Networking White Papers

Results 26 - 50 of 2801Sort Results By: Published Date | Title | Company Name
By: Plex Systems     Published Date: Aug 15, 2014

The right ERP systems contains ease-of-use and value for manufacturers by providing consistent design and security features, reduced burden of manual data entry and simpfiled communications with other systems, partners and devices.

Tags : erp systems, security, manufacturing, communications. data entry, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

The Plex Manufacturing Cloud is providing a revolutionary approach to ERP upgrades by using a continuous update process that is unique to cloud-only software. Remove the need to do manually ERP uprgrades that are disruptive to an orgranization and can cost millions of dollars.

Tags : erp, cloud software, manufacturing, revolutionary approach, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

There are a number of benefits beyond total cost of ownership to deploy cloud ERP, including increased flexibility, deployment, busines continuity and usability. Plex was in the Cloud before Cloud was cool - helping manufacturers run their business from the shop floor to the top floor.

Tags : erp, cloud, cloud erp, manufacturers, flexibility, total cost, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

If your current ERP isn't doing the job for you now, its not likely going to do so in the future. If you are a manufacturer that is not running your operations on a modern , technology-enabled, fully functional ERP solution, you are probably feeling the pain of inefficiencies and you are not optimizing your business.

Tags : erp systems, security, manufacturing, communications. data entry, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

There has been no shortage of high profile recalls over the past several years. Suppliers are being required to provide more robust quality management systems, provide better real-time visablity into manufacturing data, and may even be held accountable for additional charge-back and warranty claims. Take a next generation approach to quality management.

Tags : networking
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, network security, application security, web service security
    
By: McAfee     Published Date: Aug 15, 2014

À medida que a tecnologia de firewall de próxima geração (NGFW, next-generation firewall) se populariza, é necessário analisar as funções e os recursos avançados que separam os “líderes” dos “atrasados”. Nos termos mais básicos, o consenso sobre a definição do NGFW incluiria as seguintes capacidades: recursos de firewall padrão como conversão de endereços de rede e inspeção com monitoramento de estado, prevenção de intrusões integrada, reconhecimento de aplicativos e algum nível de inteligência e integração com bancos de dados de vulnerabilidades e reputações.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, aet, ngfw
    
By: McAfee     Published Date: Aug 15, 2014

As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, aet, ngfw
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.

Tags : business and productivity, byod policies, mobile software, mobile computing, mobile data systems, mobile workers, application integration, application performance management
    
By: Box     Published Date: Aug 15, 2014

This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.

Tags : business and productivity, byod policies, mobile software, mobile computing, mobile data systems, mobile workers, productivity, cloud computing
    
By: McAfee     Published Date: Aug 14, 2014

Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.

Tags : network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
By: McAfee     Published Date: Aug 14, 2014

When done right, a next generation firewall with plug-and-play capabilities can typically be up and running within a few minutes. Find out how you can quickly deploy hundreds of firewalls remotely with the latest NGFW.

Tags : plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
By: McAfee     Published Date: Aug 14, 2014

What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.

Tags : next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.

Tags : sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

See how this next generation firewall performed in real-life. ESG Lab puts the McAfee NGFW through the paces in this recent report.

Tags : esg, esg lab, firewall evaluation, firewall lab report, firewall test, next generation firewall, mcafee ngfw, security
    
By: Box     Published Date: Aug 13, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: HP     Published Date: Aug 12, 2014

HP's Peter Mansell, reveals why HP decided to build CloudSystem around open standards and APIs, and Freeform Dynamics' Dale Vile, who explains how you can avoid building yourself into a silo.

Tags : cloudsystem, avoid building yourself into a silo, cloud migration, cloud administration, backup and recovery, network attached storage, storage management, application integration
    
By: OnX     Published Date: Aug 07, 2014

Learn about SDN and the 5 key steps to identify the right adoption strategy.

Tags : software defined networking, sdn, network architecture, network management, network performance, network performance management, network provisioning, networking
    
By: Nuage Networks     Published Date: Aug 05, 2014

Your clients and end users want instant access to their chosen applications — anytime, anywhere. To meet this demand, you have undoubtedly investigated cloud services. You know that with cloud services you should be able to turn up applications very quickly. You also expect cloud services will help you simplify operations and control costs. However, for cloud services to meet your expectations, the networks within and across datacenters must evolve to become as virtualized and readily available as the server and storage infrastructure. Download here to learn more!

Tags : nuage, datacenter, networking, access, cloud, storage
    
By: VSS Monitoring     Published Date: Aug 01, 2014

Learn how to leverage a big data model in the network monitoring domain and see how IT is shifting away from the long-term viability of the existing network monitoring model.

Tags : networking, big data, network monitoring, optimization, data center, monitoring
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
243 Documents
Cloud Computing
856 Documents
Colocation and Web Hosting
231 Documents
Content Management
299 Documents
Convergence
255 Documents
Data Center
998 Documents
Data Center Design and Management
561 Documents
Data Management
1520 Documents
Distributed Computing
173 Documents
Enterprise Applications
1453 Documents
Ethernet Networking
180 Documents
Fibre Channel
143 Documents
Gigabit Networking
152 Documents
Governance
202 Documents
Green Computing
281 Documents
Grid Computing
167 Documents
Infrastructure
831 Documents
Internetworking Hardware
210 Documents
Interoperability
206 Documents
IP Networks
329 Documents
IP Telephony
305 Documents
IT Management
1691 Documents
Knowledge Management
650 Documents
Load Balancing
170 Documents
Local Area Networking
224 Documents
Migration
224 Documents
Monitoring
302 Documents
Network Architecture
420 Documents
Network Management
647 Documents
Network Performance
390 Documents
Network Performance Management
384 Documents
Network Provisioning
211 Documents
Network Security
511 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
242 Documents
Quality Of Service
171 Documents
Remote Access
279 Documents
Remote Network Management
236 Documents
Server Hardware
260 Documents
Servers
488 Documents
Small Business Networks
269 Documents
TCP/IP Protocol
173 Documents
Test And Measurement
185 Documents
Traffic Management
185 Documents
Tunneling
141 Documents
Utility Computing
155 Documents
VPN
211 Documents
Wide Area Networks
228 Documents
Wireless
363 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.