Networking White Papers

Results 301 - 325 of 2840Sort Results By: Published Date | Title | Company Name
By: BMC Software     Published Date: May 19, 2014

Analysts predict that soon, half of all new IT service desk tools will be adopted as cloud-based services. While shifting to an on-demand model can be a complex decision that requires organizations to carefully assess the potential impact on business operations, a growing number of companies are clearly finding the move worthwhile.

Tags : saas, cloud, itsm, integrating itsm, itsm integration, saas integration, networking, it management
    
By: BMC Software     Published Date: May 19, 2014

IT as a Service (ITaaS) will transform future IT operations and service delivery. In the interim, Hybrid IT offers a rational, gradual approach in which some services move to SaaS while others remain on-premise. This white paper provides a strategy to move part or all of your ITSM suite to the cloud as a stepping stone to ITaaS.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: May 19, 2014

Increasingly, enterprise organizations are moving to the cloud for IT Service Management (ITSM)—but is cloud delivery right for your business? Learn about the changing face of ITSM and gain the perspective needed to make the right ITSM decision for your organization. Get the free white paper from Enterprise Management Associates.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: Hewlett-Packard Company     Published Date: May 15, 2014

HP ProLiant Gen8 servers support automated management and proactive monitoring— and HP is offering financial terms for purchase or lease to SMBs deploying them. For these reasons, HP ProLiant Gen8 servers can play an important role in supporting business continuity and can serve as a key element of business protection programs that are designed to reduce operational costs in today's midsize and large businesses.

Tags : proliant gen8, business continuity, networking, storage, data management
    
By: Entrust     Published Date: May 15, 2014

Multipurpose Smartcards, USB Tokens & Mobile Smart Credentials

Tags : entrust, identityguard, smart credentials, certificate based security, security, pki software, cloud, networking
    
By: Entrust     Published Date: May 15, 2014

Certificate Discovery & Management Solution

Tags : entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
By: Entrust     Published Date: May 15, 2014

Securing Mobile Identities & Devices

Tags : entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
By: Entrust     Published Date: May 15, 2014

Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI). Entrust’s cloud-based PKI service eliminates up-front capital investment and significantly reduces on-going operation cost associated with in-house PKI software, provides built-in maintenance capabilities and speeds deployment time.

Tags : entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
By: Entrust     Published Date: May 15, 2014

The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015. Existing certificates containing non-FQDN names will be revoked by all public CAs by October 1, 2016. Entrust provides a straightforward option that allows the continued use of non-registered names by deploying cost-effective Entrust Private SSL Certificates.

Tags : entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud
    
By: Entrust     Published Date: May 15, 2014

On November 22, 2011, the CA/Browser Forum adopted “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.0” (hereafter referred to as the “BR 1.0”) to take effect on July 1, 2012. This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.

Tags : entrust, non fqdns, certificates, forum changes, publicly trusted certificates, networking, it management
    
By: Entrust     Published Date: May 15, 2014

Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.

Tags : entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud
    
By: Entrust     Published Date: May 15, 2014

Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions. Whether it's a basic SSL certificate, more advanced EV multi-domain SSL certificates, or specialty certificates for secure email, code-signing or Adobe PDFs, Entrust offers a comprehensive portfolio of today's most-used digital certificates. And all are supported by Entrust's world-class service.

Tags : entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
By: Entrust     Published Date: May 15, 2014

To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.

Tags : entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
By: Cloudant, an IBM Company     Published Date: May 15, 2014

Learn how a Cloudant account can be hosted within a multi-tenant Cloudant cluster, or on a single-tenant cluster running on dedicated hardware hosted within a top-tier cloud provider like Rackspace or IBM SoftLayer.

Tags : cloudant, cloud, cloud computing, data layer, dbms, dsaas, saas, data replication
    
By: EarthLink Business     Published Date: May 15, 2014

This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).

Tags : earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
By: EarthLink Business     Published Date: May 15, 2014

This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.

Tags : earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
    
By: Agile IT     Published Date: May 13, 2014

The American Federation of Government Employees (AFGE) is the largest federal labor union, representing close to 650,000 federal government employees. Since the organization was looking for a cost-effective solution to upgrade its mail system and communication environment, and its users were already familiar with Microsoft programs, the organization looked to migrate to Microsoft Office 365 with the help of Agile IT.

Tags : federal labor union, office 365, agile it, networking, it management, knowledge management, enterprise applications, platforms
    
By: Entrust     Published Date: May 13, 2014

The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.

Tags : entrust, identitityguard, enterprise security, networking, it management
    
By: Citrix     Published Date: May 13, 2014

Not all VDI solutions are alike. To deliver the best results for your business, you need to make sure the solution you choose can enable full productivity not just in the office on traditional endpoints, but anywhere people work, on any device they use. With Citrix XenDesktop, you can provide access to virtualized apps and desktops from anywhere, on any device, with a great experience in any scenario.

Tags : citrix, mobile devices, mobile applications, mobile apps, mobile workers, remote access, remote users, remote network management
    
By: SilverSky     Published Date: May 09, 2014

The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of SilverSky security services for their organizations.

Tags : silversky, economic impact, network security, security solutions, forrester research, security threats, risk-adjusted, productivity
    
By: SilverSky     Published Date: May 09, 2014

This paper discusses how to cost-effectively turn the tables and ultimately win the battle for securing the network. It discusses different options and the methodology for making critical decisions about how to tackle your network security challenges.

Tags : silversky, outsource, network security, the cloud, value proposition, network security solutions, security options, security challenges
    
By: Citrix     Published Date: May 09, 2014

A wide range of business issues is driving IT toward desktop virtualization. One solution—Citrix XenDesktop with FlexCast technology—helps IT teams empower their entire workforces, one project at a time

Tags : citrix, virtualization, desktop virtualization, mobile workers, laptops, xendesktop, mobile, remote access
    
By: SilverSky     Published Date: May 09, 2014

This white paper explores the problems with traditional network setups and ways to address these issues in a budget friendly manner.

Tags : silversky, fortune 500, business security, network security, it management, security products, security systems, log data
    
By: SilverSky     Published Date: May 09, 2014

Watch this webinar to find out how you can best protect your organization.

Tags : silversky, threat landscape, threat report, webinar, plaguing industries, security incidents, security analysts, cloud strategy
    
By: Instartlogic     Published Date: May 08, 2014

Learn how you can boost conversions and deliver high definition experiences with a new approach to web performance.

Tags : higher conversions, web performance, ecommerce, mobile phone, tablet computer, superior web experiences, mobile, online retail
    
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
244 Documents
Cloud Computing
876 Documents
Colocation and Web Hosting
230 Documents
Content Management
298 Documents
Convergence
256 Documents
Data Center
1008 Documents
Data Center Design and Management
560 Documents
Data Management
1561 Documents
Distributed Computing
174 Documents
Enterprise Applications
1500 Documents
Ethernet Networking
180 Documents
Fibre Channel
143 Documents
Gigabit Networking
152 Documents
Governance
201 Documents
Green Computing
277 Documents
Grid Computing
170 Documents
Infrastructure
829 Documents
Internetworking Hardware
210 Documents
Interoperability
206 Documents
IP Networks
329 Documents
IP Telephony
305 Documents
IT Management
1723 Documents
Knowledge Management
654 Documents
Load Balancing
170 Documents
Local Area Networking
224 Documents
Migration
225 Documents
Monitoring
302 Documents
Network Architecture
420 Documents
Network Management
646 Documents
Network Performance
395 Documents
Network Performance Management
385 Documents
Network Provisioning
211 Documents
Network Security
510 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
239 Documents
Quality Of Service
172 Documents
Remote Access
280 Documents
Remote Network Management
236 Documents
Server Hardware
260 Documents
Servers
483 Documents
Small Business Networks
268 Documents
TCP/IP Protocol
173 Documents
Test And Measurement
185 Documents
Traffic Management
185 Documents
Tunneling
141 Documents
Utility Computing
155 Documents
VPN
211 Documents
Wide Area Networks
228 Documents
Wireless
375 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.