RSS feed Get our RSS feed

News by Topic

network operations

Results 51 - 75 of 158Sort Results By: Published Date | Title | Company Name
By: Datastax     Published Date: May 14, 2018
"What’s In The Report? The Forrester Graph Database Vendor Landscape discusses the expanding graph uses cases, new and emerging graph solutions, the two approaches to graph, how graph databases are able to provide penetrating insights using deep data relationships, and the top 10 graph vendors in the market today Download The Report If You: -Want to know how graph databases work to provide quick, deep, actionable insights that help with everything from fraud to personalization to go-to-market acceleration, without having to write code or spend operating budget on data scientists. -Learn the new graph uses cases, including 360-degree views, fraud detection, recommendation engines, and social networking. -Learn about the top 10 graph databases and why DSE Graph continues to gain momentum with customers who like its ability to scale out in multi-data-center, multi-cloud, and hybrid environments, as well as visual operations, search, and advanced security."
Tags : 
     Datastax
By: Dell Storage     Published Date: Jan 16, 2009
Storage area networks (SAN) deliver consolidated storage and advanced storage management features. One advanced SAN configuration involves booting servers directly from the SAN, eliminating all locally attached storage, and improving server operations. Several server boot options are available. To select the right boot option for your environment, you should weigh the benefits and drawbacks of each.
Tags : dell, san, storage area networks, consolidated storage, storage management, san configuration, server operations, storage
     Dell Storage
By: Easynet     Published Date: Mar 26, 2008
Professional services firms need network services that can connect international operations reliably, flexibly, cost-effectively and securely. This Executive Brief highlights the major business and technology trends taking place in the professional services sector in Western Europe, focusing on the increasing internationalization of the industry and the advantages of adopting innovative ICT solutions.
Tags : compliance, security, vpn, professional services, communication, managed networks, easynet
     Easynet
By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
     Ecessa Corporation
By: Emulex Corporation     Published Date: Nov 07, 2013
Having 100% accurate network visibility is a looming requirement for avoiding substantial financial losses. Why? And how can you get it? You can’t manage and protect what you can’t see. But while many hundreds of network monitoring tools exist, organizations today know surprisingly little about the traffic on their mission-critical, high-speed networks. It takes them so long to fix network problems that the business suffers while the seconds, minutes, and hours of downtime accumulate. Download this Whitepaper for more information.
Tags : network monitoring, network visibility, technology, endace, best practices
     Emulex Corporation
By: Endace     Published Date: Nov 02, 2012
Having 100% accurate network visibility is a looming requirement for avoiding substantial financial losses. Why? And how can you get it?
Tags : endace, network, monitoring, tools, saving, operations
     Endace
By: Endace     Published Date: Dec 28, 2012
Having 100% accurate network visibility is a looming requirement for avoiding substantial financial losses. Why? And how can you get it? Read on this white paper to learn more about "seeing" and saving.
Tags : endace, network, monitoring, tools, saving, operations
     Endace
By: ExtraHop     Published Date: Apr 03, 2013
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers. Get yours today!
Tags : it operational intelligence, application performance management, application performance monitoring, application monitoring, network performance management, network performance monitoring, network monitoring, infrastructure performance monitoring
     ExtraHop
By: Extreme Networks     Published Date: Sep 17, 2014
In this eBook, we will demonstrate specific use cases for how a business intelligence solution can be used effectively by IT operations.
Tags : extreme networks, purview, application analytics, wifi/wireless, network solutions, business intelligence solutions, business intelligence, it operations
     Extreme Networks
By: F5 Networks     Published Date: Mar 18, 2015
Read this whitepaper to learn how applications are driving new requirements for both businesses and networks that require disruptive, radical change.
Tags : f5 networks, sdn, network operations, cloud apps, server applications
     F5 Networks
By: F5 Networks Inc     Published Date: Dec 11, 2015
CIOs want harmony. Security directors loathe point products. Networks operations won’t buy into anything new. Stakeholders can get the harmony they need around DDoS mitigation by extending the F5 Application Delivery Controller into a hybrid solution: on-premises with a new cloud component.
Tags : software-defined networking, sdn, programability, cloud computing, mobility, it solutions, apps, cio
     F5 Networks Inc
By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What you can’t see will hurt you The situation is critical, because the percentage of encrypted user traffic has more than doubled since 2014, exceeding 80 percent, according to F5 Labs' 2017 TLS Telemetry report. So, of course, now there are SSL visibility solutions that provide decryption services allowing those security controls to see what they’re doing. But visibility, by itself, isn’t enough. Security teams and network operations have found that setting up decryption zones is not easy. Security teams often have to resort to manual daisy-chaining or tedious configuration to manage decryption/encryption across the entire security stack. And then they find that exceptions abound. And lastly, you need to scan your inbound and outbound traffic for tomorrow’s threats, and SSL Orchestrator is the tool that lets your security controls keep your organization’s name out of the papers and away from those pesky GDPR fines. Download the eBook to find out how you can gain visibility into e
Tags : 
     F5 Networks Singapore Pte Ltd
By: Forcepoint     Published Date: Jun 06, 2019
Unlike traditional network architectures, software-defined wide-area networking (SD-WAN) makes it possible to harness existing network technology to better align operations and business policies. While many companies identify a need to evolve to SD-WAN, they are not always convinced SD-WAN can deliver the necessary enterprise capabilities. Join us for a webinar with Link-Connect to learn how they use Forcepoint NGFWs to deliver enterprise-class SD-WAN to manage more than 400 sites from a single management console. In this webcast, learn how Forcepoint NGFW: Simplifies operations. Management is easier with central management, visibility and hierarchical policies. Saves investment dollars. Smarter use of capacity and the ability to visualize and prioritize traffic reduces connectivity costs. Boosts business outcomes. Optimized capacity, increased security and ensured high availability
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
In a recent study, IDC analyzed the business value and benefits of supporting network operations with Forcepoint NGFW solutions. The research included interviews with eight organizations relying upon Forcepoint’s NGFW to connect and protect their networks and business operations. IDC created a model based upon their analysis to identify the costs and real benefits of deploying Forcepoint NGFW. The highlights of this analytical model are captured in their Business Value Snapshot; and the complete results are available for download now in the IDC Quantifying the Operational and Security Results of Switching to Forcepoint NGFW Whitepaper. Download the Snapshot now Download the IDC Whitepaper now to learn how the eight organizations surveyed realized improved efficiency, availability and security with Forcepoint NGFW, as well as a return of cost in only seven months and an average 5-year ROI of 510%.
Tags : 
     Forcepoint
By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : forescout, counteract, compliance, independent, assesment, network, access, control
     ForeScout
By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
     Fortinet EMEA
By: Fujitsu     Published Date: Feb 06, 2017
Data center infrastructure complexity must be tamed, as mobility, cloud networking and social media demand fast and agile approaches to data delivery. You can overcome these obstacles and improve your data center operations by consolidating your systems and deploying virtualization, using the Fujitsu PRIMEFLEX vShape reference architecture. Get the e-Book.
Tags : it infrastructure, data consolidation, data virtualization, converged infrastructure, primeflex vshape
     Fujitsu
By: Gigamon     Published Date: Oct 19, 2017
Register for the Enterprise Strategy Group’s Research Insights Paper, Understanding the State of Network Security Today to learn more about the challenges, changes, best practices and solution requirements for network security operations and tools. See why ESG recommends improving network visibility and reducing security vulnerabilities by consolidating tools through a platform-based approach to visibility in which data, analytics and reports from multiple tools are aggregated and consumed in one control panel. Download to learn more.
Tags : 
     Gigamon
By: Gigamon     Published Date: Oct 19, 2017
The IDC Technology Spotlight, The Growing Need for New Technology and a Business Model in Network Monitoring, examines the stresses in today's mobile network planning and operations requiring a new model that incorporates a realistic approach toward cloudification. The paper also looks at the Gigamon solution for visibility in today’s mobile network, which facilitates efforts toward cloudification. This architecture provides maximum, centralized control to the mobile operator’s network planning and operations teams. Read to learn more.
Tags : 
     Gigamon
By: Gigamon     Published Date: Dec 13, 2018
Perimeter-based solutions for network security do not work, leading to tool sprawl and performance issues. Read CSO Magazine’s interview with Gigamon CISO, Simon Gibson, to learn why a new, more intelligent approach is needed to build resilience into technology operations. “Security Should Be an Enabler” talks about an architectural approach that distributes only relevant data to appropriate tools, enabling an adaptable, simplified model at a reduced cost. Read now.
Tags : 
     Gigamon
By: Gigamon     Published Date: Dec 13, 2018
Read "Understanding the State of Network Security Today" to learn why ESG recommends consolidating security tools through a structured, platform-based approach. Data, analytics and reports from multiple tools can be aggregated and consumed in one control panel, reducing network vulnerabilities. Learn more about challenges, changes and best practices for today’s network security operations and tools. Read now.
Tags : 
     Gigamon
By: Gigamon     Published Date: Mar 26, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 10, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
     Gigamon
By: Gigamon     Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.
Tags : 
     Gigamon
By: Gigamon     Published Date: Sep 03, 2019
Your organization depends on all kinds of inline tools to keep your network up and running, but those same tools can fail, leaving you vulnerable. Moreover, as network speeds increase, slower tools can bottleneck network traffic, making organizations purchase more and more tools, which then introduce complexity and cost. There is a better way to increase network resiliency while reducing security issues, and that’s inline bypass.
Tags : 
     Gigamon
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics