RSS feed Get our RSS feed

News by Topic

ad network

Results 1 - 25 of 1004Sort Results By: Published Date | Title | Company Name
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Jun 22, 2017
Juniper Networks works with leading companies around the world to increase the service agility of their networks. With simple, open, and smart networks, financial services firms can bring innovative new services to market faster and at lower costs. They can leverage Juniper’s expertise, experience, and partner ecosystem to build agile, service-aware networks. Juniper is a leader in high-performance, highly reliable routing, switching, and security, with solutions deployed in some of the most complex networks in the world across banking, capital markets, and insurance providers. A broad ecosystem of solution, services, delivery, and consulting partners can provide businesses with a complete offering that enables innovation.
Tags : financial services, financial security, data security, cloud security, network security, business protection
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
OpenLab is a centre of innovation provided by Juniper, for business leaders who want to build network-integrated software applications and solutions quickly and securely. This is done by offering hands-on and cloud-based access to Juniper and third-party solutions including SDN sandboxes and NFV interoperability testing.
Tags : technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
To maximize the benefits of its next-generation systems and successfully execute its information strategy, CU had to overcome its aging network. Most of CU’s network infrastructure, which was built from solutions by another vendor, was introduced in 2007, when its computing center was first built. Over time, the equipment began to fail, affecting the stability of applications which relied on network connectivity. Technical support also became a major issue as the equipment faced obsolescence and maintenance contracts with vendors expired.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     Juniper APAC DWA Cloud Leads July 2017
By: Makino     Published Date: Jun 23, 2017
As an early adopter of automation, SEW-Eurodrive in Lyman, S.C., has experience working with a wide variety of automated technologies and automation suppliers. So what has been its biggest takeaway after having worked more than a decade in manufacturing automation? Make sure to partner with an experienced and trusted supplier. Hear how SEW-Eurodrive’s partnership with Makino has helped reduce part costs, improve company morale and increase plant production tenfold with only a 6 percent increase in manpower, making the Lyman plant the most efficient operation across the company’s entire global manufacturing network.
Tags : robotic automation, robot gantry, robotic gantry
     Makino
By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
     VMware AirWatch
By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     IBM
By: Akamai Technologies     Published Date: Jun 27, 2017
Read this white paper to learn how the rapid rise of remote and third-party users has created increased complexities for IT around network security and user expectations.
Tags : 
     Akamai Technologies
By: Juniper Networks     Published Date: Aug 03, 2017
Keeping the pace of a data-driven economy means having an infrastructure that can scale with it. Research from Nemertes explains how the transformation happens. Easily implemented with seamless integration Interoperates with existing solutions already in place Uses the entire network to improve security
Tags : data security, network protection, infrastructure improvement, business transformation, data driven business
     Juniper Networks
By: Juniper Networks     Published Date: Aug 03, 2017
The ongoing digital transformation makes an agile plan for network strategies urgent. IDG explains how to navigate it. Address network shortfalls now Automate repetitive tasks Integrate the cloud
Tags : cloud integration, network improvements, network reliability, technology infrastructure
     Juniper Networks
By: Juniper Networks     Published Date: Aug 03, 2017
How do you stay ahead of disruption? In an international survey, more than 90 percent of the respondents agreed that two things give them a competitive advantage that’s significant. How to create and deploy new products and services faster The top three countries leveraging network and automation technologies Global statistics on the business advantages gained from these technologies
Tags : network technologies, automation technologies, organization efficiency, improved production
     Juniper Networks
By: Juniper Networks     Published Date: Aug 08, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Aug 08, 2017
Staying one step ahead of competitors requires a secure, reliable network that has everything it needs to remain agile and resilient in the years to come. When refreshing your enterprise network, keep the following considerations top of mind: 1) How do you manage your network? 2) Is security integrated throughout your network? 3) Does your current network vendor really have a plan for your network? 4) What are your options when supporting your network in the future?
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Aug 08, 2017
Digital Transformation and other changes drive vast and innumerable new data flows through the business, and increase pressure on IT to continually, quickly, and efficiently address a broad array of new demands. IT needs a network that empowers the business but is too often hampered by it instead. Network management as most practice it now is too complex and inefficient. The solution is automation.
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Aug 08, 2017
The constant growth of cloud, IoT, virtualization, mobility, and digital transformation has brought tectonic changes to the world of networking. Long viewed as a bastion of single-purpose, inflexible, and closed solutions, networks have started to transform in line with the demands for flexibility, scalability, ease of management, interoperability, and application support. Networking departments need to achieve all of the tasks above while keeping costs under control. Additionally, security requirements for the new network are not letting up — quite the opposite, as the virtualized network (and general IT) environment requires rethinking, virtualization, and evolution of security architectures.
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Aug 08, 2017
Mainstream enterprises should start taking advantage of the new capabilities being delivered by software-defined networking architectures. This research identifies a pragmatic roadmap for infrastructure and operations leaders to leverage the benefits associated with SDN.
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Aug 08, 2017
As enterprises embark on the digital transformation to take advantage of artificial intelligence, big data, machine learning, IoT, and cloud, they need a network infrastructure that gives them a solid foundation. Juniper Networks® Unite CloudEnabled Enterprise allows networking across your entire enterprise—campus, branch, and data center—ultimately helping you reduce risk, increase agility, lower costs, and enhance the customer experience. Here are the Top 6 reasons why enterprises embarking on the journey of digital transformation should switch to the Juniper Unite Cloud-Enabled Enterprise solution.
Tags : 
     Juniper Networks
By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : email security, cyber threats, it security, phishing
     Mimecast
By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : virtela, healthcare, remote user satisfaction, roi
     Virtela Communications, Inc.
By: Coyote Point Systems     Published Date: Aug 25, 2010
Application Delivery Controllers understand applications and optimize server performance - offloading compute-intensive tasks that prevent servers from quickly delivering applications. Learn how ADCs have taken over where load balancers left off.
Tags : coyote point, systems, slbs, server load balancers, adc, adcs, ssl, load balancing
     Coyote Point Systems
By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking
     Coyote Point Systems
By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
     Coyote Point Systems
By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
     Coyote Point Systems
By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
     Coyote Point Systems
By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers
     StrongMail
By: IBM     Published Date: Jul 13, 2017
Learn about a solution for electronics manufacturers to promote greater efficiency and profitability, as well as consumer satisfaction. The full spectrum of IoT electronics consists of Medical Devices, Consumer electronics and appliances, network equipment providers and many more. “These “smart, connected products”—made possible by vast improvements in processing power and device miniaturization and by the network benefits of ubiquitous wireless connectivity—have unleashed a new era of competition.”
Tags : iot, electronic industry, technology advancement, medical devices, greater efficiency, consumer satisfaction, data driven
     IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics