Networking White Papers

Results 176 - 200 of 2738Sort Results By: Published Date | Title | Company Name
By: New Relic     Published Date: Jun 05, 2014

The majority of IT professionals either don’t know anything about DevOps or just have a general understanding of the big picture. If you fall into either of those categories, this discussion is meant for you. In the following pages, we answer a number of basic questions—questions that probably sound much like your own.

Tags : new relic, devops, configuration management, it professionals, networking, it management
    
By: RF Code     Published Date: May 28, 2014

RF Code helped Digital Fortress identify a failing CRAC unit before it burned out. After 10 days Digital Fortress was able to drop SLA temperatures on the datacenter floor by better than 11 degrees.

Tags : rf code, data center, ethernet, networking, power supply, power and cooling, energy, servers
    
By: RF Code     Published Date: May 28, 2014

As companies continue to absorb the flow of electronic data in astronomical quantities, greater attention is being paid to the infrastructure that holds the data and the escalating costs of its management.

Tags : rf code, asset management, it asset management, data center, servers, racks, power and cooling, energy savings
    
By: Aruba Networks     Published Date: May 22, 2014

Smartphone e tablet sono diventati parte integrante della nostra vita. La #GenMobile, una nuova categoria di persone accomunate dalla preferenza per tutto ciò che è mobile, non e’ costretta alla staticita’ per poter utilizzare le applicazioni lavorative sugli smartphone e tablet. I luoghi di lavoro destinati alla #GenMobile devono essere progettati con sistemi Wi-Fi sicuri e ad alte prestazioni. Di seguito, cinque servizi Wi-Fi essenziali, che garantiscono alla #GenMobile un'esperienza di smartphone e tablet sicura.

Tags : aruba networks, mobile app experience, wi-fi networks, communication apps, video content, collaboration, workplace networks, icloud
    
By: Aruba Networks     Published Date: May 22, 2014

La #GenMobile, con un numero sempre più crescente di dispositivi e app mobili, sta utilizzando le reti Wi-Fi aziendali in modi imprevedibili. App di unified communication come Microsoft Lync gestiscono connessioni voce peer-to-peer e flussi video, l'app fotografica su quasi ogni iPhone si sincronizza automaticamente su iCloud e i flussi di contenuto video sono diventati una parte fondamentale dell'esperienza Internet di tutti gli utenti su tutti i dispositivi. La collaborazione con app mobili richiede una WLAN sufficientemente intelligente da riconoscere Lync da YouTube e gestire tale traffico in modo appropriato. Di seguito, cinque suggerimenti per garantire un'esecuzione perfetta delle app mobili:

Tags : aruba networks, mobile app experience, wi-fi networks, communication apps, video content, collaboration, workplace networks, icloud
    
By: SilverSky     Published Date: May 22, 2014

Who are the current leaders in the business email market? The Radicati Group, a technology market research firm, said SilverSky offers “one of the most secure Cloud Business Email services available in the market today.” When run on IBM SoftLayer, it’s also the most reliable. Read the full report.

Tags : silversky, ibm, email, email services, email service providers, cloud, cloud business email, cloud business email services
    
By: SilverSky     Published Date: May 22, 2014

Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.

Tags : silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention
    
By: SilverSky     Published Date: May 22, 2014

Are you looking for a Microsoft Hosted Exchange Provider? Want to see how the providers in this space stack up? The Radicati Group provides vendor analysis and reveals the Trail Blazers, Specialists, Mature Players and Top Players in this report.

Tags : silversky, ibm, microsoft hosted exchange, microsoft hosted exchange providers, email service providers, cloud, cloud business email providers, cloud business email
    
By: VSS Monitoring     Published Date: May 21, 2014

Learn about how to optimize your networking monitoring for real-world threats and see what your network and security team need to do to stay on top of the game.

Tags : vss monitoring, network monitoring, security, threats, cyber terrorists, security protocols, networking
    
By: VSS Monitoring     Published Date: May 21, 2014

Learn how your organization can properly support packet decryption for security scanning and see how this can protect you from advanced threats and other malicious programs.

Tags : vss monitoring, decryption, security scanning, security, threats, protection, attacks, intrusions
    
By: HP     Published Date: May 21, 2014

The data center landscape is changing quickly, creating new options for IT architecture and physical facility design. When deciding if a containerized or modular solution is the right option for your data center, you need to consider the factors in this guide.

Tags : data center, modular data center, energy, power and cooling, infrastructure, network architecture, server hardware, servers
    
By: General Dynamics Fidelis Cybersecurity     Published Date: May 20, 2014

Join Gigaom Research and our sponsor General Dynamics Fidelis Cybersecurity Solutions for “The Modern Perimeter and More: Countering Advanced Security Threats,” a free analyst on-demand webinar.

Tags : fidelis, internet security, web security, cyber attacks, security threats, hackers, modern security threats, cyber criminals
    
By: BMC Software     Published Date: May 19, 2014

Today’s mature cloud-based ITSM solutions can give you the flexibility and agility you need—without sacrificing security, stability or performance. In this THINKstrategies, Inc. white paper, you’ll learn why businesses are moving to cloud-based ITSM and the advantages they’ve achieved. Explore how this innovative approach to IT management might be right for your organization.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: May 19, 2014

Your people and business can do amazing things when technology runs at its best. The new ITSM experience helps organizations achieve greatness in today’s mobile, social and user-centric reality. Discover a better way for users to access service and support anywhere, anytime. Explore enhanced productivity for IT staff, and seamless integration across IT operation management systems. Download now.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: Hewlett-Packard Company     Published Date: May 15, 2014

HP ProLiant Gen8 servers support automated management and proactive monitoring— and HP is offering financial terms for purchase or lease to SMBs deploying them. For these reasons, HP ProLiant Gen8 servers can play an important role in supporting business continuity and can serve as a key element of business protection programs that are designed to reduce operational costs in today's midsize and large businesses.

Tags : proliant gen8, business continuity, networking, storage, data management
    
By: Entrust     Published Date: May 15, 2014

Multipurpose Smartcards, USB Tokens & Mobile Smart Credentials

Tags : entrust, identityguard, smart credentials, certificate based security, security, pki software, cloud, networking
    
By: Entrust     Published Date: May 15, 2014

Certificate Discovery & Management Solution

Tags : entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
By: Entrust     Published Date: May 15, 2014

Securing Mobile Identities & Devices

Tags : entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
By: Entrust     Published Date: May 15, 2014

Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI). Entrust’s cloud-based PKI service eliminates up-front capital investment and significantly reduces on-going operation cost associated with in-house PKI software, provides built-in maintenance capabilities and speeds deployment time.

Tags : entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
By: Entrust     Published Date: May 15, 2014

The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015. Existing certificates containing non-FQDN names will be revoked by all public CAs by October 1, 2016. Entrust provides a straightforward option that allows the continued use of non-registered names by deploying cost-effective Entrust Private SSL Certificates.

Tags : entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud
    
By: Entrust     Published Date: May 15, 2014

On November 22, 2011, the CA/Browser Forum adopted “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.0” (hereafter referred to as the “BR 1.0”) to take effect on July 1, 2012. This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.

Tags : entrust, non fqdns, certificates, forum changes, publicly trusted certificates, networking, it management
    
By: Entrust     Published Date: May 15, 2014

Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.

Tags : entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud
    
By: Entrust     Published Date: May 15, 2014

Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions. Whether it's a basic SSL certificate, more advanced EV multi-domain SSL certificates, or specialty certificates for secure email, code-signing or Adobe PDFs, Entrust offers a comprehensive portfolio of today's most-used digital certificates. And all are supported by Entrust's world-class service.

Tags : entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
By: Entrust     Published Date: May 15, 2014

To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.

Tags : entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
By: Cloudant, an IBM Company     Published Date: May 15, 2014

Learn how a Cloudant account can be hosted within a multi-tenant Cloudant cluster, or on a single-tenant cluster running on dedicated hardware hosted within a top-tier cloud provider like Rackspace or IBM SoftLayer.

Tags : cloudant, cloud, cloud computing, data layer, dbms, dsaas, saas, data replication
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
242 Documents
Cloud Computing
827 Documents
Colocation and Web Hosting
225 Documents
Content Management
301 Documents
Convergence
255 Documents
Data Center
991 Documents
Data Center Design and Management
548 Documents
Data Management
1504 Documents
Distributed Computing
172 Documents
Enterprise Applications
1438 Documents
Ethernet Networking
180 Documents
Fibre Channel
143 Documents
Gigabit Networking
152 Documents
Governance
202 Documents
Green Computing
280 Documents
Grid Computing
167 Documents
Infrastructure
827 Documents
Internetworking Hardware
211 Documents
Interoperability
206 Documents
IP Networks
335 Documents
IP Telephony
312 Documents
IT Management
1654 Documents
Knowledge Management
647 Documents
Load Balancing
169 Documents
Local Area Networking
224 Documents
Migration
224 Documents
Monitoring
302 Documents
Network Architecture
420 Documents
Network Management
646 Documents
Network Performance
380 Documents
Network Performance Management
379 Documents
Network Provisioning
211 Documents
Network Security
501 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
241 Documents
Quality Of Service
171 Documents
Remote Access
279 Documents
Remote Network Management
237 Documents
Server Hardware
262 Documents
Servers
473 Documents
Small Business Networks
271 Documents
TCP/IP Protocol
175 Documents
Test And Measurement
184 Documents
Traffic Management
185 Documents
Tunneling
141 Documents
Utility Computing
154 Documents
VPN
216 Documents
Wide Area Networks
224 Documents
Wireless
361 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.