RSS feed Get our RSS feed

News by Topic

net

Results 151 - 175 of 7559Sort Results By: Published Date | Title | Company Name
By: Red Hat     Published Date: Jun 19, 2019
Cloud-native application development is an approach to building and running applications. It speeds time to market by using the cloud computing model, which is based on these key tenets:
Tags : 
     Red Hat
By: Cisco EMEA     Published Date: Jun 19, 2019
Invest in a network that can grow over time, so you can add features and functionality. Make sure your switches and routers are easy to install, use, and manage.
Tags : 
     Cisco EMEA
By: Zscaler     Published Date: Jun 19, 2019
Traditional network security is no longer suitable for the cloud and mobile-first world.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 19, 2019
You can’t impose controls on something you don’t own. And in today’s cloud- and mobile-oriented enterprise, no one truly owns the network. The Internet has become the one network that every corporate worker uses and that no corporate IT can control. The emergence of cloud, ubiquitous networks, smartphones and smart (or dumb) networked devices are wreaking havoc over the traditional command-and-control IT mode of operation. This shift is different from anything we’ve experienced before, because nobody owns the network.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 19, 2019
When’s the last time someone said they liked VPN? The way we work has changed. We access apps from any device, from anywhere, and we expect a fast, seamless experience when we do so. Now, enterprises are able to deliver this, and improve security with cloud services called Zero Trust Network Access (ZTNA) technologies. A modern alternative to VPN.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 19, 2019
Zscaler enables you to shift from a hub-and-spoke architecture to an agile, direct-to-internet architecture by delivering the entire gateway security stack as a service. Take the first step in your transformation journey with Zscaler.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 19, 2019
The purpose of this document is to provide security guidance for routing traffic locally from your branch office locations to enable direct access to the internet and cloud applications. We will outline the five requirements for architecting the ideal solution. But first, let’s discuss why secure local internet breakouts have become necessary.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 19, 2019
Le regole del gioco sono cambiate: le applicazioni stanno ormai migrando verso il cloud e gli utenti possono avere accesso da qualsiasi location senza mai il bisogno di collegarsi al corporate network. E’ quindi indispensabile ripensare l’architettura della sicurezza. Scoprite con questo documento come proteggere i vostri attivi strategici con le nostre funzionalita’ di Data Protection e Cloud DLP.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 19, 2019
Scoprite attraverso questa guida come ridirigere in maniera ottimale il traffico delle vostre filiali, per permmettere un accesso diretto ad internet e alle vostre applicazioni nel cloud. Abbassate i vostri costi, ottenete una visibilita’ completa sul vostro traffico e migliorate l’esperienza dei vostri utenti mettendo in sicurezza le vostre filiali remote.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 19, 2019
Scoprite il nostro rapport semestrale Cloud Security Insights Threat Report 2019 – Uno studio delle minacce basate sui protocolli SSL/TLS, che analizza il traffico criptato nel cloud Zscaler tra luglio e dicembre 2018. Il rapporto, stilato dal nostro team di ricerca ThreatLabZ, si focalizza sulla varieta’ di attacchi via SSL e bloccati da Zscaler, tra cui gli attacchi di phishing, i botnet, malware, etc.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 19, 2019
Il concetto di backhaul verso un data center sembra interessante in un contesto in cui sia gli utenti che le applicazioni risiedono al suo interno. Tuttavia con i dipendenti nelle diverse filiali e le applicazioni che migrano verso il cloud, ridirigere il traffico su una rete a stella offre una pessima esperienza all’utente oltre ad essere costoso e introduce rischi non necessari. La rete SD-WAN rappresenta una soluzione a questo problema. Facilita le connessioni locali all’internet. Zscaler le mette in sicurezza. Scoprite come con questo rapporto.
Tags : 
     Zscaler
By: Mist Systems     Published Date: Jun 19, 2019
Explore the WLAN comparison table to see a side-by-side comparison of Mist, Cisco-Meraki, Aruba, and Cisco. This guide shows key features to consider when upgrading your network architecture, operations, and indoor location analytics.
Tags : 
     Mist Systems
By: Mist Systems     Published Date: Jun 19, 2019
For centuries, new technologies have ushered in entirely new eras of progressive change in all facets of life, and have revolutionized countless industries. The invention of the steam engine brought about the industrial revolution and expanded trade and transportation. Quantum physics was the foundation of the electronics revolution that brought us transistors, TV, radio, and computers. And the Internet has brought about a stunning information and communication revolution, which is still sending shock waves across virtually every industry, and to the very core of our cultures and lifestyles.
Tags : 
     Mist Systems
By: Mist Systems     Published Date: Jun 19, 2019
With a surge of 25,000 devices and counting, Dartmouth College needed its new Wi-Fi to be fast, reliable and as smart as its students. In response, Dartmouth, based in Hanover, N.H., began deploying new campus-wide Wi-Fi from Mist Systems last summer. It expects to complete the project throughout the campus in three to five years, according to Bryan Ward, a network engineer at Dartmouth. The IT department manages the Wi-Fi through a cloudbased wireless LAN and can already see the benefits of better coverage and easier management. But the team faced difficulties when embedding the new system with Dartmouth's centuries-old campus architecture, which is less supportive of campus-wide Wi-Fi than modern architecture. The following interview has been edited for length and clarity.
Tags : 
     Mist Systems
By: Mist Systems     Published Date: Jun 19, 2019
Today’s digital classrooms need amazing wireless networks that are predictable, reliable and measurable. By choosing the Mist Learning WLAN, Guilford College graduated to a modern cloud platform that uses AI to automate daily Wi-Fi operations, simplify troubleshooting, and most importantly ensure every student has a great mobile experience.
Tags : 
     Mist Systems
By: MuleSoft     Published Date: Jun 18, 2019
More and more financial institutions are partnering with fintechs and leveraging Application Program Interfaces (APIs) to attract new prospects and to delight current consumers through unprecedented Customer Experience (CX). APIs offer a bridge between systems while paving a digital path to a connected financial ecosystem. The institutions that are able to drive this digital transformation successfully, do not think of these capabilities as additional channels and services. Rather, these institutions understand that they must move from a vision of banking as a physical network of branches and ATMs, to a digital platform, comprising core capabilities such as account servicing and the provision of financial products that can be accessed wherever, and whenever, customers wish. Join this webinar and learn how these institutions are building a digital banking platform with APIs. Presented by: Angie Campos, Industry Marketing for FS&I, MuleSoft Michel Vaja, Head of UK Payments Practice, C
Tags : 
     MuleSoft
By: MuleSoft     Published Date: Jun 18, 2019
ABB leads one of the most complex industries on the planet; one that is under intense transformation. They are succeeding by using digital technology to fast track their supply chain and manufacturing process. Watch this webinar to learn how ABB is accelerating digital transformation through an API strategy with MuleSoft. Key takeaways How ABB leverages reusability and automation to streamline their complex manufacturing processes. Why MuleSoft's C4E (Center for Enablement) is a perfect fit for ABB. How ABB drives digital innovation through the adoption of API-led connectivity. Presented by: Szymon Myslinski, Global IT Department Manager for Innovation, ABB Gabriel Rauchenbichler, DACH Marketing Lead, MuleSoft
Tags : 
     MuleSoft
By: Intel     Published Date: Jun 18, 2019
A Forrester Consulting Thought Leadership Spotlight Commissioned By Intel
Tags : 
     Intel
By: Intel     Published Date: Jun 18, 2019
This paper examines centralized and distributed network architecture intelligence splits and identifies areas where Intel® Silicon Photonics can meet demanding bandwidth requirements
Tags : 
     Intel
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
According to the 2018 Global DNS Performance Benchmark Report, the state of DNS resiliency among enterprises and top SaaS providers is poor, with 60% relying on a single source for their authoritative nameservers. In this article, we’ll explore the necessity of having a secondary DNS service.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Container platforms such as Kubernetes and RedHat OpenShift combine with agile development methodologies to speed up application development and deployment. By allowing developers to break applications up into smaller components (also known as microservices), containers can help reduce dependencies, allow component-level scaling, and encourage rapid release lifecycles.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
By focusing on frequent code integration, automated testing, and keeping the mainline code version in a state that is deployable to production at any time, CI/CD aims to eliminate the risks and friction of traditional waterfall software development. Add to that the practice of continuous deployment and you can move to a situation where the latest and greatest software version is not just always ready to be deployed—it’s deployed on a frequent basis.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Digital innovation has changed everything: the money is everywhere, so every business is a potential target for fraud. Banks and financial institutions used to be the primary targets of fraud. Why banks? To quote the notorious American bank robber Willie Sutton, “because that’s where the money is.” While banks remain firmly in the crosshairs of fraudsters, the avalanche of digital business innovation has changed everything. Since the money is everywhere, every business is a potential target for fraud. The same technology that helps us find airfare deals, sweet concert seats, or the best prices on the hottest Jordan shoes– that is, bots–can now be used by criminals. Fraudsters employ automated, faceless bots that scour business apps looking for any opportunity to profit. And since fraud targets business-process weaknesses and not just software vulnerabilities, you may not even know when it is happening.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) – such as customers’ credit card details, user account passwords, corporate sales and payroll data, etc. – before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
     F5 Networks Singapore Pte Ltd
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics