RSS feed Get our RSS feed

News by Topic

enterprise network

Results 551 - 575 of 628Sort Results By: Published Date | Title | Company Name
By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.
Tags : network security, access control, nac, network access control, intrusion prevention, landesk
     LANDesk
By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging
     Decru
By: COMDOM Software     Published Date: Aug 09, 2007
This paper provides an overview of costs of spam facing large organizations, such as multinational enterprises, universities, and governments, as well as small and medium sized businesses that own or operate networks used by employees and other end users.
Tags : spam, bayesian, filter, filtering, block, blocking, spamming, phishing
     COMDOM Software
By: AT&T     Published Date: Jun 25, 2008
Mobile applications are transforming how companies operate. With new ways to work flexibly, employees are becoming more responsive and more productive. But enterprises have experienced only the start of what IP networks will bring to mobile working.
Tags : mobile workers, mobile applications, productivity, mobile, wireless, pda, att, at&t
     AT&T
By: Network Engines     Published Date: Sep 21, 2007
Enterprise customers want software applications delivered as server appliances because they help to reduce IT costs and complexity. Appliances provide better performance, security and manageability. Learn from experts, about factors to consider and things to avoid with the appliance delivery model.
Tags : software as an appliance, hardware, server hardware, software appliance, software delivery, software management, enterprise software, software installation
     Network Engines
By: ElcomSoft     Published Date: Dec 06, 2007
Information protection gets much attention these days. Many have realized that their data is a treasure, which not only should be treated properly, but should be protected as well. So a few dollars spent on defending against security threats now can reap millions in avoiding future losses due to hacking of your enterprise network.
Tags : passwords, password, password management, security management, good password, bad password, data protection, elcomsoft
     ElcomSoft
By: TeraCloud     Published Date: Dec 11, 2007
Storage spawns where it is needed. This leaves IT to manage many islands of storage devices scattered across the enterprise. Compliance requirements, multimedia-rich applications, unstructured content and a proliferation of databases are pushing IT departments to increase the size and complexity of their storage networks. All of this is occurring at a time when the need for centralized storage management has never been greater.
Tags : storage, storage management, infrastructure, compliance, tsa, teracloud, teracloud storage analytics, san
     TeraCloud
By: Clarus Systems     Published Date: Mar 18, 2008
Enterprise networks are going through massive change, and the convergence of voice and data including Communication deployments, upgrades, transformations and ongoing management remain a top priority. According industry analysts at Aberdeen Group, 61% are planning for Communications in the next two years. In order to get the most from their Unified Communications investment at the time of deployment and beyond, enterprises must leverage both active testing and configuration analysis techniques to certify and validate that environments are configured as designed.
Tags : itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
     Clarus Systems
By: Tail-f Systems     Published Date: Sep 16, 2008
The key issues involved in developing on-device network management systems for carrier-grade enterprise and operator networks are the same for any other networked resource, only with more complexity and built-in restrictions due to the limited space and processing capabilities inherent to these types of devices.
Tags : network management, on-device network management systems, carrier-grade requirements, high availability, network scalability, tail-f, tailf
     Tail-f Systems
By: Likewise Software     Published Date: Oct 07, 2008
This paper begins by exploring why SOX compliance continues to be so difficult when it is treated as an annual project rather than a continuous process. Then the paper discusses how Likewise Enterprise can help your company make the shift to continuous compliance for identity and access management in a mixed network. Likewise joins Linux, Unix, and Mac OS X computers to Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, and monitoring. Likewise also includes group policies for non-Windows computers so that you can centrally manage their security settings in the same way as Windows computers.
Tags : likewise, risk, compliance, sox, security
     Likewise Software
By: HP - Enterprise     Published Date: Jun 05, 2013
The term “network management” encompasses a broad range of solutions from single point products to element managers to large enterprise-class solutions. For the purpose of this ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) report, the term Enterprise Network Management Systems (ENMS) includes network-centric management solutions that are used by large organizations’ operations and engineering teams to discover, monitor, assess, troubleshoot, and generally maintain highly distributed enterprise networks. For this EMA™ Radar, the focus was put specifically on core capabilities and features primarily associated with network operations’ need to ensure health and availability of the network. Supporting functional capabilities such as performance monitoring, configuration management, asset management, as well as integrated management of connected non-network devices were also considered, but as non-critical (albeit helpful/valuable) extensions.
Tags : ema radar, network management, systems, network, management
     HP - Enterprise
By: BLADE Network Technologies     Published Date: Nov 18, 2008
This document describes enterprise virtualization today and the anticipated uses of this technology, particularly leveraging the capabilities provided by widespread adoption of 10 Gigabit Ethernet (10GbE) as a single, converged network fabric.
Tags : blade network technologies, next-generation datacenter networks, virtualization today, 10gbe, network virtualization
     BLADE Network Technologies
By: BLADE Network Technologies     Published Date: Nov 18, 2008
This Technology Brief is divided into two parts. The first part discusses the evolution of Ethernet, and then focuses on 10 Gigabit Ethernet and related transceiver and cabling technologies. The second part examines BLADE’s RackSwitch product line, including 10 GbE applications within enterprise networks and data centers.
Tags : enterprise data centers, blade’s rackswitch, 10gbe applications, enterprise networks, blade network technologies, evolution of ethernet, cabling technologies, storage
     BLADE Network Technologies
By: Focus     Published Date: Aug 04, 2011
Download this white paper, sponsored by Juniper Networks, to read an interview with IDC's Vice President of Enterprise Communications and Datacenter Networks about the future of network architectures.
Tags : data center, data center design, information technology, juniper, networking, traffic spikes, virtualization
     Focus
By: Focus     Published Date: Feb 09, 2011
Discover the primary vendor solutions and decision factors that must be considered when selecting a Unified Threat Management product to provide network defense.
Tags : 
     Focus
By: SAS     Published Date: Apr 20, 2017
Hype and hope — Big Data has generated a lot of both. Thanks to an abundance of enterprise information systems, networks, applications and devices that churn out huge volumes of information, government agencies are awash in Big Data. Add to this data growth the emerging trend of the Internet of Things (IoT) — the network of people, data, things and processes that is increasingly linked through automated connections and sensors — and the future of Big Data can seem quite daunting.
Tags : 
     SAS
By: Adobe     Published Date: May 09, 2011
Forrester recently surveyed 225 Information and Knowledge Management (I&KM) professionals with Web Content Management (WCM) decision-making or influencer roles about their WCM strategies for the coming year.
Tags : adobe, web content management, enterprise application, knowledge management, wcm, analytics, social networking, rich media management
     Adobe
By: Red Hat     Published Date: Jan 20, 2011
In this session, attendees will explore the new features of Red Hat Enterprise Linux 6 performance. John Shakshober (Shak) will share the scalability optimizations for larger SMP systems, > 1TB of memory, new transparent hugepage support, multi-q network performance of 10Gbit and Infiniband, and KVM enhancements that went into Red Hat Enterprise Linux 6. Shak will also share benchmark data from industry standard workloads using common applications such as database servers, Java engines, and various financial applications on the latest Intel and AMD x86_64 hardware.
Tags : red hat, enterprise, linux 6 performance, memory, storage, database servers
     Red Hat
By: Liaison Technologies     Published Date: Aug 15, 2011
This Case Study provides useful lessons for combining e-commerce with cloud computing. See what Liaison Technologies can do for your business...
Tags : gartner, liaison, cloud, cloud computing, fine appers, csb, brokerage, technology
     Liaison Technologies
By: Liaison Technologies     Published Date: Aug 22, 2011
This Case Study provides useful lessons for combining e-commerce with cloud computing. See what Liaison Technologies can do for your business...
Tags : gartner, liaison, cloud, cloud computing, fine appers, csb, brokerage, technology
     Liaison Technologies
By: Citrix Systems     Published Date: Feb 18, 2012
This white paper discusses eight important areas where Citrix NetScaler beats F5 in making enterprise networks cloud ready.
Tags : virtualization, data center, datacenters, consolidate, network, network resources, citrix, netscaler
     Citrix Systems
By: Endace     Published Date: Aug 20, 2012
The status quo in network monitoring is no longer adequate for large organizations. It's simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals.
Tags : endace, technology, white paper, network, network monitoring, network management, networks, reliability
     Endace
By: Infoblox     Published Date: Jun 11, 2012
Companies require products that offload routine functions from the technology staff so that they can focus on more-important tasks. Download this whitepaper to learn what automation can do for you.
Tags : infoblox, time, value, network, network automation, automation, tasks, productivity
     Infoblox
By: Infoblox     Published Date: Jun 11, 2012
The dynamic nature of virtual and private cloud environments cannot be accommodated by an underlying infrastructure that is a static, physical assembly of routers, switches, servers, and firewalls. Find out more in this complimentary white paper
Tags : infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls
     Infoblox
By: Infoblox     Published Date: Jun 11, 2012
Learn why any organization relying on the IT ecosystem enabled by the Internet Protocol - especially those organizations with public-facing content - are at great risk. Get your free complimentary white paper NOW!
Tags : infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls
     Infoblox
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics