Networking White Papers

Results 176 - 200 of 2731Sort Results By: Published Date | Title | Company Name
By: SilverSky     Published Date: May 22, 2014

Who are the current leaders in the business email market? The Radicati Group, a technology market research firm, said SilverSky offers “one of the most secure Cloud Business Email services available in the market today.” When run on IBM SoftLayer, it’s also the most reliable. Read the full report.

Tags : silversky, ibm, email, email services, email service providers, cloud, cloud business email, cloud business email services
    
By: SilverSky     Published Date: May 22, 2014

Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.

Tags : silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention
    
By: SilverSky     Published Date: May 22, 2014

Are you looking for a Microsoft Hosted Exchange Provider? Want to see how the providers in this space stack up? The Radicati Group provides vendor analysis and reveals the Trail Blazers, Specialists, Mature Players and Top Players in this report.

Tags : silversky, ibm, microsoft hosted exchange, microsoft hosted exchange providers, email service providers, cloud, cloud business email providers, cloud business email
    
By: VSS Monitoring     Published Date: May 21, 2014

Learn about how to optimize your networking monitoring for real-world threats and see what your network and security team need to do to stay on top of the game.

Tags : vss monitoring, network monitoring, security, threats, cyber terrorists, security protocols, networking
    
By: VSS Monitoring     Published Date: May 21, 2014

Learn how your organization can properly support packet decryption for security scanning and see how this can protect you from advanced threats and other malicious programs.

Tags : vss monitoring, decryption, security scanning, security, threats, protection, attacks, intrusions
    
By: HP     Published Date: May 21, 2014

The data center landscape is changing quickly, creating new options for IT architecture and physical facility design. When deciding if a containerized or modular solution is the right option for your data center, you need to consider the factors in this guide.

Tags : data center, modular data center, energy, power and cooling, infrastructure, network architecture, server hardware, servers
    
By: General Dynamics Fidelis Cybersecurity     Published Date: May 20, 2014

Join Gigaom Research and our sponsor General Dynamics Fidelis Cybersecurity Solutions for “The Modern Perimeter and More: Countering Advanced Security Threats,” a free analyst on-demand webinar.

Tags : fidelis, internet security, web security, cyber attacks, security threats, hackers, modern security threats, cyber criminals
    
By: BMC Software     Published Date: May 19, 2014

Today’s mature cloud-based ITSM solutions can give you the flexibility and agility you need—without sacrificing security, stability or performance. In this THINKstrategies, Inc. white paper, you’ll learn why businesses are moving to cloud-based ITSM and the advantages they’ve achieved. Explore how this innovative approach to IT management might be right for your organization.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: May 19, 2014

Your people and business can do amazing things when technology runs at its best. The new ITSM experience helps organizations achieve greatness in today’s mobile, social and user-centric reality. Discover a better way for users to access service and support anywhere, anytime. Explore enhanced productivity for IT staff, and seamless integration across IT operation management systems. Download now.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: May 19, 2014

With software as a service (SaaS) you are integrating an external service, hosted by an external party, with your internal systems. The SaaS integration is a matter of connecting the clouds and well-articulated interfaces defining the data that is traveling back and forth. With the right integration strategy SaaS integration can be simple, straightforward, and easy. Moreover, it can position your IT organization to effectively leverage SaaS and migrate from one SaaS solution to another to avoid vendor lock-in. Read this information white paper to understand the things to consider when developing your integration strategy.

Tags : saas, cloud, itsm, integrating itsm, itsm integration, saas integration, networking, it management
    
By: BMC Software     Published Date: May 19, 2014

What happens when you take best practices for IT service management (ITSM), add technology to support those practices, and then throw social media into the mix? BMC explores how best-in-class organizations are leveraging these to drive user satisfaction and organizational success. Download the white paper now.

Tags : it service management, service desk, help desk, saas help desk, cloud help desk, networking, it management
    
By: BMC Software     Published Date: May 19, 2014

Analysts predict that soon, half of all new IT service desk tools will be adopted as cloud-based services. While shifting to an on-demand model can be a complex decision that requires organizations to carefully assess the potential impact on business operations, a growing number of companies are clearly finding the move worthwhile.

Tags : saas, cloud, itsm, integrating itsm, itsm integration, saas integration, networking, it management
    
By: BMC Software     Published Date: May 19, 2014

IT as a Service (ITaaS) will transform future IT operations and service delivery. In the interim, Hybrid IT offers a rational, gradual approach in which some services move to SaaS while others remain on-premise. This white paper provides a strategy to move part or all of your ITSM suite to the cloud as a stepping stone to ITaaS.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: May 19, 2014

IT as a Service (ITaaS) will transform future IT operations and service delivery. In the interim, Hybrid IT offers a rational, gradual approach in which some services move to SaaS while others remain on-premise. This white paper provides a strategy to move part or all of your ITSM suite to the cloud as a stepping stone to ITaaS.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: May 19, 2014

Increasingly, enterprise organizations are moving to the cloud for IT Service Management (ITSM)—but is cloud delivery right for your business? Learn about the changing face of ITSM and gain the perspective needed to make the right ITSM decision for your organization. Get the free white paper from Enterprise Management Associates.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: May 19, 2014

Increasingly, enterprise organizations are moving to the cloud for IT Service Management (ITSM)—but is cloud delivery right for your business? Learn about the changing face of ITSM and gain the perspective needed to make the right ITSM decision for your organization. Get the free white paper from Enterprise Management Associates.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: Hewlett-Packard Company     Published Date: May 15, 2014

HP ProLiant Gen8 servers support automated management and proactive monitoring— and HP is offering financial terms for purchase or lease to SMBs deploying them. For these reasons, HP ProLiant Gen8 servers can play an important role in supporting business continuity and can serve as a key element of business protection programs that are designed to reduce operational costs in today's midsize and large businesses.

Tags : proliant gen8, business continuity, networking, storage, data management
    
By: Entrust     Published Date: May 15, 2014

Multipurpose Smartcards, USB Tokens & Mobile Smart Credentials

Tags : entrust, identityguard, smart credentials, certificate based security, security, pki software, cloud, networking
    
By: Entrust     Published Date: May 15, 2014

Certificate Discovery & Management Solution

Tags : entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
By: Entrust     Published Date: May 15, 2014

Securing Mobile Identities & Devices

Tags : entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
By: Entrust     Published Date: May 15, 2014

Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI). Entrust’s cloud-based PKI service eliminates up-front capital investment and significantly reduces on-going operation cost associated with in-house PKI software, provides built-in maintenance capabilities and speeds deployment time.

Tags : entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
By: Entrust     Published Date: May 15, 2014

The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015. Existing certificates containing non-FQDN names will be revoked by all public CAs by October 1, 2016. Entrust provides a straightforward option that allows the continued use of non-registered names by deploying cost-effective Entrust Private SSL Certificates.

Tags : entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud
    
By: Entrust     Published Date: May 15, 2014

On November 22, 2011, the CA/Browser Forum adopted “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.0” (hereafter referred to as the “BR 1.0”) to take effect on July 1, 2012. This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.

Tags : entrust, non fqdns, certificates, forum changes, publicly trusted certificates, networking, it management
    
By: Entrust     Published Date: May 15, 2014

Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.

Tags : entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud
    
By: Entrust     Published Date: May 15, 2014

Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions. Whether it's a basic SSL certificate, more advanced EV multi-domain SSL certificates, or specialty certificates for secure email, code-signing or Adobe PDFs, Entrust offers a comprehensive portfolio of today's most-used digital certificates. And all are supported by Entrust's world-class service.

Tags : entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
242 Documents
Cloud Computing
827 Documents
Colocation and Web Hosting
225 Documents
Content Management
301 Documents
Convergence
255 Documents
Data Center
991 Documents
Data Center Design and Management
548 Documents
Data Management
1504 Documents
Distributed Computing
172 Documents
Enterprise Applications
1438 Documents
Ethernet Networking
180 Documents
Fibre Channel
143 Documents
Gigabit Networking
152 Documents
Governance
202 Documents
Green Computing
280 Documents
Grid Computing
167 Documents
Infrastructure
827 Documents
Internetworking Hardware
211 Documents
Interoperability
206 Documents
IP Networks
335 Documents
IP Telephony
312 Documents
IT Management
1654 Documents
Knowledge Management
647 Documents
Load Balancing
169 Documents
Local Area Networking
224 Documents
Migration
224 Documents
Monitoring
302 Documents
Network Architecture
420 Documents
Network Management
646 Documents
Network Performance
380 Documents
Network Performance Management
379 Documents
Network Provisioning
211 Documents
Network Security
503 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
241 Documents
Quality Of Service
171 Documents
Remote Access
280 Documents
Remote Network Management
237 Documents
Server Hardware
262 Documents
Servers
473 Documents
Small Business Networks
271 Documents
TCP/IP Protocol
175 Documents
Test And Measurement
184 Documents
Traffic Management
185 Documents
Tunneling
141 Documents
Utility Computing
154 Documents
VPN
216 Documents
Wide Area Networks
224 Documents
Wireless
361 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.