RSS feed Get our RSS feed

News by Topic

enterprise network

Results 576 - 600 of 628Sort Results By: Published Date | Title | Company Name
By: uberVU via HootSuite     Published Date: Oct 10, 2012
Find out how to use our Facebook Timeline best practices to help your organization build an effective social media strategy, strengthen relationships with your brand's community and see your ROI on your Facebook campaign.
Tags : social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, facebook strategies
     uberVU via HootSuite
By: uberVU via HootSuite     Published Date: Oct 10, 2012
HootSuite's latest whitepaper, 8 Tips for Social Business, will illuminate the correct process by which organizations can successfully implement a successful and scalable social media strategy.
Tags : social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, emerging marketing
     uberVU via HootSuite
By: uberVU via HootSuite     Published Date: Oct 10, 2012
This paper will introduce you to the necessary steps you should take to employ HootSuite social media best practices.
Tags : social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, emerging marketing
     uberVU via HootSuite
By: uberVU via HootSuite     Published Date: Apr 23, 2013
If you want to influence the online conversation about your company, you need dedicated brand advocates who can participate in social media on your behalf. Advocates are invested in your success, aligned with your objectives and willing to defend your company. But where can you find them? Don’t look far. Your best potential social advocates are actually your own employees.
Tags : social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, social media marketing
     uberVU via HootSuite
By: uberVU via HootSuite     Published Date: Apr 23, 2013
Today’s B2B buyers are socially sophisticated and informed. Do you have the tactics, tools and training to leverage social media for sales success? Find out how to use social media to relate to customers, identify opportunities for engagement, establish credibility, and stay visible and valuable at every stage of the purchase process.
Tags : social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, social media marketing
     uberVU via HootSuite
By: CDW     Published Date: Sep 10, 2014
Enterprise-critical applications—those which drive the core of an organization—require the highest availability infrastructure to support the most stringent service levels. EMC meets this need with a high performing, functionally capable, and competitively priced high-end networked storage system—the EMC® Symmetrix® VMAX® 20K system with the Enginuity™ operating environment. The VMAX 20K scale-out architecture helps organizations exceed the performance and capacity demands of hyper-consolidation, cloud deployments, and all-virtual Software Defined Data Centers (SDDCs), while simplifying the costs of data management.
Tags : storage
     CDW
By: CDW     Published Date: Jan 07, 2015
Learn how optimizing your campus network solutions will transform the student body by allowing students to seamlessly surf the web, but also communicate with each other in a more fluid manner.
Tags : enterprise, networking, architecture, customer, technology, wireless, telephony systems, collaboration
     CDW
By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: CDW     Published Date: Feb 27, 2015
Bank of Ireland is a leading retail and commercial bank. Snow has helped Bank of Ireland streamline and optimize its software licensing.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: HP     Published Date: Dec 04, 2012
IDC forecasts the worldwide enterprise network equipment market will reach $42.6 billion in revenue in 2012.
Tags : bussiness value, unified, mobility, video, reduced costs, availability
     HP
By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance
     Arbor
By: Juniper Networks     Published Date: Sep 10, 2014
Get insight into the innovative solutions demanded by data center security in IDC’s Whitepaper. Read about the unique challenges enterprises face in securing data centers, and how Juniper Networks security technologies meet these.
Tags : security challenges, data center demand, innovative solutions, security technologies, innovative solutions
     Juniper Networks
By: Oracle     Published Date: Nov 08, 2017
Webcast on why choose Oracle Cloud solutions
Tags : oracle. database. cloud, enterprise, network, quality assurance, storage management, servers
     Oracle
By: Cisco     Published Date: Sep 15, 2015
The role of the CIO has changed more in the past five years than any other position in the business world. IT success used to be measured on IT metrics such as uptime and performance of the infrastructure. Today, the goals of the IT leader are aligned with the goals of the business, causing IT to be redefined on all levels.
Tags : iot, datacenter, aci, enterprise, networking
     Cisco
By: Cisco     Published Date: Sep 15, 2015
Vendors Have White-Box Switch Hardware As Part Of Their Portfolio White boxes are another name for switches built from off-the-shelf components. All the traditional vendors have been offering white-box switches for a long time, and customers can reduce their raw costs by incorporating those switches.
Tags : datacenter, aci, enterprise, networking
     Cisco
By: Cisco     Published Date: Sep 15, 2015
New business demands and technology trends are changing the role of IT and introducing new challenges to application availability that yesterday’s data centers were not designed to address. By upgrading to Cisco Nexus® switches—purpose-built for today’s data center needs—you can: ? Increase performance and scalability to meet the demands of virtualization, cloud computing, and modern enterprise applications ? Radically simplify management and operations ? Quickly adapt infrastructure to align the data center network with the needs of your business applications, today and in the future
Tags : applications, systems integration, cloud, development
     Cisco
By: Cisco     Published Date: Feb 23, 2016
Cisco vision for the internet is one that is entering into the next generation. Connecting enterprises through rapid adoption of digital infrastructure: 5X faster than electricity and telephony. The agenda includes: Understanding the Connected Factory and its benefits to the organization's overall profitability, case studies: reducing costs, increasing quality, and maximizing productivity, the building blocks of an IoT network: unique design considerations for environments with rigid requirements.
Tags : technology, digital infrastructure, productivity, networks
     Cisco
By: GENBAND     Published Date: Apr 01, 2014
See how GENBAND offers CIOs of large multi-site enterprises effective ways to reduce telecom spend by leveraging their IP data networks for inter-site, intra-enterprise multimedia communication and consolidation of connectivity to service providers.
Tags : genband, enterprise, telecom, ip data networks, service provider networks
     GENBAND
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
     Globalscape
By: Riverbed     Published Date: Feb 26, 2015
Applications are the life of any enterprise and key enablers of workforce productivity and business agility. But, the application landscape is changing rapidly - the number and type of applications is increasing, the move to cloud and SaaS for application delivery is growing, bandwidth costs are decreasing and the reliability of the Internet has improved. Inevitably, there are also changes in network and infrastructure topologies. The hybrid enterprise has become a reality. The hybrid enterprise has become a standard. Join us March 10th as noted industry analyst Rick Villars of IDC, leads a discussion with Zeeshan Sabir, Qualcomm, and Riverbed’s Hansang Bae about the changing face of IT.
Tags : saas, cloud, bandwith, webcast, riverbed
     Riverbed
By: Riverbed     Published Date: Mar 04, 2015
Applications are the life of any enterprise and key enablers of workforce productivity and business agility. But, the application landscape is changing rapidly - the number and type of applications is increasing, the move to cloud and SaaS for application delivery is growing, bandwidth costs are decreasing and the reliability of the Internet has improved. Inevitably, there are also changes in network and infrastructure topologies.
Tags : saas, cloud, bandwith, webcast, riverbed
     Riverbed
By: Riverbed     Published Date: Mar 04, 2015
Applications are the life of any enterprise and key enablers of workforce productivity and business agility. But, the application landscape is changing rapidly - the number and type of applications is increasing, the move to cloud and SaaS for application delivery is growing, bandwidth costs are decreasing and the reliability of the Internet has improved. Inevitably, there are also changes in network and infrastructure topologies. The hybrid enterprise has become a reality. The hybrid enterprise has become a standard.
Tags : 
     Riverbed
By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
     McAfee
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics