RSS feed Get our RSS feed

News by Topic

network app

Results 1 - 25 of 988Sort Results By: Published Date | Title | Company Name
By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
     OKTA
By: Apstra     Published Date: Aug 19, 2019
AOS delivers powerful, intent-driven automation of network services in vendor-agnostic environments by delivering it as an easily consumable service in response to consumer-specified intent. Network devices serve packets, AOS services serve application workloads. According to numerous studies, 70-80% of outages are due to configuration change applied to a living system, and not due to initial deployment. Initial, one-time deployment can be seen as sort of a “hello world” application; the real complexities arise as the system evolves. With AOS, configuration, telemetry, and expectations are derived from the single source of truth - the intent - in an idempotent fashion, and as such there is no implementation difference between initial deployment or change management.
Tags : 
     Apstra
By: iboss     Published Date: Jan 22, 2018
While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.
Tags : iboss, device security, intrusion, network security
     iboss
By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security
     Limelight
By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : pad, mine, enabling, secure, personal, mobile, device, use
     ForeScout
By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
     Gigamon
By: Focus     Published Date: Nov 15, 2011
When it's time to expand your network, this guide will help you evaluate the needs of your organization and enable you to provide best performance for mission-critical applications.
Tags : network, infrastructure, best practices, mission critial, applications, network, scale
     Focus
By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: Riverbed     Published Date: Jan 28, 2014
Riverbed Cascade provides enterprise-wide network and application visibility with a full set of application-centric, site-centric, and business-centric views. While Cascade can coexist or integrate with a variety of other IT management solutions, it will likely become your first line of defense against application performance problems.
Tags : application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring, network performance troubleshooting
     Riverbed
By: Riverbed     Published Date: Apr 03, 2014
Learn how Riverbed® Cascade® gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.
Tags : riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization
     Riverbed
By: Riverbed     Published Date: Sep 05, 2014
If you work on a network operations team, you know how increasingly hard it is to understand and ensure application performance for your end users. You need visibility into areas where issues may occur – end-user devices, network and infrastructure – in order to identify and diagnose problems quickly and minimize downtime. But it hasn’t been easy to gain this level of visibility across the WAN or hybrid network without deploying additional probes, packet capture devices or remote site technicians. Blind spots are everywhere making it difficult to focus on managing and monitoring the applications that matter the most to your business. And when nearly 50% of a network’s traffic is web-based and it all looks the same to the network, identifying your important applications and staying ahead of their performance problem is more difficult than ever. That could mean inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. Who wants that?
Tags : application, network, performance, nirvana, visibility, infrastructure
     Riverbed
By: Palo Alto Networks     Published Date: Dec 11, 2013
The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. In this free booklet, you'll find an insight and practical advice on: - Considerations for choosing your next firewall - Best practices for implementing safe application enablement policies - Essential firewall capabilities for battling modern threats
Tags : firewall, palo alto, security, network security, safe applications, cyber threats
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : palo alto, firewall, applications, ssl, ssh
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : firewall, optimization, security risks, business, devices, employees, technology
     Palo Alto Networks
By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security
     Limelight Networks
By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
     Viavi Solutions
By: Emulex Corporation     Published Date: Nov 07, 2013
Flying blind at 100G It might go something like this: Your company is a voracious consumer of bandwidth – perhaps a very large enterprise, a research lab, or a service or content provider of some description. Today you are running multiple 10Gbps network connections in the core of your network, but these links are rapidly approaching capacity. An upgrade in the not-too-distant future to 40/100G ultra-high-speed links now looks inevitable.
Tags : network monitoring, network visibility, technology, endace, best practices
     Emulex Corporation
By: Polycom     Published Date: Jun 08, 2016
"There are many ways to take advantage of the rich set of collaboration tools provided by Microsoft Skype for Business. IT leaders should consider a cap-and-grow Skype for Business strategy and then think through how it can be leveraged as a replacement technology. Digest this white paper by leading UC analyst Zeus Kerravala for insight on the 14 best practices for a Skype for Business Enterprise Voice deployment. Enabling IM and presence first, expanding desktop applications, and more are details in this informative piece. "
Tags : business optimization, business strategy, network management, business applications, best practices, business process management, productivity
     Polycom
By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
     McAfee
By: Avi Networks     Published Date: Mar 24, 2016
This buyer’s guide for load balancers is based on research, best practices, and conversations with network administrators and IT operations teams at over 110 Global 2000 enterprises. It presents guidelines for choosing application services that mirror the needs of modern data centers and public cloud initiatives. The guide is organized in sections, starting with a pre-assessment of your current application delivery capabilities. With data gathered from your pre-assessment, you can review the considerations involved in creating a software-defined application services strategy; identify opportunities to improve automation of application services and operations. Finally, use the software-defined application services checklist at the end of the guide to identify key priorities in your choice of application service solutions for your enterprise.
Tags : avi networks, best practices, application services, modern data centers, public cloud initiatives, load balancer, load balancing, application delivery
     Avi Networks
By: Anaplan     Published Date: Apr 02, 2019
57% of supply chain professionals believe there is room for improvement in supply chain visibility. Today, organizations are under pressure to increase the agility of their supply chain to be able to plan, monitor, and respond to ever-changing market conditions. By connecting data, people, plans, and networks across the enterprise, your business’ supply chain can enable true visibility, improve margins, and drive down costs. The vision of a tightly integrated and truly connected supply chain can be achieved, but it doesn’t happen overnight. Download the white paper to learn the three steps companies can take to evolve their supply chain maturity.
Tags : 
     Anaplan
By: Anaplan     Published Date: Apr 09, 2019
57% of supply chain professionals believe there is room for improvement in supply chain visibility. Today, organizations are under pressure to increase the agility of their supply chain to be able to plan, monitor, and respond to ever-changing market conditions. By connecting data, people, plans, and networks across the enterprise, your business’ supply chain can enable true visibility, improve margins, and drive down costs. The vision of a tightly integrated and truly connected supply chain can be achieved, but it doesn’t happen overnight. Download the white paper to learn the three steps companies can take to evolve their supply chain maturity.
Tags : 
     Anaplan
By: Anaplan     Published Date: Sep 07, 2018
57% of supply chain professionals believe there is room for improvement in supply chain visibility. Today, organizations are under pressure to increase the agility of their supply chain to be able to plan, monitor, and respond to ever-changing market conditions. By connecting data, people, plans, and networks across the enterprise, your business’ supply chain can enable true visibility, improve margins, and drive down costs. The vision of a tightly integrated and truly connected supply chain can be achieved, but it doesn’t happen overnight. Download the white paper to learn the three steps companies can take to evolve their supply chain maturity.
Tags : 
     Anaplan
By: Anaplan     Published Date: Mar 12, 2019
57% of supply chain professionals believe there is room for improvement in supply chain visibility. Today, organizations are under pressure to increase the agility of their supply chain to be able to plan, monitor, and respond to ever-changing market conditions. By connecting data, people, plans, and networks across the enterprise, your business’ supply chain can enable true visibility, improve margins, and drive down costs. The vision of a tightly integrated and truly connected supply chain can be achieved, but it doesn’t happen overnight. Download the white paper to learn the three steps companies can take to evolve their supply chain maturity.
Tags : 
     Anaplan
By: Anaplan     Published Date: Mar 12, 2019
57% of supply chain professionals believe there is room for improvement in supply chain visibility. Today, organizations are under pressure to increase the agility of their supply chain to be able to plan, monitor, and respond to ever-changing market conditions. By connecting data, people, plans, and networks across the enterprise, your business’ supply chain can enable true visibility, improve margins, and drive down costs. The vision of a tightly integrated and truly connected supply chain can be achieved, but it doesn’t happen overnight. Download the white paper to learn the three steps companies can take to evolve their supply chain maturity.
Tags : 
     Anaplan
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics