Networking White Papers

Results 176 - 200 of 2838Sort Results By: Published Date | Title | Company Name
By: Brocade Communications Systems     Published Date: Aug 21, 2014

As organizations move to cloud-based architectures and IT models, their highly virtualized data centers often encounter underlying limitations. Traditional network architectures often prevent them from achieving cloud computing’s true potential for performance, availability, automation, optimization, and efficiency. In order to bring the promise of virtualization to fruition, the underlying infrastructure–especially the network–must evolve. New topology-agnostic Ethernet fabrics are an innovative approach specifically designed for virtualized data center environments.

Tags : ethernet, data center, limitations, performance, availability, automation, optimization, efficiency
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

This Market Spotlight considers how a datacenter network fabric can provide a foundation for the automated provisioning, configuration, and ongoing management of network-based services in the era of virtualization, cloud, and agile IT computing.

Tags : ethernet, datacenter, network automation, configuration, cloud, it computing, networking, data center
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

IT Agility: How Do You Stack Up?

Tags : agility, stack, network, technology, networking, it management
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

Top 3 network challenges limiting IT agility and how to overcome these challenges.

Tags : network, challenges, it agility, overcome, networking
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

Watch this On-Demand Webinar to learn about business impact from IT agility and data center network automation.

Tags : it agility, business, impact, network, data center, networking
    
By: Fireblade     Published Date: Aug 21, 2014

Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.

Tags : fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack
    
By: Intel     Published Date: Aug 19, 2014

Purpose-built for use with the dynamic computing resources available from Amazon Web Services ™ the Intel Lustre* solution provides the fast, massively scalable storage software needed to accelerate performance, even on complex workloads. Download now to learn more.

Tags : intel, cloud, cloud computing, data center, virtualization, infrastructure, storage virtualization, server virtualization
    
By: Intel     Published Date: Aug 19, 2014

Around the world and across all industries, high-performance computing is being used to solve today’s most important and demanding problems. More than ever, storage solutions that deliver high sustained throughput are vital for powering HPC and Big Data workloads.

Tags : intel, data center, big data, hadoop, cloud, lustre, hpc, infrastructure
    
By: bitglass     Published Date: Aug 19, 2014

In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.

Tags : bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
    
By: FORTRUST     Published Date: Aug 19, 2014

This white paper examines several of the major criteria to use in geographic data center site selection, and provides an overview of the FORTRUST facility as it relates to those criteria.

Tags : fortrust, data center, data center hosting, storage, backup, racks, blades, web hosting
    
By: BMC Software     Published Date: Aug 18, 2014

IT as a Service (ITaaS) will transform future IT operations and service delivery. In the interim, Hybrid IT offers a rational, gradual approach in which some services move to SaaS while others remain on-premise. This white paper provides a strategy to move part or all of your ITSM suite to the cloud as a stepping stone to ITaaS.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: Aug 18, 2014

Increasingly, enterprise organizations are moving to the cloud for IT Service Management (ITSM)—but is cloud delivery right for your business? Learn about the changing face of ITSM and gain the perspective needed to make the right ITSM decision for your organization. Get the free white paper from Enterprise Management Associates.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: Aug 18, 2014

IT is embracing this new world of consumerized technology with a focus on its own employees as internal customers. Explore how customer-first policies can make use of social, mobile and cloud technologies to give workers the freedom and flexibility they desire to drive company productivity.

Tags : customer, cloud technology, internal, productivity, networking, it management, customer relationship management, customer satisfaction
    
By: McAfee     Published Date: Aug 15, 2014

À medida que a tecnologia de firewall de próxima geração (NGFW, next-generation firewall) se populariza, é necessário analisar as funções e os recursos avançados que separam os “líderes” dos “atrasados”. Nos termos mais básicos, o consenso sobre a definição do NGFW incluiria as seguintes capacidades: recursos de firewall padrão como conversão de endereços de rede e inspeção com monitoramento de estado, prevenção de intrusões integrada, reconhecimento de aplicativos e algum nível de inteligência e integração com bancos de dados de vulnerabilidades e reputações.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, aet, ngfw
    
By: McAfee     Published Date: Aug 15, 2014

As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, aet, ngfw
    
By: McAfee     Published Date: Aug 14, 2014

Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.

Tags : network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
By: McAfee     Published Date: Aug 14, 2014

When done right, a next generation firewall with plug-and-play capabilities can typically be up and running within a few minutes. Find out how you can quickly deploy hundreds of firewalls remotely with the latest NGFW.

Tags : plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
By: McAfee     Published Date: Aug 14, 2014

What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.

Tags : next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.

Tags : sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

See how this next generation firewall performed in real-life. ESG Lab puts the McAfee NGFW through the paces in this recent report.

Tags : esg, esg lab, firewall evaluation, firewall lab report, firewall test, next generation firewall, mcafee ngfw, security
    
By: ClickSoftware     Published Date: Aug 13, 2014

This report looks into how context aware services are changing the way consumers interact with businesses.

Tags : context aware services, mobile experience, smartphone trends, tracking mobile activity, mobile computing, mobile data systems, mobile workers, workforce management
    
By: ClickSoftware     Published Date: Aug 13, 2014

This paper highlights the how field service performance and timely issue resolution impacts customer experience and details how Best-in-Class organizations are creating an environment centered on delivering exceptional customer service.

Tags : optimize field service, the imapct of customer service, cloud, mobile computing, mobile data systems, mobile workers, customer relationship management, customer satisfaction
    
By: ClickSoftware     Published Date: Aug 13, 2014

This paper focuses on how mobile apps from ClickSoftware can help engage and connect your field techs.

Tags : engaging field techs, mobile workforce management, mobile app engagement, timesaving tools, mobile computing, mobile data systems, mobile workers, employee performance
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
244 Documents
Cloud Computing
876 Documents
Colocation and Web Hosting
230 Documents
Content Management
298 Documents
Convergence
255 Documents
Data Center
1003 Documents
Data Center Design and Management
561 Documents
Data Management
1552 Documents
Distributed Computing
174 Documents
Enterprise Applications
1486 Documents
Ethernet Networking
180 Documents
Fibre Channel
143 Documents
Gigabit Networking
152 Documents
Governance
201 Documents
Green Computing
277 Documents
Grid Computing
170 Documents
Infrastructure
829 Documents
Internetworking Hardware
210 Documents
Interoperability
206 Documents
IP Networks
329 Documents
IP Telephony
305 Documents
IT Management
1708 Documents
Knowledge Management
652 Documents
Load Balancing
170 Documents
Local Area Networking
224 Documents
Migration
225 Documents
Monitoring
302 Documents
Network Architecture
420 Documents
Network Management
646 Documents
Network Performance
395 Documents
Network Performance Management
385 Documents
Network Provisioning
211 Documents
Network Security
511 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
239 Documents
Quality Of Service
172 Documents
Remote Access
280 Documents
Remote Network Management
236 Documents
Server Hardware
260 Documents
Servers
484 Documents
Small Business Networks
269 Documents
TCP/IP Protocol
173 Documents
Test And Measurement
185 Documents
Traffic Management
185 Documents
Tunneling
141 Documents
Utility Computing
155 Documents
VPN
211 Documents
Wide Area Networks
228 Documents
Wireless
375 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.