RSS feed Get our RSS feed

News by Topic

enterprise network

Results 501 - 525 of 629Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Nov 18, 2015
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources. The following questions were posed by Cisco to Nolan Greene, research analyst with IDC's Network Infrastructure group, on behalf of Cisco's SMB customers.
Tags : cisco, idc, mobility, network, smbs
     Cisco
By: Cisco     Published Date: Nov 18, 2015
Cisco engaged Miercom to conduct a competitive analysis of its Catalyst 2960-X switch versus two comparable Hewlett-Packard switches from the 2920 and 5120 product families. Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that are critical for reliable functioning of enterprise networks. The test methodology focused on specific areas in which Cisco believed there were key competitive differentiators between the products. Test results validated include throughput, latency, energy efficiency, stacking, LACP load balancing and Quality of Services (QoS) performance. Miercom found that the Cisco Catalyst 2960-X demonstrated superior performances against the competitive switches in the tests featured in this report. We tested the following switch-configurations of the Cisco Catalyst 2960-X, HP 2920 and HP 5120 product families.
Tags : competitive, analysis, deployed, methodology
     Cisco
By: Cisco     Published Date: Nov 18, 2015
In January 2015, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment enterprises may realize by deploying Cisco TrustSec. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco TrustSec on their organizations. The Cisco TrustSec solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, Cisco TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
Tags : cisco, trustsec, tei, total economic impact, network
     Cisco
By: Cisco     Published Date: Apr 11, 2016
Cisco made Application Policy Infrastructure Controller Enterprise Module (APIC-EM) generally available on November 3rd, 2015. It is an SDN controller that supports apps that make WAN and access networks easier to deploy and manage. Cisco’s focus on a low-risk, incremental approach to adopting SDN will appeal to its user-base. Cisco needs to describe the policy control capabilities benefits of APIC-EM, and also highlight its power as a platform and its ability to distinguish apps from point solution offerings from many other companies with competitive features.
Tags : esg brief, cisco apic, sdn controller, wan, sdn
     Cisco
By: Cisco     Published Date: Apr 11, 2016
The role of the CIO has changed more in the past five years than any other position in the corporate world. IT leaders are now partners with business leaders, and they are tasked with helping companies respond to competitive pressures as quickly as possible. In an effort to improve overall IT agility, compute and application technology has evolved significantly through the use of mobility, virtualization and cloud computing. However, the network itself has yet to evolve, limiting the overall agility of IT today. These technology shifts have transformed almost every part of the enterprise. However, to maximize the potential of these investments, the network must also transform. Read more to learn how.
Tags : cisco apic, network operations, it agility, cloud computing, virtualization
     Cisco
By: Trend Micro     Published Date: Oct 12, 2012
This free white paper provides a comprehensive overview of the threat as well as the advanced protection that enterprises can now use to protect their networks and information.
Tags : information technology, network, trend micro, security
     Trend Micro
By: Riverbed     Published Date: Jan 28, 2014
Riverbed Cascade provides enterprise-wide network and application visibility with a full set of application-centric, site-centric, and business-centric views. While Cascade can coexist or integrate with a variety of other IT management solutions, it will likely become your first line of defense against application performance problems.
Tags : application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring, network performance troubleshooting
     Riverbed
By: Damballa     Published Date: Oct 03, 2014
Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty
Tags : damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention, security
     Damballa
By: Citrix     Published Date: Jul 18, 2014
This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.
Tags : citrix, enterprise pc, remote access, remote network management, network architecture, mobile workers, xendesktop
     Citrix
By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager
     Bitium
By: Cisco     Published Date: Jan 05, 2015
As the corporate landscape becomes increasingly mobile, and workers collaborate across a growing range of devices, organizations are implementing an agile and secure unified communications infrastructure. Active deployment of UC technology solutions has been on the rise among enterprises; however, adoption among midsize businesses has been notably slower. Yet in seeking ways to do more with less, midsize organizations are increasingly turning to the cloud and converged networks to provide UC solutions.
Tags : cloud-based, collaboration, hosted, flexibility, productivity, deployment, public, private
     Cisco
By: Cisco     Published Date: Jan 05, 2015
The four pillars of computing — cloud, mobility, social, and analytics — are driving new levels of network innovation in datacenter networks. These forces are now buffeting the datacenter along with virtualization and the Internet of Things (IoT), resulting in sweeping changes in traffic patterns that expose the limitations of traditional networks and their operational models. To become a resource rather than a bottleneck to overall datacenter performance, the network must deliver not just exceptional performance and scalability but also unprecedented automation and orchestration that can yield agility, flexibility, and service velocity. This Technology Spotlight examines these key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing these ongoing challenges for enterprise IT and network managers.
Tags : cloud computing, infrastructure, marketplace, application, hybrid, enterprise
     Cisco
By: Cisco     Published Date: Jan 05, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : cloud computing, infrastructure, marketplace, application, hybrid, enterprise
     Cisco
By: Cisco     Published Date: Jan 15, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter
     Cisco
By: Cisco     Published Date: Jan 20, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : datacenter, optimization, computing, enterprise, scalability, network, orchestration, innovation
     Cisco
By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
By: Riverbed     Published Date: Jul 15, 2014
Any strategy for managing the network infrastructure must include a direct understanding of how well the network is playing its role in application and service delivery. This is the realm of Application-aware Network Performance Management (ANPM), and it is essential to understand the primary requirements for such systems in order to adequately evaluate and select tools and products that will best meet the need. This paper reviews the challenges that ANPM solutions are best fit to address, which qualities and capabilities are of most importance, and how one alternative, Riverbed’s Cascade Solution, stacks up.
Tags : ema, solution, enterprise, network, infrastructure, anpm
     Riverbed
By: Riverbed     Published Date: Aug 22, 2014
Businesses are rapidly adopting virtualization, cloud infrastructure, and SaaS applications broadly across the enterprise to minimize costs and enable seamless collaboration and communication. This is significantly straining the traditional network paradigm. IT organizations globally are faced with the challenge to transform network architectures to deliver the right performance and reliability cost-effectively while retaining control.
Tags : business performance, hybrid networks, virtualization, cloud infrastructure, saas, collaboration, communication
     Riverbed
By: Fusion-io, Inc.     Published Date: May 27, 2014
Optimizing SQL Server Clusters with End-to-end Flash Hybrid Storage
Tags : fusion-io, esg, esg lab, data center, enterprise strategy group, iocontrol n5-spx, hybrid storage, hybrid san
     Fusion-io, Inc.
By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: Palo Alto Networks     Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Tags : palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
     Palo Alto Networks
By: Riverbed     Published Date: Aug 19, 2014
Businesses are rapidly adopting virtualization, cloud infrastructure, and SaaS applications broadly across the enterprise to minimize costs and enable seamless collaboration and communiation. This is significantly straining the traditional network paradigm.
Tags : hybrid, network, transforming, business, collaboration, cloud infrastructure, virtualization, saas
     Riverbed
By: Riverbed     Published Date: Sep 05, 2014
Enterprises have been using Cascade® products from Riverbed Technology for many years to discover, monitor and troubleshoot their physical network and application infrastructure. Cascade network performance management (NPM) solution offers a rich set of functionality to understand network and application performance in the context of end-user experience, and to uncover problems in an organization’s physical infrastructure. With enterprises aggressively embracing virtualization, this sea change has brought new visibility gaps in IT infrastructure.
Tags : virtual, enabling, visibility, virtualized, application infrastructure, functionality
     Riverbed
By: Riverbed     Published Date: Apr 20, 2015
Applications are the life of any enterprise and key enablers of workforce productivity and business agility. But, the application landscape is changing rapidly - the number and type of applications is increasing, the move to cloud and SaaS for application delivery is growing, bandwidth costs are decreasing and the reliability of the Internet has improved. Inevitably, there are also changes in network and infrastructure topologies. The hybrid enterprise has become a reality. The hybrid enterprise has become a standard.
Tags : riverbed, qualcomm, applications, workforce
     Riverbed
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics