Networking White Papers

Results 151 - 175 of 3353Sort Results By: Published Date | Title | Company Name
By: AllClearID     Published Date: Apr 23, 2015

Report | Recommendations for Enterprise Security in 2015

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network security, business continuity, compliance
    
By: AllClearID     Published Date: Apr 23, 2015

Download the report to learn how to prepare an Incident Response Plan that ensures your business recovers quickly and effectively.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network security, anti virus, business continuity
    
By: AllClearID     Published Date: Apr 23, 2015

Use this Incident Response Workbook to begin planning a well-orchestrated response in the event of a data breach. Download the workbook now.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network security, compliance, disaster recovery
    
By: AllClearID     Published Date: Apr 23, 2015

In this complimentary whitepaper, learn how successful organizations are retaining customers, protecting their reputation, and getting back to business after a data breach. Get the report.

Tags : hacking, network security, anti virus, business continuity, disaster recovery, hacker detection, internet security, vulnerability management
    
By: Echosign     Published Date: Apr 23, 2015

With Adobe Document Cloud, HR teams can become more efficient in hiring, onboarding and documentation.

Tags : maximize hr efficiency, adobe document cloud, hr staff, hr documents, send information to candidates, electronic documents, esign, hr personnel
    
By: Echosign     Published Date: Apr 23, 2015

This white paper provides information on the Adobe Extended Service customer care and the advantages of using it for achieving business success.

Tags : esign, adobe extended service offering, adobe document cloud esign, digital sign, adobe solution, e-signatures, customer engagement, customer care
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: Microsoft Dynamics     Published Date: Apr 15, 2015

In this ebook, we tackle the issues facing sales today head on, incorporating changes and developments in the market that your teams need to understand. I’m incredibly excited not only to introduce this brand new ebook, but also the next generation of sales productivity from Microsoft. In the interest of maximizing all of our productivity—let’s get to it!

Tags : always be closing, ms dynamics partners, sales for dummies, how to motivate sales people, how to make more sales, sales success, how to make sales, sales approaches
    
By: IBM     Published Date: Apr 15, 2015

IBM PureApplication System converges compute, storage, networking components, and software into a preconfigured and pretested system. This Forrester paper helps to better understand the benefits, costs, and risks associated with the IBM PureApplication System.

Tags : ibm, cost savings, data storage, analysis, efficiency, convergence, network performance, quality of service
    
By: IBM     Published Date: Apr 15, 2015

What if your organization could take advantage of emerging business opportunities by deploying new applications dramatically faster than you ever could before? What if you could increase the value of your existing application investments by leveraging them in the cloud—and easily move your apps across off-premises and on-premises cloud options? These capabilities are available today. With IBM® PureApplication® solutions, companies can build and use a cloud environment faster, easier and with less risk than traditional methods to better engage with their customers and partners in new ways. The result: increased competitiveness and improved profitability in a changing business landscape. This paper describes a simpler way forward to gain these advantages.

Tags : ibm, business intelligence, applications, cloud computing, migration, application integration, application performance management, design and facilities
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Get the latest mobile devices and apps in the handsof learners and educators quickly and securely with mobile device and app management.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: IBM     Published Date: Apr 15, 2015

Still wondering what all the application monitoring hype is about? Read more to find out all the reasons why you still don't need to monitor your apps, no matter what everyone else says!

Tags : applications, monitoring, ibm, analytics, business intelligence, application performance management, application integration, analytical applications
    
By: IBM     Published Date: Apr 15, 2015

Technology Adoption Analyst whitepaper by Forrester. This IBM-commissioned profile of IT operations decision-makers at enterprise companies in the US, UK and Germany evaluates IT operations analytics adoption, benefits, and challenges based on Forrester’s own market data and a custom study of the same audience.

Tags : ibm, it operations, decision makers, analytics, market analysis, monitoring, business intelligence, business metrics
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Check out our “ABC’s of Mobile Device Management” e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today!

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.

Tags : mobile device security, byod, application security, data security, network security, access control, ssl, secure instant messaging
    
By: IBM     Published Date: Apr 15, 2015

This book helps you understand DevOps and how your organization can gain real business benefits from it. You also discover how a holistic view of DevOps that encompasses the entire software delivery life cycle.

Tags : ibm, devops, cloud computing, best practices, development, operations, software delivery, application integration
    
By: Snowflake     Published Date: Apr 14, 2015

Read about what makes data warehousing as a service different from traditional data warehousing–it’s more than just a data warehouse in the cloud.

Tags : snowflake, data warehousing, cloud computing, best practices, data processing, saas, service oriented architecture, web service management
    
By: Snowflake     Published Date: Apr 14, 2015

Learn why Snowflake is reinventing the data warehouse to meet the changing nature of data and its usage within the enterprise.

Tags : snowflake, data warehouse, cloud computing, big data, best practices, data warehousing, data center design and management
    
By: Cyveillance     Published Date: Apr 10, 2015

In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.

Tags : myths, cyber, threat, intelligence, fact, fiction, big data, cloud
    
By: Cisco     Published Date: Apr 10, 2015

A white paper outlining Cisco’s recommendations on how to modernize the existing E-Rate Program to put high-speed broadband into the hands of every student in America.

Tags : cisco, education, high speed broadband, it infrastructure, it hardware, internet access, network architecture, bandwidth management
    
By: Cisco     Published Date: Apr 10, 2015

Let these case studies show how you can succeed with mobility, too. Pinellas County Integrates Wired and Wireless Networks Cisco Meraki Architecture Construction - C&S Companies Hospital Pioneers Wi-Fi Patient Apps with Cisco BYOD Solution Cisco CMX Connects Evergreen Brickworks Video

Tags : cisco, case study, byod, wireless, wifi, network integration, cmx, bandwidth management
    
By: Cisco     Published Date: Apr 10, 2015

Compare Switches & Get Free Resources Our guides and free service can help you prepare for mobility, advanced security, and simplicity with the new Catalyst switches.

Tags : cisco, catalyst, networks, byod, mobile computing, wifi, bandwidth management, infrastructure
    
By: Cisco     Published Date: Apr 10, 2015

Your users are ready for multigigabit wireless. The real question is: Is your network? Don’t miss this opportunity to get a first-hand look at the solutions you’ll need to achieve data rates that make it easier for your people to share, stay informed, and make smart decisions. • Join hosts Robb, Jimmy Ray, and networking experts as they dive deep into the technical details of delivering exponentially faster 802.11ac Wave 2 access through the current Cat5 cable you already have. • Hear all about Cisco’s founding membership and participation in the NBASE-T Alliance, the team that’s driving the standardization of 2.5 Gb/s and 5 Gb/s Ethernet speeds in campus access. • Discover the access point and switch technology you’ll need to ensure that your wired access layer does not become a stumbling block for your continued mobile growth.

Tags : cisco, techwise, routers, wan, productivity, performance, 802.11ac, wireless
    
By: Cisco     Published Date: Apr 10, 2015

Location-based services (LBS) show promise as a budding customer-centric mobility solution in some early adopting verticals such as retail, hospitality, and large public venues. Such services enable businesses to better understand their customer base through analytics as well as offer targeted, context-based communications including promotions and remote assistance. This IDC white paper explores the burgeoning LBS market, highlighting custom research conducted by IDC in March and April 2014; surveys were fielded to both IT and line-of-business (LOB) decision makers in select verticals and market segments. In this white paper, IDC analyzes the data and explores the attitudes surrounding LBS adoption in the context of broader technology trends.

Tags : cisco, idc, lbs, wireless, wifi, mobility, it solutions, bandwidth management
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
175 Documents
Bandwidth Management
266 Documents
Cloud Computing
1051 Documents
Colocation and Web Hosting
253 Documents
Content Management
321 Documents
Convergence
266 Documents
Data Center
1146 Documents
Data Center Design and Management
654 Documents
Data Management
1914 Documents
Distributed Computing
195 Documents
Enterprise Applications
1873 Documents
Ethernet Networking
190 Documents
Fibre Channel
154 Documents
Gigabit Networking
162 Documents
Governance
206 Documents
Green Computing
296 Documents
Grid Computing
174 Documents
Infrastructure
928 Documents
Internetworking Hardware
240 Documents
Interoperability
219 Documents
IP Networks
336 Documents
IP Telephony
313 Documents
IT Management
2386 Documents
Knowledge Management
947 Documents
Load Balancing
177 Documents
Local Area Networking
233 Documents
Migration
256 Documents
Monitoring
322 Documents
Network Architecture
486 Documents
Network Management
706 Documents
Network Performance
463 Documents
Network Performance Management
438 Documents
Network Provisioning
220 Documents
Network Security
549 Documents
OLAP
142 Documents
Optical Networking
152 Documents
Power and Cooling
267 Documents
Quality Of Service
194 Documents
Remote Access
307 Documents
Remote Network Management
259 Documents
Server Hardware
270 Documents
Servers
508 Documents
Small Business Networks
289 Documents
TCP/IP Protocol
178 Documents
Test And Measurement
199 Documents
Traffic Management
194 Documents
Tunneling
150 Documents
Utility Computing
163 Documents
VPN
220 Documents
Wide Area Networks
240 Documents
Wireless
468 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.