    
VMware SD-WAN by VeloCloud
Published By: XO Communications     Published Date: Apr 13, 2015
Explore the optimization tools that give you the ability to see and control the performance and security of your WAN traffic, a vital component to your cloud success. Among other things, these tools help you counteract the effects of latency introduced by geographical WAN distances and allow you to alleviate network congestion that might results from sending a lot large files and retransmitting dropped packets.
Tags : 
    
XO Communications
Published By: McAfee     Published Date: Aug 14, 2014
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking
    
McAfee
Published By: VSS Monitoring     Published Date: Apr 01, 2015
In May 2014 VSS Monitoring announced a significant expansion of its solution portfolio for providing packet visibility into high-speed 40G and 100G enterprise and service provider networks. With the release of the vBroker 6000 and vBroker 520, the company took aggressive and definitive steps to deliver high-performing solutions for high-density carrier and cloud infrastructure deployments and 100G transitions, allowing IT organizations to maintain operations monitoring and security integrity throughout upgrades to and new deployments of extreme high-speed networks.
Tags : 
ema, vss, 100g, visibility solutions, nvc, npb
    
VSS Monitoring
Published By: Intel Security     Published Date: Jan 20, 2015
Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking
    
Intel Security
Published By: VSS Monitoring     Published Date: Jul 09, 2014
Learn how to optimize network monitoring in high-frequency trading (HFT) When a millisecond can cost a $1 million-plus, there's no tolerance for packet loss or latency. Download this white paper to learn how: The bursty data traffic of HFT can overwhelm networks & their legacy monitoring systems.
Tags : 
vss monitoring, network monitoring, security, threats, cyber terrorists, security protocols, high frequency trading
    
VSS Monitoring
Published By: Noction     Published Date: Feb 17, 2015
In this white paper you will learn how BGP performance automation ca help you boost network availability, minimize latency and packet loss as well as reduce operational costs by intelligently rerouting traffic across the Internet.
Tags : 
network performance, congestion, outages, downtime, hosting, bgp, router, ip network, network latency, network congestion, network downtime, ip performance
    
Noction
Published By: IBM     Published Date: Feb 11, 2015
IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, data breaches, it attacks, cyber-crime, forensics solution
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, optimization, security, cyber crime, network security, it security
    
IBM
Published By: Astrocom     Published Date: Apr 23, 2008
Quality of Service (QoS) enables outbound network traffic to be identified and controlled to give priority to certain types of traffic. Network traffic may be categorized based on a variety of criteria including addressing information, protocol, port number (TCP and UDP), and packet length.
Tags : 
astrocom, networking, traffic, quality of service, traffic management, network management
    
Astrocom
Published By: SonicWall     Published Date: Sep 10, 2009
Hear real-world examples of how companies like yours consolidated their security to lower their total cost of ownership, optimized existing resources, increased their security and dramatically improved productivity!
Tags : 
sonicwall, free pcmagcast webinar, unified threat management, a different, efficient, costly bandwith, consolidating multiple solutions, run bandwidth on your web 2.0 apps, long term costs of owning solutions, potamac hospital, sonicwall clean wireless solution, integrates wireless access points, utm firewall, deep packet inspection technology
    
SonicWall
Published By: Arbor Networks     Published Date: Mar 13, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : 
arbor, arbor networks, hackers, cyberattacks, internet security, intrusion prevention
    
Arbor Networks
Published By: IBM     Published Date: Sep 27, 2013
In this white paper we will explore the leasing option for technology asset acquisitions and IBM’s particular suitability to this market. We will also use several case studies to provide examples of how this works including the toy company LEGO and the telecommunications services provider, Packet One. By the end of the paper you will be able to see the leasing proposition clearly and understand the advantage of doing business with IBM.
Tags : 
it solutions, lease, purchase, leasing, purchasing, ibm, leasing partner, it solutions, financial solutions, computing assets, flexibility
    
IBM
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.