RSS feed Get our RSS feed

News by Topic

enterprise network

Results 351 - 375 of 635Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: May 04, 2009
Live migration is essential for a dynamic data center environment. But until now, it's been impossible between different generations of processors. Intel IT and End User Platform Integration have done so successfully with Intel® Virtualization Technology FlexMigration. This white paper explains how.
Tags : ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x
     IBM
By: IBM     Published Date: Feb 03, 2010
A recent IBM CEO study revealed innovation, along with global integration and a disruptive business model, to be among the key traits of the Enterprise of the Future.1 As to how that innovation will take place-CEOs include collaboration and the use of Web 2.0 tools at the top of the list.
Tags : ibm ep, empowering people, web 2.0, enterprise software, social networking environment, roi
     IBM
By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
     Secure Computing
By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft Dynamics CRM 4.0 is designed to help enterprise organizations attain a 360-degree view of customers, achieve reliable user adoption, adapt quickly to business change, and accelerate project delivery and returns-all on a platform that provides enterprise levels of scalability and performance. Microsoft Dynamics CRM 4.0 addresses the stringent requirements of the enterprise in the areas of performance and scalability, application flexibility, efficient manageability, and network configurability.
Tags : microsoft, microsoft crm, microsoft dynamics
     Microsoft Dynamics
By: Cisco     Published Date: Jan 28, 2009
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall, VPN, and optional content security capabilities, so you can feel confident your business is protected. This easy-to-use solution lets you control access to network resources to protect business data and maximize network uptime.
Tags : cisco, cisco asa 5500, all-in-one security, secure sockets layer, ssl, ip security, ipsec, firewall
     Cisco
By: Cisco     Published Date: Feb 12, 2009
Spam email continues to be a big problem, especially for small businesses. Small companies rely on email just as much as large enterprises, and their mail servers get clogged with unsolicited mail just as often. But, with fewer resources to spare to address the spam problem, small businesses need smarter solutions. To find out how you can use the Cisco Spam & Virus Blocker to eliminate spam, improve productivity, and boost security and network performance in your business download today!
Tags : cisco, spam, anti-virus, servers, firewall, security
     Cisco
By: Social Text.     Published Date: Jul 21, 2009
Read this paper to learn 5 practices that ensure the collaboration solution you choose will give you the significant business results you are seeking. Collaboration solutions can accelerate cycle times by 30% across virtually every business function. These results may be critical to survival in difficult economic times, and the right collaboration solution is the single most effective way to get them.
Tags : social text, enterprise collaboration, collaboration, enterprise, tco, total cost of ownership, social networking, blogging
     Social Text.
By: Savvis     Published Date: Jul 07, 2010
This paper describes the Symphony VPDC enterprise-grade infrastructure service that provides true high availability enterprise IT environments, supporting development to production, with automated provisioning of servers, network, storage, software and security.
Tags : savvis, virtual private data center, cloud computing, virtualization, vpdc, hosting management service
     Savvis
By: CompareBusinessProducts     Published Date: Dec 03, 2010
Creating Your Needs Analysis First. When buying networking equipment: routers, switches, firewalls, and network management solutions for your company or organization, it's essential to create a needs analysis first, so that you make the right decisions from multiple standpoints
Tags : comparebusinessproducts, enterprise networks, network management, firewall, scalability, infrastructure, security
     CompareBusinessProducts
By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics
     NetIQ
By: CenturyLink     Published Date: Nov 18, 2011
Read this IDC Executive Brief to see how MPLS facilitates cost-effective and converged wide area networking with a high level of security and flexibility
Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
     CenturyLink
By: Cisco     Published Date: Jan 20, 2012
Download this white paper to learn which questions you need to ask your reseller so they can find the best solution for your business.
Tags : cisco, resellers, questions, smb, enterprise, networking, ucs, certifaction
     Cisco
By: CDW     Published Date: Jan 14, 2015
Learn how to Optimize Your Network for Wireless Networking and see the three immediate advantages that your organization will gain.
Tags : enterprise, networking, architecture, customer, technology, wireless, telephony systems, collaboration
     CDW
By: CDW     Published Date: Jan 14, 2015
Learn how to create an enterprise network architecture that delivers 100% tailored solutions that help your customers optimize their networks while bringing their organizations up to speed.
Tags : enterprise, networking, architecture, customer, technology, wireless, telephony systems, collaboration
     CDW
By: CDW     Published Date: Jan 14, 2015
Learn how optimizing your campus network solutions will transform the student body by allowing students to seamlessly surf the web, but also communicate with each other in a more fluid manner.
Tags : enterprise, networking, architecture, customer, technology, wireless, telephony systems, collaboration
     CDW
By: CDW     Published Date: Jan 14, 2015
Learn how the Kansas City Chief’s new and improved wireless network brought fans closer to their team and each other and see how this will significantly improve the fan experience.
Tags : enterprise, networking, architecture, customer, technology, wireless, telephony systems, collaboration
     CDW
By: CDW     Published Date: Jan 14, 2015
Learn how a comprehensive upgrade of their wireless and telephony systems modernized teaching and learning for a Kansas school district, which allowed for enhanced classroom learning and collaboration opportunities.
Tags : enterprise, networking, architecture, customer, technology, wireless, telephony systems, collaboration
     CDW
By: CDW     Published Date: Jan 14, 2015
Learn how a revamped IT design is transforming a 100 year old stadium and is now able to support staff and visitors locally, while also enabling greater communication and collaboration across the sites.
Tags : enterprise, major league, chicago cubs, projects, networking, architecture, customer, technology
     CDW
By: CDW     Published Date: Feb 24, 2015
All organizations require software systems to conduct daily operations. These strategic enterprise assets are often acquired or created in isolation of each other as an organization grows, particularly for those that provide services rather than physical products. Over time, these systems become complex, overlapping and highly dependent on one another, so more effort must be expended to discover the full effects of any system change. The ability of an entity to update, replace or improve the overall capabilities of the enterprise can become severely impaired. Moreover, support and administrative costs for these critical assets inevitably grow to be a major burden. Add to all this the need to control licensing, follow the organization’s policies and ensure security for the internal network, and it becomes clear that some manner of oversight is required for the enterprise to be successful.
Tags : sam, software asset management, strategic enterprise assets, license utilization, cloud based computing
     CDW
By: CDW     Published Date: Feb 27, 2015
CDW’s Technology Insights guides provide a high-level, informative take on today’s most pressing IT solution areas and related issues. Speaking to the interests and concerns of IT managers and their staff, as well as their enterprise counterparts, the guides provide up-to-date summaries, strategic guidance and best practice tips on the technologies driving IT operations forward.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: CDW     Published Date: Mar 27, 2015
Many, if not most, organizations today are grappling with the challenge of a growing mobile technology environment. Mobility can deliver many key benefits: improved collaboration among workers, enhanced customer service, easier access to corporate information from many locations and increased productivity—to name a few. But the proliferation of mobile devices and applications also comes with its share of challenges, perhaps none more important than ensuring the security of the devices themselves as well as the data they contain and the enterprise networks they access.
Tags : mobile, security, strategy, application, enterprise, network, data
     CDW
By: CDW     Published Date: Mar 31, 2015
A wireless network is a platform for enabling enterprise-wide access to an organization's applications and data. Wireless infrastructure allows users to take the office with them wherever they go. The wireless network provides employees and guest workers with untethered access to voice, video, data and applications regardless of their physical location. With the influx of mobile devices and increase in Wi-Fi connections, organizations are already starting to see a paradigm shift to "wireless by default" and "wired by exception." Watch this video to see how our solution architects upgraded the Shawnee Mission School District's aging network infrastructure.
Tags : wireless network, networking, applications, data, infrastructure, update
     CDW
By: McAfee     Published Date: Aug 14, 2014
Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.
Tags : network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
     McAfee
By: McAfee     Published Date: Aug 14, 2014
What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.
Tags : next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security
     McAfee
By: VSS Monitoring     Published Date: Apr 01, 2015
In May 2014 VSS Monitoring announced a significant expansion of its solution portfolio for providing packet visibility into high-speed 40G and 100G enterprise and service provider networks. With the release of the vBroker 6000 and vBroker 520, the company took aggressive and definitive steps to deliver high-performing solutions for high-density carrier and cloud infrastructure deployments and 100G transitions, allowing IT organizations to maintain operations monitoring and security integrity throughout upgrades to and new deployments of extreme high-speed networks.
Tags : ema, vss, 100g, visibility solutions, nvc, npb
     VSS Monitoring
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics