RSS feed Get our RSS feed

News by Topic

network automation

Results 26 - 50 of 134Sort Results By: Published Date | Title | Company Name
By: Avi Networks     Published Date: Mar 17, 2016
A five-year-long quest for software-defined application delivery and services came to a fruitful end for this $4 billion enterprise when they chose Avi Networks and Cisco ACI as part of their move to a next generation data center architecture. Avi Networks represented the perfect complement to the network automation benefits delivered by Cisco ACI at the company.
Tags : avi networks, cisco, aci, application services, software defined application delivery, data center architecture, load balancing
     Avi Networks
By: Network Automation     Published Date: Dec 03, 2008
John Graydon Smith joined the museum as President and CEO in the summer of 2006 with the vision of taking an already great institution to the next level. He wanted to bring a new vitality to the museum, and make it an integral part of the community.
Tags : network automation, children's museum, process automation, automate
     Network Automation
By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : security, enterprise network, firewall, cisco, gartner, magic quadrant
     Cisco
By: Cisco     Published Date: Dec 20, 2018
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what your organization needs and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco® Digital Network Architecture (Cisco DNA™) is your team’s bridge to an intentbased network. It is an open, extensible, software-driven architecture that accelerates and simplifies your enterprise network operations, while lowering costs and reducing your risk. Only Cisco provides a single network fabric that is powered by deep intelligence and integrated security to deliver automation and assurance across your entire organization at scale. Cisco DNA gives IT time back from time-consuming, repetitive network configuration tasks so you can focus on the innovation your business needs. Cisco DNA automation and assurance are built on a Software-Defined Networking (SDN) controller, ri
Tags : 
     Cisco
By: Network Automation     Published Date: Dec 08, 2008
Before turning to AutoMate, nightly processes were performed by running a mish-mash of batch processes manually after work hours. Even though banks typically close at 4 or 5pm, there is a lot that happens at night to get ready for the next business day. A typical night consisted of 1 or 2 persons staying until 10 or 11pm to make sure all the nightly operations, backups, file transmissions, etc. were finished and validated.
Tags : network automation, automate, process automation, elimination of manual process
     Network Automation
By: Infoblox     Published Date: Nov 07, 2013
Failure to meet compliance can result in fines, dangerous network exposure and damage to a company’s reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Tags : infoblox_network_automation, infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri
     Infoblox
By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
     Juniper Networks
By: Qwest Business.     Published Date: Jan 27, 2010
Today's organizations must embrace innovation, achieve a high level of responsiveness and transform customer information and feedback into actionable results.
Tags : qwest business, customer service, feedback, voice and data network infrastructure, telecommunication, crm) and sales force automation, converged ip network infrastructure
     Qwest Business.
By: Cisco     Published Date: Dec 27, 2017
Hyperconvergence has been receiving a tremendous amount of attention because it represents the next step in the evolution of IT resource delivery. This technology takes the idea of integrating compute, storage and networking that started with converged systems design and has improved on those architectures by adding deeper levels of abstraction and automation. Hyperconverged infrastructure (HCI) vendors promise simplified operation and the ability to quickly and easily expand capacity by deploying and launching additional modules; simplicity has been the key selling point for the HCI pioneers. As HCI ventures even deeper into the enterprise and cloud environments, the architectures will need to become more efficient, agile and adaptable to help IT professionals shoulder the burden of rapidly growing data sets and workloads. This report discusses the benefits of HCI and the enhancements that must be made to expand HCI deeper into the mainstream enterprise datacenter.
Tags : 
     Cisco
By: Qualys     Published Date: Jan 08, 2015
Imagine putting first responders on your operational team instantly on alert about new network vulnerabilities – and how to fix them? This capability is called “continuous monitoring” (CM) and a new guide from Qualys shows you how it can dramatically boost security of your network. Learn how CM provides you with an always-on view of potential security holes. The guide explains how using CM is a vital step toward achieving continuous security of your network – the Holy Grail for every network security manager! In the guide, you will learn how to automatically leverage vulnerability scans with CM for stronger security. Continuous Monitoring: A New Approach to Proactively Protecting Your Global Perimeter offers an easy blueprint for using automation to achieve continuous security and compliance. Download the guide now to learn more about CM: Requirements—why CM is vital Scanning—value of continuous vulnerability scans Best Practices—for using CM Benefits—examples of how CM improves se
Tags : continuous monitoring, network security, vulnerability, best practices, security
     Qualys
By: Infoblox     Published Date: Aug 08, 2013
10 compelling reasons for taking another look at the way you manage DNS, DHCP, and IP addresses.
Tags : infoblox _dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns
     Infoblox
By: Infoblox     Published Date: Sep 09, 2014
Active Directory can manage Microsoft tools; but core network services require best-in-class DNS and DHCP management utilities. Learn how Infoblox enhances Microsoft environments by improving visibility and management of DNS, DHCP, and IPAM processes.
Tags : infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns
     Infoblox
By: Emerson Network Power     Published Date: Mar 02, 2011
In this whitepaper, we will explain trends that drive management challenges that data center operators are faced with.
Tags : emerson network power, avocent, data center automation, cloud computing, data center
     Emerson Network Power
By: Evergreen Systems, Inc.     Published Date: Dec 16, 2008
This comprehensive white paper applies automation and ITIL best practices to the data center and reviews current industry trends, server automation energy usage issues and a variety of optimization strategies for data center improvement.  The effects of virtualization are explored in-depth.  Includes detailed sections on increasing operational efficiency using workflow analysis, automating and optimizing server change management, reducing infrastructure complexity and developing security, disaster recovery and business continuity procedures.  Step by step instructions for developing metrics and a business case to justify data center and server automation are included.
Tags : evergreen system, data center automation, data center automation manager, network automation, server automation, server virtualization, itil, data center optimization
     Evergreen Systems, Inc.
By: Comcast Business     Published Date: Feb 06, 2019
Hospitality is a customer-focused industry, with a hotel brand’s reputation and ultimate success dependent on the quality of the experience of its guests. It is no surprise then, that digital transformation efforts within the hospitality sector are focused on technologies that improve the guest experience, from check-in to check-out and everything in between. Today’s travelers are digitally savvy, using their smartphones and mobile devices for a multitude of tasks. They expect a high-quality connection throughout the property and the ability to perform certain tasks from the hotel’s app, such as checking in and choosing their own room. They expect in-room entertainment beyond basic cable and in-room digital devices they can use to order food, book a massage or control the lighting, for example.
Tags : hospitality, hospitality providers, hotel technology, motel technology, guest experience, pos, digital entertainment, wifi
     Comcast Business
By: Comcast Business     Published Date: Feb 06, 2019
Retail has been transformed by technology in multiple ways, from the way customers interact with retailers to how products are offered and acquired. Indeed, the entire shopping experience has been redefined and expanded to enable customers to purchase products anytime, anywhere, with any device, from any number of retailers. Consumers’ changing shopping behaviors and their reliance on technology enables retailers to reach a wider swath of potential buyers, moving well beyond the borders of their physical store locations to new geographies and populations. That said, retailers must understand how to use technology effectively to draw in customers and entice them to purchase, as well as help them improve their operations and enable new, innovative ways to keep customers coming back.
Tags : retail, shopping, retailers, wifi, retail technology, network, technology, digital transformation
     Comcast Business
By: McAfee     Published Date: Aug 14, 2014
Network availability and survivability in the face of an attack requires specific tools and processes. Are you using RBAC, hierarchical policy management and individual domain control? Find out which eight features you must deploy now.
Tags : network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
     McAfee
By: Juniper Networks     Published Date: Feb 18, 2015
In this Webinar, experts from IDC, Shutterstock and Juniper discuss how to transition to network virtualization and look at benefits of SDN and automating their networks.
Tags : juniper networks, network automation
     Juniper Networks
By: ScriptLogic     Published Date: Aug 30, 2010
Small to medium businesses experiencing network downtime can cost as much 3% of annual revenues. It is critical that you have a help desk solution that can help efficiently track, identify and resolve issues as quickly as possible. Help Desk Authority® provides best-of-breed ticket workflows, dashboards and reporting with advanced automation and self-service functions to enable IT to focus on more important issues.
Tags : scriptlogic, help desk authority, lifecycle, optimization, remote support, data tracking
     ScriptLogic
By: McAfee     Published Date: Jan 20, 2015
Network availability and survivability in the face of an attack requires specific tools and processes. Are you using RBAC, hierarchical policy management and individual domain control? Find out which eight features you must deploy now.
Tags : network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation
     McAfee
By: Intel Security     Published Date: Jan 20, 2015
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
     Intel Security
By: McAfee     Published Date: Sep 15, 2014
The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your network firewall team. Resource optimization involves the automation and streamlining of operational processes and management workflows so that your IT team members can be freed up to focus their time, skills, and expertise on priority projects. Furthermore, optimizing your resources helps preserve your budget while eliminating budgetary conflicts and slashing administrative costs.
Tags : network security, it security, firewall, resource optimization, security management
     McAfee
By: Juniper Networks     Published Date: Aug 03, 2017
Massive business innovation is under way worldwide: continuous transformation. IDC research shows how the network plays a key role for organizations around the globe.
Tags : network improvement, automation, network agility, reshaping networking
     Juniper Networks
By: Infoblox     Published Date: Jun 11, 2012
Learn why any organization relying on the IT ecosystem enabled by the Internet Protocol - especially those organizations with public-facing content - are at great risk. Get your free complimentary white paper NOW!
Tags : infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls
     Infoblox
By: Cisco     Published Date: Jun 24, 2015
This paper explores how responsive and programmable infrastructure helps IT leaders succeed.
Tags : sdn, software defined networking, networking, automation, it leaders, infrastructure
     Cisco
Start   Previous    1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics