resources

Results 276 - 300 of 1711Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Nov 18, 2015
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
cisco, intelligent wan, validated designs, systems design
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
In January 2015, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment enterprises may realize by deploying Cisco TrustSec. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco TrustSec on their organizations. The Cisco TrustSec solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, Cisco TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
Tags : 
cisco, trustsec, tei, total economic impact, network
    
Cisco
Published By: Cisco     Published Date: Dec 04, 2015
This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
wan, applications, design guide, summary, technology
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
wireless management, wireless, communications, business practices
    
Cisco
Published By: Cisco     Published Date: Apr 04, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
cisco systems, mobility, going digital, midsize businesses, smb, mobility infrastructure
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System (Cisco UCS) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere. Traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Cisco Helped to Deploy the World’s Largest 802.11ac Wave 2 Wireless Network for China University of Geosciences. China University of Geosciences at Wuhan is one of the country’s leading universities and a national key university directly under the Ministry of Education. Focusing on earth science, the university has national level-1 disciplines in geology, geological resources and geological engineering. in science and technology and a leader in applications instruction. Six years ago the university built a wireless network based on 802.11a/b/g—becoming the first university in Wuhan to deploy this type of wireless network—and has become one of the leaders among Chinese universities when it comes to wireless network development.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
If you need to deploy and scale applications faster to increase revenue, Cisco’s integrated infrastructure solutions can help you achieve your goals—and reduce risk. Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System™ (Cisco UCS®) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 23, 2015
So what lessons can operators learn from the past experience with server virtualization? Beware of merely shifting costs from capital to operating expenditures. Be selective in virtualizing the right resources and functions driven by the business need, and not the technology lure.
Tags : 
cisco, virtualization, sdn, wan, cloud
    
Cisco
Published By: Cisco     Published Date: Jun 29, 2015
Ron’s team knows application de-commissioning should release compute, storage, network, and security resources but organizational and technical silos often complicate the task.
Tags : 
csico aci, sdn architecture, security, virtualizatiom, automate policy enforcement, automates clean up, automation
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere.
Tags : 
cisco, threat, cybercrime, infrastructure
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
Today the success of your organization may depend on effectively safeguarding the resources and information in your data center.
Tags : 
data security, security, resource management
    
Cisco
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Using your allotted resources wisely is admirable. However, have you thought in detail about the real costs associated with using “white box” servers? The Cisco Unified Computing System™ (Cisco UCS®) delivers advantages, including a lower total cost of ownership (TCO), beyond those that white-box servers can deliver.
Tags : 
cisco, usc, resources, whitebox servers, tco, storage, it management
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 05, 2018
The operation of your organization depends, at least in part, on its data. You can avoid fines and remediation costs, protect your organization’s reputation and employee morale, and maintain business continuity by building a capability to detect and respond to incidents effectively. The simplicity of the incident response process can be misleading. We recommend tabletop exercises as an important step in pressure-testing your program.
Tags : 
human resources, cisco, employees, data, analysis
    
Cisco EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Threat actors increasingly look toward illicit cryptomining as an easy source of income. Cryptomining is the production of virtual currency, also known as cryptocurrency, such as Bitcoin and Monero. It comes at the expense of system performance and power consumption. Moreover, threat actors are infiltrating networks to use their victims’ computer resources to do this work for them. In this white paper, you will learn how to defend your organization from illicit cryptomining with the Cisco® security portfolio.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
If you’re not protected, it can cost you in all kinds of ways. Find out how to protect your network and your valuable resources in this e-book.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptocurrency’s market volatility could make it much more lucrative than ransomware. Find out who they’re targeting and how to protect your network.
Tags : 
    
Cisco Umbrella EMEA
Published By: Citrix     Published Date: Nov 09, 2012
The tension between security and business productivity has never been so acute. To operate at peak performance, firms need workers to access resources in more ways and places than before -- Read for the man reasons to strengthen IT security in cloud.
Tags : 
citrix, it infrastructure, desktop, virtualization, cloud, security
    
Citrix
Published By: Citrix Online     Published Date: Apr 08, 2009
There's no "one size fits all" when it comes to telecommuting. This new Forrester white paper explores how implementing best practices to create a telecommuting program and standardized policy significantly reduces operational costs and increases employee productivity - a winning combination in a tough economy.
Tags : 
telecommuting, citrix, forrester, telecommute, employee productivity, citrix, human resources, travel, expenditure
    
Citrix Online
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.