RSS feed Get our RSS feed

News by Topic

enterprise network

Results 426 - 450 of 628Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Nov 06, 2006
This IBM white paper posits that most enterprises have yet to realize the full value of convergence and explains why the real promise of IP networks lies in converged applications. It goes on to explain how IP convergence can build real business value for today's busy contact centers.
Tags : convergence, communications convergence, ip telephony, ip faxing, networking, network management, infrastructure, voip
     IBM
By: HP     Published Date: Dec 04, 2012
Many enterprises are unable to create business innovation because of aging networking environments.
Tags : enterprises, power of sdn, networking, virtual application, power
     HP
By: Red Hat     Published Date: Feb 22, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we値l walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
     Red Hat
By: Red Hat     Published Date: Feb 22, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we値l walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
     Red Hat
By: Red Hat     Published Date: Feb 25, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we値l walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
     Red Hat
By: Red Hat     Published Date: Feb 25, 2019
As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we値l walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
     Red Hat
By: Red Hat     Published Date: Feb 25, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we値l walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
     Red Hat
By: IBM     Published Date: Jul 07, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : the cloud, mobile, mobility, social, analytics, networks, enterprise network, big data
     IBM
By: IBM     Published Date: Feb 29, 2016
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : ibm, network, cloud, analytics, mobile, social, big data, it security
     IBM
By: IBM     Published Date: Jun 16, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : cloud computing, mobility, big data, business analytics, it security landscape, enterprise networks, cloud integration, virtualization
     IBM
By: IBM     Published Date: Oct 06, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : networks, ibm, redefining networks, cloud, analytics, mobile, social, security
     IBM
By: Jive     Published Date: Feb 12, 2015
Relive this webinar with leading industry analyst Brian Vellmure. Flanked by seasoned CIOs (and Jive customers) Tony McGivern of FICO and Patrick O辿are of Spectrum Health, Brian explores how CIOs are taking the lead in guiding their organizations through a rapidly evolving technology landscape. Topics covered include: Navigating internal politics to overcome technological inertia Choosing infrastructure and platforms that allow rapid technology adoption at scale Shifting focus to exploit a fundamentally different technological landscape Balancing and evolving the role of CIOs from cutting costs to driving business strategy
Tags : enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication
     Jive
By: Singtel     Published Date: Oct 28, 2014
Data connectivity has long been a necessity for enterprises big and small, as has the need to use that connectivity to extend enterprise Local Area Network (LAN) across networks. But the process of building an enterprise Wide Area Network (WAN) is anything but easy.
Tags : singtel, vpn, wan, lan
     Singtel
By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren稚 built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : security, multi-factor authentication, network security risks
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren稚 built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
     Akamai Technologies
By: Citrix     Published Date: Jul 18, 2014
This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.
Tags : citrix, enterprise pc, remote access, remote network management, network architecture, mobile workers, xendesktop
     Citrix
By: Cisco     Published Date: Oct 14, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a next-generation firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise.
Tags : cisco, nfgw, next generation firewall, enterprise management, network visibility, malware activity, malware protection, security solutions
     Cisco
By: Cisco     Published Date: Jan 15, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing cloud, mobility, social, and analytics are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter
     Cisco
By: Cisco     Published Date: Apr 08, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise. An NGFW must be able to: Integrate security functions tightly to provide highly effective threat and advanced malware protection Provide actionable indications of compromise to identify malware activity Offer comprehensive network visibility Help reduce complexity and costs Integrate and interface smoothly and transparently with third-party security solutions Provide investment protection
Tags : next generation, firewall, malware, threat, complexity, costs, visibility, protection
     Cisco
By: Dell EMC     Published Date: Nov 02, 2015
Enterprises with remote or branch offices and small to midsized businesses face very specific infrastructure challenges. Dell PowerEdge VRTX addresses these by providing scalable servers, storage, and networking in a compact, converged, easy-to-manage platform. Here痴 how it brings simplicity, versatility and efficiency to ROBO or SMB environments.
Tags : 
     Dell EMC
By: Darktrace     Published Date: Jun 17, 2019
Darktrace痴 Enterprise Immune System provides Trek with an unprecedented level of visibility into its network and the day-to-day behaviors exhibited by the users and devices within it. Thus, the company has a much improved understanding of its network as a whole. 鄭s a multinational business, it is crucial that we are able to protect the individuality and integrity of our brand, including intellectual property and customer data, said Dane Sandersen, Global Security Director at Trek. 泥arktrace痴 Enterprise Immune System has given us peace of mind that we are wellequipped to defend against today痴 sophisticated attacks.
Tags : 
     Darktrace
By: Riverbed DE     Published Date: Oct 16, 2017
What is the key benefit of SD-WAN? To provide seamless access to digital services for end-users. But IT is more distributed, fragmentary, and dynamic than ever, with hybrid apps, hybrid networks, and remote and mobile users everywhere. Hardware-bound legacy networks can never fulfill the promise of seamless access. Taming the chaos of today痴 IT requires a new approach to networking. This is the promise of software-defined wide area networks (SD-WAN)葉he ability to use plain-language business policies to automate and orchestrate all the components of digital access. Read this white paper to learn how SD-WAN lets you: Manage centrally from a cloud console with a comprehensive view of your connectivity fabric that spans and unifies datacenter/cloud apps, branch/mobile users, and enterprise/cloud networks. Orchestrate globally using business policy-based automation to define quality of service and access privileges for all apps/users. Deploy locally with zero touch via automated
Tags : cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
     Riverbed DE
By: Aerohive     Published Date: Jan 04, 2012
In today's virtual enterprise, access to corporate resources must be secure, reliable, and manageable, with consistently enforced policy while simultaneously allowing access from anywhere at any time. This is why access network strategies are critical to business growth.
Tags : aerohive, branch office, cloud computing, remote networks, vpn, cloud enabled networking, distributed enterprise, cloud security services
     Aerohive
By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps熔ften in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
     Forcepoint
By: Cisco     Published Date: Dec 21, 2016
Today痴 corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
     Cisco
Start   Previous    16 17 18 19 20 21 22 23 24 25 26    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics