ad network

Results 301 - 325 of 1468Sort Results By: Published Date | Title | Company Name
Published By: Riverbed DE     Published Date: Oct 16, 2017
Think SD-WAN is the panacea for modern networking? While there’s no doubt that SD-WAN technology is absolutely necessary to support the rapid innovation required by today’s cloud-first enterprise, it is just one of many capabilities that make next-generation networking possible. Read this eBook to learn how to take your enterprise network to a best-practices level with a complete solution that includes: • Cloud-grade SD-WAN to automate connectivity and orchestration across hybrid WANs, cloud networks, and remote branch LANs/WLANs. • Rich visibility into heavily-encrypted environments for an end-to-end view of performance and fast resolution of problems. • Built-in optimization that unifies application acceleration and SD-WAN network services for complete control over application performance.
Tags : 
cloud networking, wan, network services, application performance, technology
    
Riverbed DE
Published By: IBM     Published Date: Nov 08, 2011
This paper looks at cloud architecture in which the servers and networks in the data center can rapidly respond to changing demands.
Tags : 
ibm, system networking, network architecture, cloud, datacentre, datacenter, ibm system networking, network architecture
    
IBM
Published By: CloudFlare     Published Date: Jul 25, 2016
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks. This document explains the anatomy of each attack method and how the CloudFlare network is designed to protect your web presence from such threats.Below you will find detailed information on these attacks and how the CloudFlare network protects against them.
Tags : 
cloudflare, best practices, technology, security, access control
    
CloudFlare
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
An opportunity for Chief Procurement Officers (CPOs): As business models evolve and technology advances, CPOs can elevate their value across enterprises and extended supplier networks with Cognitive Procurement capabilities that can sense and act.
Tags : 
    
Group M_IBM Q2'19
Published By: IBM     Published Date: Nov 11, 2014
Social and cloud technologies are connecting us to more people and information than we ever could have imagined. The challenge is to get the right information from the right sources in the right context at the right time. IBM has the leading cloud collaboration platform that helps you collaborate with extended networks, focus on the relevant and filter out the rest. Join IBM clients as they share how they drove real outcomes with collaborative processes. See how IBM partners are innovating the leading enterprise software platform. Hear IBM's perspective on these technological shifts and see the latest advancements in action.
Tags : 
digital frontier, social technology, cloud technology, cloud collaboration
    
IBM
Published By: IBM     Published Date: May 07, 2013
Can an organization that chooses to ignore the insights of employees, customers and business partners expect to thrive? For many, the answer is no. In a global environment where innovation cycles are shrinking, customer expectations are rising and talent is becoming more distributed, companies are seeing the need to more effectively apply the knowledge and experience of individuals, regardless of their vocation, affiliation or organization status. Download this report to learn how you can access the untapped knowledge of your networks.
Tags : 
collective intelligence, networks, customer, innovation cycle
    
IBM
Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet
    
Panda Security
Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: Cyphort     Published Date: Jun 28, 2016
Thanks to its convenience, online shopping has become a major trend over the last few years and lets face it, it’s here to stay. With the rise of online shopping, marketing experts capitalized on this new avenue to advertise their products. Now your friends nudge you on Facebook to buy a product they love and Google suggests a friendly place across the street where you can get your car fixed. It’s become hard to browse even a few pages without running into an ad and because of this increases, malware experts also saw a new avenue of attack - Malvertising.
Tags : 
downloads, best practices, network management, solutions, technology, advertising
    
Cyphort
Published By: IBM APAC     Published Date: Apr 26, 2017
Find out how you can take advantage of hybrid cloud by extending or migrating workloads using secure and seamless networking capabilities offered by VMware. All of this is available on secure, single-tenant IBM Bluemix bare metal servers on IBM Cloud, giving you the utmost control.
Tags : 
virtualisation, cloud, vmware, ibm, ibm cloud, hybrid cloud, secure environment
    
IBM APAC
Published By: Palo Alto Networks     Published Date: May 09, 2012
In this on-demand video broadcast, hear Nir Zuk, CTO and co-founder of Palo Alto Networks and Rich Mogull, Analyst and CEO of Securosis, provide insights and recommendations on how to handle consumerization and the proliferation of devices.
Tags : 
palo alto, palo alto networks, consumerization, proliferations, applications, mobile, mobile devices, controls
    
Palo Alto Networks
Published By: Verint     Published Date: Apr 24, 2013
Commonwealth Bank of Australia, with over 1,000 branches and 50,000 employees was using spreadsheets to staff its branch network. When they looked to desktop process analytics from Verint they achieved major improvements in productivity and customer experience. Watch this case study to learn more about how desktop process analytics can use big data to help your organization.
Tags : 
case study, big data, organization, desktop process analytics, process management, analytics, workforce management
    
Verint
Published By: Frontier Communications     Published Date: Dec 22, 2016
When you choose Frontier as your partner, your bank or financial services firm can take advantage of this experience and our extensive portfolio of network and equipment solutions. We will work closely with your team to assess your current situation, determine future communications requirements, and select products and services that fit into your timeframe and budget. What’s more, Frontier backs everything up with local customer support.
Tags : 
    
Frontier Communications
Published By: Frontier Communications     Published Date: May 01, 2017
When you choose Frontier as your partner, your bank or financial services firm can take advantage of this experience and our extensive portfolio of network and equipment solutions. We will work closely with your team to assess your current situation, determine future communications requirements, and select products and services that fit into your timeframe and budget. What’s more, Frontier backs everything up with local customer support.
Tags : 
    
Frontier Communications
Published By: Cisco     Published Date: Jul 30, 2015
Read this white paper to learn of the comparison analysis between cisco catalyst 4500E and the Brocade FastIron SX 1600
Tags : 
cisco, brocade fastiron, catalyst 4500e, network
    
Cisco
Published By: McAfee     Published Date: Mar 07, 2013
Databases are the primary target of cyber criminals and disgruntled insiders. Traditional perimeter, network security, and built-in database security measures, offer limited protection when it comes to securing the organization’s most sensitive data.
Tags : 
database security, database security compliance, database activity monitoring
    
McAfee
Published By: Dell Storage     Published Date: Jan 16, 2009
With the advent of iSCSI as the standard for networked storage, businesses can leverage existing skills and network infrastructure to create Ethernet-based SANs that deliver the performance of Fibre Channel—but at a fraction of the cost. iSCSI enables block-level data to be transported between a server and a storage device over an IP network. An iSCSI initiator is hardware or software that runs on a host and initiates I/O to an iSCSI target, which is a storage device (usually, a logical volume) that responds to read/write requests.
Tags : 
dell, iscsi, networked storage, initiator implementations, block-level data, fibre channel
    
Dell Storage
Published By: Alacritech     Published Date: Aug 21, 2009
Today's systems and servers need an efficient way to move the ever-increasing amounts of data over networks. Many companies have introduced solutions such as TCP/IP Offload Engines (TOE) Network Interface Cards (TNICs), Network Interface Cards (NICs), and iSCSI Host Bus Adapters (HBAs) to solve efficiency and throughout challenges. However, the functionality of these solutions is quite varied, and in some cases, rapidly becoming obsolete.
Tags : 
data transfer, tcp/ip, tnic, nic, hba, iscsi, alacritech
    
Alacritech
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
The Tolly Group’s hands-on evaluation of BLADE’s RackSwitch G8100, based on a FocalPoint FM4224 low-latency 10GbE switch chip from Fulcrum Microsystems, demonstrates that the device offers non-blocking 10GbE switching, far lower latency and less energy consumption than the Catalyst 4900M.
Tags : 
blade network technologies, rackswitch g8100, focalpoint fm4224, catalyst 4900m, non-blocking 10gbe switching, top-of-the-rack switches
    
BLADE Network Technologies
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
The Tolly Group’s hands-on evaluation of BLADE’s RackSwitch G8000 demonstrates that the device offers non-blocking 1/10G switching, lower latency and less energy consumption than the Cisco 4948-10GE. These are very important productivity indicators for the top-of-the-rack switches deployed in the data center where latency-sensitive applications such as clusters and financial applications set strict requirements.
Tags : 
rackswitch, blade network technologies, non-blocking 1/10g switching, cisco 948-10ge, top-of-the-rack switches
    
BLADE Network Technologies
Published By: Infoblox     Published Date: Nov 07, 2013
Failure to meet compliance can result in fines, dangerous network exposure and damage to a company’s reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Tags : 
infoblox_network_automation, infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri
    
Infoblox
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.