Networking White Papers

Results 26 - 50 of 2801Sort Results By: Published Date | Title | Company Name
By: Brocade Communications Systems     Published Date: Aug 21, 2014

The security of your campus network is essential to managing your organization's risk - and unlike the networking infrastructure of third-part service providers, the responsibility for campus network security falls primarily on your own organization. This report explains why security for your campus network is essential, and outlines three straightforward ways that you can improve it.

Tags : security, campus network, network, infrastructure, risk, service providers, networking, it management
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

This white paper explores today's campus networking environment: its operational shortcomings and potential to address knowledge workers' growing needs. IT managers need to look to their near- and midterm future needs in terms of how a software-defined network architecture can provide incremental value to their IT and network infrastructure; why it is likely to be the foundation of next-generation enterprise networking solutions; the importance of open technologies and protocols such as OpenFlow; and how SDN will help better manage physical and virtual network resources to deliver a better application experience.

Tags : enterprise, campus network, sdn it, virtual, network architecture, networking, security, it management
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

For the last two years, Software-Defined Networking (SDN) has been the hottest topic in networking. There is tremendous interest in SDN on the part of vendors and a wide range of user groups including hyper-scale data center providers, service providers and enterprises of all types and sizes. While most of the discussion of SDN focuses on its use in the data center, The 2013 Guide to Network Virtualization and SDN1 highlights the fact that enterprise IT organizations are interested in deploying SDN broadly throughout their environment, including in their WAN and campus networks.

Tags : security, hyper-scale, sdn, campus networks, wan, networking, it management
    
By: Vision Solutions     Published Date: Aug 21, 2014

A report on research findings into the state of resilience and methods used companies to ensure their strength.

Tags : data management strategies, data protection, system migrations, data safeguarding, backup and recovery, clustering, business continuity, disaster recovery
    
By: Global Knowledge     Published Date: Aug 19, 2014

The process of subnetting is both a mathematical process and a network design process. Mathematics drives how subnets are calculated, identified, and assigned. The network design and requirements of the organization drive how many subnets are needed and how many hosts an individual subnet needs to support.

Tags : subnetting, broadcast domains, network design process, ip networks, ip telephony, wireless infrastructure
    
By: Global Knowledge     Published Date: Aug 19, 2014

This white paper explains how you can obtain the skills for troubleshooting Cisco networks, which requires mastery of several basic steps and much practice before applying the skills effectively in a production environment. This document does not contain any troubleshooting cases or examples because that is not how troubleshooting skills are learned.

Tags : troubleshooting techniques, network baseline, network diagrams, network maintenance, network management, network performance, network performance management
    
By: bitglass     Published Date: Aug 19, 2014

In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.

Tags : bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
    
By: BMC Software     Published Date: Aug 18, 2014

IT as a Service (ITaaS) will transform future IT operations and service delivery. In the interim, Hybrid IT offers a rational, gradual approach in which some services move to SaaS while others remain on-premise. This white paper provides a strategy to move part or all of your ITSM suite to the cloud as a stepping stone to ITaaS.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: Aug 18, 2014

Increasingly, enterprise organizations are moving to the cloud for IT Service Management (ITSM)—but is cloud delivery right for your business? Learn about the changing face of ITSM and gain the perspective needed to make the right ITSM decision for your organization. Get the free white paper from Enterprise Management Associates.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: Aug 18, 2014

IT is embracing this new world of consumerized technology with a focus on its own employees as internal customers. Explore how customer-first policies can make use of social, mobile and cloud technologies to give workers the freedom and flexibility they desire to drive company productivity.

Tags : customer, cloud technology, internal, productivity, networking, it management, customer relationship management, customer satisfaction
    
By: Plex Systems     Published Date: Aug 15, 2014

There’s a disconnect in the way most software companies, even cloud-based SaaS companies, license their systems. And it is all about the concept of "seats" or use licenses. Learn how the Plex Manufacturing Cloud licensing model paves the way for your success with unlimited seats.

Tags : cloud, software, cloud manufacturing, saas, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

The right ERP systems contains ease-of-use and value for manufacturers by providing consistent design and security features, reduced burden of manual data entry and simpfiled communications with other systems, partners and devices.

Tags : erp systems, security, manufacturing, communications. data entry, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

The Plex Manufacturing Cloud is providing a revolutionary approach to ERP upgrades by using a continuous update process that is unique to cloud-only software. Remove the need to do manually ERP uprgrades that are disruptive to an orgranization and can cost millions of dollars.

Tags : erp, cloud software, manufacturing, revolutionary approach, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

There are a number of benefits beyond total cost of ownership to deploy cloud ERP, including increased flexibility, deployment, busines continuity and usability. Plex was in the Cloud before Cloud was cool - helping manufacturers run their business from the shop floor to the top floor.

Tags : erp, cloud, cloud erp, manufacturers, flexibility, total cost, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

If your current ERP isn't doing the job for you now, its not likely going to do so in the future. If you are a manufacturer that is not running your operations on a modern , technology-enabled, fully functional ERP solution, you are probably feeling the pain of inefficiencies and you are not optimizing your business.

Tags : erp systems, security, manufacturing, communications. data entry, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

There has been no shortage of high profile recalls over the past several years. Suppliers are being required to provide more robust quality management systems, provide better real-time visablity into manufacturing data, and may even be held accountable for additional charge-back and warranty claims. Take a next generation approach to quality management.

Tags : networking
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, network security, application security, web service security
    
By: McAfee     Published Date: Aug 15, 2014

À medida que a tecnologia de firewall de próxima geração (NGFW, next-generation firewall) se populariza, é necessário analisar as funções e os recursos avançados que separam os “líderes” dos “atrasados”. Nos termos mais básicos, o consenso sobre a definição do NGFW incluiria as seguintes capacidades: recursos de firewall padrão como conversão de endereços de rede e inspeção com monitoramento de estado, prevenção de intrusões integrada, reconhecimento de aplicativos e algum nível de inteligência e integração com bancos de dados de vulnerabilidades e reputações.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, aet, ngfw
    
By: McAfee     Published Date: Aug 15, 2014

As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, aet, ngfw
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.

Tags : business and productivity, byod policies, mobile software, mobile computing, mobile data systems, mobile workers, application integration, application performance management
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
243 Documents
Cloud Computing
856 Documents
Colocation and Web Hosting
231 Documents
Content Management
299 Documents
Convergence
255 Documents
Data Center
998 Documents
Data Center Design and Management
560 Documents
Data Management
1520 Documents
Distributed Computing
172 Documents
Enterprise Applications
1453 Documents
Ethernet Networking
180 Documents
Fibre Channel
143 Documents
Gigabit Networking
152 Documents
Governance
202 Documents
Green Computing
281 Documents
Grid Computing
167 Documents
Infrastructure
831 Documents
Internetworking Hardware
210 Documents
Interoperability
206 Documents
IP Networks
329 Documents
IP Telephony
305 Documents
IT Management
1691 Documents
Knowledge Management
650 Documents
Load Balancing
170 Documents
Local Area Networking
224 Documents
Migration
225 Documents
Monitoring
301 Documents
Network Architecture
420 Documents
Network Management
647 Documents
Network Performance
390 Documents
Network Performance Management
384 Documents
Network Provisioning
211 Documents
Network Security
511 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
242 Documents
Quality Of Service
171 Documents
Remote Access
279 Documents
Remote Network Management
236 Documents
Server Hardware
260 Documents
Servers
488 Documents
Small Business Networks
269 Documents
TCP/IP Protocol
173 Documents
Test And Measurement
185 Documents
Traffic Management
185 Documents
Tunneling
141 Documents
Utility Computing
155 Documents
VPN
211 Documents
Wide Area Networks
228 Documents
Wireless
363 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.