RSS feed Get our RSS feed

News by Topic

enterprise network

Results 426 - 450 of 628Sort Results By: Published Date | Title | Company Name
By: Aerohive     Published Date: Oct 23, 2014
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : enterprise networks, aerohive, network structure, wi-fi and networking
     Aerohive
By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: Damballa     Published Date: Oct 03, 2014
Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty
Tags : damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention, security
     Damballa
By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : network protection, it security, firewall, hacker detection, security management
     McAfee
By: McAfee     Published Date: Sep 15, 2014
URL filtering is a type of content filtering that allows or blocks users from accessing specific websites. The practice has become an essential one on enterprise networks, with the goal of blocking employees from accessing content that would be a detriment to their productivity or the company as a whole. Blocked sites may include those that threaten the security of the organization, have objectionable content, or are bandwidth-intensive enough to strain company resources.
Tags : best practices, url filtering, network security, blocked sites, security management
     McAfee
By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : network survival, network security management, best practices, firewalls, hacker detection
     McAfee
By: CDW     Published Date: Sep 10, 2014
Enterprise-critical applications—those which drive the core of an organization—require the highest availability infrastructure to support the most stringent service levels. EMC meets this need with a high performing, functionally capable, and competitively priced high-end networked storage system—the EMC® Symmetrix® VMAX® 20K system with the Enginuity™ operating environment. The VMAX 20K scale-out architecture helps organizations exceed the performance and capacity demands of hyper-consolidation, cloud deployments, and all-virtual Software Defined Data Centers (SDDCs), while simplifying the costs of data management.
Tags : storage
     CDW
By: Juniper Networks     Published Date: Sep 10, 2014
Get insight into the innovative solutions demanded by data center security in IDC’s Whitepaper. Read about the unique challenges enterprises face in securing data centers, and how Juniper Networks security technologies meet these.
Tags : security challenges, data center demand, innovative solutions, security technologies, innovative solutions
     Juniper Networks
By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
     Infoblox
By: Riverbed     Published Date: Sep 05, 2014
Enterprises have been using Cascade® products from Riverbed Technology for many years to discover, monitor and troubleshoot their physical network and application infrastructure. Cascade network performance management (NPM) solution offers a rich set of functionality to understand network and application performance in the context of end-user experience, and to uncover problems in an organization’s physical infrastructure. With enterprises aggressively embracing virtualization, this sea change has brought new visibility gaps in IT infrastructure.
Tags : virtual, enabling, visibility, virtualized, application infrastructure, functionality
     Riverbed
By: CradlePoint     Published Date: Sep 04, 2014
In a world where traditional tethers to the central office have all but vanished, enterprises that operate vehicle fleets require constant and dependable mobile Internet connectivity to keep up. Businesses, organizations, and public agencies with vehicle fleets find productivity gains and improved fleet management by deploying dependable mobile connectivity in vehicles. Additionally, travelers and mass transit commuters now expect constant connectivity, and not just through their mobile phones.
Tags : constant connectivity, dependable mobile connectivity, cradlepoint, mobile phones
     CradlePoint
By: CradlePoint     Published Date: Sep 04, 2014
Every year, the public relations specialists from at least one bluechip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate hit to the company’s reputation, resulting in a loss of brand loyalty, as customers take their business elsewhere. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
Tags : security risks, crisis communications, security breaches, compromising customer data, security
     CradlePoint
By: HP     Published Date: Aug 26, 2014
More and more enterprises are adopting “bring your own device” (BYOD) initiatives to let employees choose the device they use. The HP BYOD solution, based on the HP Intelligent Management Center (IMC), offers a single-pane-of-glass network and user management solution for your entire network. With an HP BYOD solution, you can efficiently manage your entire infrastructure, secure personally owned devices, and monitor BYOD traffic. HP IMC also goes beyond the unified BYOD essentials by delivering converged management across various networks—physical and virtual, wired and wireless, and Software-Defined Networking (SDN). Discover how.
Tags : byod, holistic, data, business, technology, portfolio, cloud-based, support
     HP
By: HP     Published Date: Aug 25, 2014
Integrated computing platforms enable IT to focus on more valuable tasks that will speed time-to-market and improve application deployment and availability to better support the business. HP ConvergedSystem 700x with VMware vSphere is a flexible preconfigured solution designed for small to large enterprise and service provider deployments. Built on HP ProLiant or HP BladeSystem servers, HP StoreServ storage, and HP 5900-Series and HP Flex10 networking. HP ConvergedSystem 700x with VMware vSphere solutions are designed to address virtualization complexity, expedite virtualization deployments, and serve as the foundation for private cloud implementations. Read this whitepaper to learn more about ESG’s analysis of the costs and benefits—and ultimate economic value—associated with deploying and managing HP ConvergedSystem 700x with VMware vSphere versus a comparable conventional data center infrastructure comprised of discrete, nonintegrated compute, storage, network, and management compon
Tags : converged system, economic, enterprise, computing, platforms, deployment, vsphere, application
     HP
By: HP     Published Date: Aug 25, 2014
HP ConvergedSystem 700x with Microsoft Hyper-V is an ideal example of the market transition toward integrated computing platforms. Built on HP’s ConvergedSystem 700x converged infrastructure platform, HP ConvergedSystem 700x with Microsoft Hyper-V is a flexible preconfigured solution designed for small to large enterprise and service provider deployments. The solution is built on HP ProLiant or HP BladeSystem servers, HP 3PAR SAN storage, and HP 5900-Series or HP Flex10 networking. The entire stack is managed through HP Insight Control for System Center, which integrates physical and virtual server management through HP Insight with Microsoft System Center 2012 for unified management and orchestration Read this whitepaper to learn more about ESG’s analysis of the costs and benefits—and ultimate economic value—associated with deploying and managing HP ConvergedSystem 700x with Microsoft Hyper-V, versus a comparable conventional data center infrastructure comprised of discrete, non-integ
Tags : converged system, economic, enterprise, computing, platforms, deployment, vsphere, application
     HP
By: HP     Published Date: Aug 25, 2014
The reference architecture (RA) design described in this paper combines HP ConvergedSystem 700x and Red Hat® Enterprise Virtualization, the open source choice for virtualizing workloads. At its core, the RA provides a foundation for building a high-performance Red Hat Enterprise Virtualization platform that has been optimized to consolidate and provision hundreds to thousands of workloads while providing extremely high availability at all levels – from the underlying network and storage fabrics up to the virtual machine (VM) layer. Pre-configured to meet a range of business needs, HP ConvergedSystem 700x offerings can be easily and rapidly deployed to support a variety of virtualized application environments. HP does all the work, using balanced building blocks of servers, storage, and networking, along with integrated management software and bundled support. Read this technical whitepaper to learn more.
Tags : virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution
     HP
By: Riverbed     Published Date: Aug 22, 2014
Businesses are rapidly adopting virtualization, cloud infrastructure, and SaaS applications broadly across the enterprise to minimize costs and enable seamless collaboration and communication. This is significantly straining the traditional network paradigm. IT organizations globally are faced with the challenge to transform network architectures to deliver the right performance and reliability cost-effectively while retaining control.
Tags : business performance, hybrid networks, virtualization, cloud infrastructure, saas, collaboration, communication
     Riverbed
By: Aerohive Networks     Published Date: Aug 22, 2014
Cloud networking introduces a new way to deploy, operate, & manage distributed enterprise networks. It delivers network capabilities via a cloud infrastructure with minimal capital investment or IT resources. This paper provides details on cloud networking, the state of the cloud market & its benefits.
Tags : cloud networking, enterprise, it resources, deploy, operate, mange, infrastructure
     Aerohive Networks
By: Riverbed     Published Date: Aug 19, 2014
Businesses are rapidly adopting virtualization, cloud infrastructure, and SaaS applications broadly across the enterprise to minimize costs and enable seamless collaboration and communiation. This is significantly straining the traditional network paradigm.
Tags : hybrid, network, transforming, business, collaboration, cloud infrastructure, virtualization, saas
     Riverbed
By: McAfee     Published Date: Aug 14, 2014
Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.
Tags : network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
     McAfee
By: McAfee     Published Date: Aug 14, 2014
What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.
Tags : next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security
     McAfee
By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : enterprise authentication, securing identities, evolving environment, attacks, mobile platforms, user identities, network devices, security
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : identity guard, enterprise, securing identities, corporate network, mobile platforms, security
     Entrust Datacard
By: Citrix     Published Date: Jul 18, 2014
This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.
Tags : citrix, enterprise pc, remote access, remote network management, network architecture, mobile workers, xendesktop
     Citrix
By: XO Communications     Published Date: Jul 17, 2014
MPLS IP-VPN network usage continues to grow and with good reason. MPLS IP-VPN provides secure, reliable, cost-effective and scalable answers for today’s enterprise networking needs.
Tags : cloud-enabled network, mpls ip-vpn, cost-effective, improve disaster, recovery, infrastructure
     XO Communications
Start   Previous    16 17 18 19 20 21 22 23 24 25 26    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics