RSS feed Get our RSS feed

News by Topic

security infrastructure

Results 401 - 421 of 421Sort Results By: Published Date | Title | Company Name
By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained.
Tags : hp data center, data center, optimization, business strategy, hot spots, mission critical loads”, the it infrastructure, the availability
     HP Data Center
By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
     Ecessa Corporation
By: Trend Micro SaaS     Published Date: Feb 20, 2009
Hosted, or "in-the-cloud", messaging security capabilities are becoming increasingly popular with organizations of all sizes. Some have already adopted hosted services, while others are becoming more receptive to the notion of using third party services to manage their security infrastructure than they were just a year ago. Particularly driven by the current economic recession, decision makers are realizing that hosted email security can provide a cost-effective solution while actually improving security.
Tags : saas, trend, trend micro, software as a service, on-premise, cloud, trendlabs, email security
     Trend Micro SaaS
By: HP Data Center     Published Date: Feb 18, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained. This invariably leads to facility infrastructure problems such as thermal “hot spots”, lack of UPS (uninterruptible power supply) rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy
     HP Data Center
By: Unitek Education     Published Date: Jan 08, 2009
Unitek's CCNA boot camp is taught by a certified industry expert, who is adept at not just CCNA curriculum, but also teaches CCNP and CSP1 (Cisco high-end security track) tracks. The instructor is also a Unitek consultant, and spends a significant portion of his time providing high-end network infrastructure consulting services. A true industry expert!!
Tags : unitek, ccna, ccna boot camp, ccna curriculum, cisco high-end security track, network infrastructure, cisco ccna
     Unitek Education
By: Intermedia     Published Date: Nov 10, 2008
Microsoft Exchange is the leading business email and collaboration solution for the small,up to the large, business markets, and this whitepaper compares the security of Microsoft Exchange Services deployed in-house versus a hosted model with SaaS service providers. By choosing Intermedia as their Hosted Exchange SaaS Solution Provider, businesses can achieve email and total messaging security, as well as a piece of mind, by leveraging Intermedia’s infrastructure and experience with running a secured messaging platform.
Tags : intermedia, email security, logical server security, software as a service, saas, microsoft exchange services, security assessment testing, security
     Intermedia
By: VeriSign Incorp.     Published Date: Oct 15, 2008
Learn about the current trends in Internet fraud, and how VeriSign Inc. is helping organizations protect critical data and instill trust for their customers.
Tags : security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority
     VeriSign Incorp.
By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s web and application infrastructure continues to expand applications for e-commerce, and communications with customers, partners and internal employees. For those responsible for deploying, maintaining and supporting these networked applications, there is an increasing need to get the highest performance out of datacenter equipment, while simplifying the complexity that causes excess overhead and unnecessary costs.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
     KEMP Technologies
By: Tripwire     Published Date: Jul 08, 2008
This paper outlines the nature of infrastructure integrity, change auditing, and compliance solutions. It describes how an investment in configuration assessment and change auditing solutions can stabilize IT operations, lowering the operational costs associated with the IT infrastructure; be a force multiplier; and provide a solid foundation that increases the effectiveness of the investment in information security.
Tags : tripwire, information security, infrastructure, change management, change, change auditing, security
     Tripwire
By: VeriSign Incorp.     Published Date: Jul 02, 2008
Learn about governmental standards and regulations, such as HIPAA and Sarbanes-Oxley, covering data protection and privacy. Then, learn how your enterprise can be compliant utilizing the latest encryption technologies.
Tags : verisign, pci, hipaa, sarbanes-oxley, fisma, gramm-leach-bliley act, state notice of breach laws, security
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Jan 15, 2008
Online visitors are becoming more and more wary about transacting online. One way to provide reassurance that your Web site is reputable and safe is to implement the latest SSL encryption technology on your site. Read this guide to learn about the latest in SSL.
Tags : security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority
     VeriSign Incorp.
By: Solidcore     Published Date: Jan 07, 2008
Identifying critical change control failure points in your infrastructure can help reduce the threat of costly downtime, potential security breaches, and compliance weaknesses. Read this paper for guidelines on how to identify and categorize systems that have characteristics which heighten risk.
Tags : audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, change management
     Solidcore
By: Blue Lane     Published Date: Jan 07, 2008
Quantros’ business—an ASP for the health care industry—requires a secure network and maximal uptime—all with a small IT department and a small budget. Quantros was challenged to implement and enforce sound security policies and to keep up with the continuous stream of vendor patches.
Tags : high availability, server, virtual server, network security, server vulnerability, vulnerability, vulnerabilities, quantros
     Blue Lane
By: WebEx Communications     Published Date: Dec 14, 2007
The purpose of this document is to provide information on the data security features and functions available with WebEx Support Center Remote Support and inherent to the underlying WebEx communication infrastructure known as the WebEx MediaTone™ Network.
Tags : online meetings, web conference, online collaboration, elearning, online classroom, web training, webinar, online demos
     WebEx Communications
By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : lan, lan security, network security, security policies, security policy, policy management, best practices, nevis
     Nevis Networks
By: Nevis Networks     Published Date: Sep 04, 2007
Companies are yearning for a solution to guard their network from security risks such as external or untrusted users, and unmanaged endpoints on their internal LAN. NAC technology works well, but a strategic solution is required to fully address the problem of the dissolving network perimeter.
Tags : lan, local area networking, nac, access control, network security, infrastructure, lan security, nevis
     Nevis Networks
By: Ecora Software     Published Date: Aug 15, 2007
Better preparation means better results – Learn how to prepare for an audit; how to develop a self-audit process; how to develop a security template; and much more.
Tags : security audit, audit, auditing, vulnerability assessment, vulnerability management, infrastructure, patch, patch management
     Ecora Software
By: AirDefense     Published Date: Apr 24, 2007
This paper presents the security risks inherit in wireless networks and explores the technical, functional and return on investment requirements needed for a monitoring solution for companies looking to protect and fortify their wireless networks from rogue wireless devices.
Tags : wlan, wireless security, wireless freeloaders, wireless rogue, rogue, rogues, wireless infrastructure, monitoring
     AirDefense
By: NetIQ Corporation     Published Date: Apr 05, 2007
Learn why organizations need to limit IT administrator power to ensure operational integrity and assure compliance and how to implement robust change control processes and tools with this white paper.
Tags : insider threat, network security, it administrator, comply with regulations, it infrastructure, compliance, change management, it management
     NetIQ Corporation
By: LANDesk     Published Date: Feb 12, 2007
White paper discussing how the LANDesk® Management Gateway in LANDesk® management solutions 8.6, along with LANDesk® Trusted Access™, help organizations extend the enterprise management of remote devices across the Internet without having to "punch holes" in the firewall or compromise the security of such devices or the corporate infrastructure.
Tags : network security, remote access, security, mobile workers, mobile workforce, remote user, remote workers, trusted access
     LANDesk
By: RiskWatch     Published Date: Jan 17, 2007
Risk assessment is the cornerstone of security.  The risk assessment process includes gathering information about the assets of the organizations, including all information assets, and all physical assets.
Tags : risk assessment, compliance assessment, risk management, security, it management, security management, infrastructure, vulnerability
     RiskWatch
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics