Networking White Papers

Results 301 - 325 of 3490Sort Results By: Published Date | Title | Company Name
By: CDW     Published Date: Mar 31, 2015

As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.

Tags : wireless, infrastructure, wi-fi, mobile computing, byod, upgrade, networking, it management
By: CDW     Published Date: Mar 31, 2015

A new Cisco Systems infrastructure provides Spencer-East Brookfield Regional School District with a robust, scalable foundation for future technology initiatives. Read this case study to find out how the district could effectively demonstrate the value that a smart IT investment could provide to its educational mission.

Tags : network, wifi, infrastructure, scaling, technology, value, networking, it management
By: HP     Published Date: Mar 31, 2015

When was the last time you thought about your disaster recovery plan? Natural disasters, such as earthquakes, tsunamis, hurricanes, fires, or floods can occur anytime and disable your data center, with little to no warning. Hacker activities like a denial of service attack can also take down your systems unexpectedly. Then you have the more mundane risks such as human error and hardware or software failures. The only predictable thing to say about these risks is that at some point, on some scale, you’ll have to recover your data center from downtime. When it comes to disaster readiness, proactive planning is the key to success. Every business, regardless of size, needs to have a well-tested disaster recovery plan in place. Every minute your systems are down, the financial implications grow. Take the assessment to see where your disaster recovery plan ranks. Then learn about next steps and more information.

Tags : disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness
By: Code42     Published Date: Mar 31, 2015

There’s no doubt consumer-grade sync and share solutions are convenient, but it’s the risk they introduce to the enterprise that keeps IT leaders up at night. And it’s not without a price: unintentional data compromises cause financial hardship—nearly $2 billion, according to the study—and reputational damage for businesses and their customers. Luckily, there is such a thing as “enterprise-grade” sync and share, meeting IT teams’ needs for solutions that combine corporate-level security and management capabilities with the ease-of-use employees demand. But what really constitutes an enterprise-grade sync and share solution? To get a second glance from enterprise IT, sync and share solutions must, at a minimum, include the basic business feature sets: security, integrations, roles and permissions, audit trails, remote wipe, comprehensive APIs, real-time administration, bandwidth controls and de-duplication.

Tags : sync, fss, file share, data compromises, integrations, bandwith controls, security, networking
By: Dell     Published Date: Mar 30, 2015

Dell has teamed with Intel to create innovative solutions that can accelerate the research, diagnosis and treatment of diseases through personalized medicine. The combination of leading-edge Intel® processors and the systems and storage expertise from Dell create a state-of-the-art solution that is easy to install, manage and expand as required. Download to learn more.

Tags : dell, intel, genomics, research, data analysis, gdap, servers, blade servers
By: Server Technology     Published Date: Mar 30, 2015

Learn how the latest “All-in-1” family of HDOT Switched PRO2 PDUS from Server Technology addresses the power needs of people implementing converged and hyperconverged systems in their datacenter.

Tags : server technology, converged power, hyperconverged power, blade servers, power and cooling, data center design and management, infrastructure
By: OpenText     Published Date: Mar 27, 2015

When you have a global workforce, you need them to be able to work anytime, anywhere, no matter the type of project, so why restrict them to on-site applications only? Understanding what it takes to be more competitive, we’ve built OpenText Exceed VA TurboX to help you speed up your time to market and enable your global 24 x 7 workforce, all while helping you make better use of your computing resources through centralization.

Tags : opentext exceed va turbox, remote access, productivity, resources, networking, it management, knowledge management
By: OpenText     Published Date: Mar 27, 2015

Join Solutions Consultant expert, Erick Marroquin, as he looks at the enterprise and IT developments that have arisen since Exceed onDemand’s last release in 2011. He discusses how the changing landscape of the global workforce, the rising demand for compliance and intellectual property protection, and the critical need for organizations to be more competitive have inspired the new features of Exceed VA TurboX. Watch the webinar to understand: The basic differences between Exceed onDemand and our new Exceed VA TurboX solutions How Exceed VA TurboX’s unique features can improve performance from an end-user and administrative perspective How Exceed VA TurboX can extend your reach for remote UNIX/Linux application access and support your centralization initiatives

Tags : exceed ondemand, exceed va turbox, remote access, intellectual property protection, networking, security, it management, knowledge management
By: OpenText     Published Date: Mar 27, 2015

In this webinar, Product Manager Mark Wevers, teaches you about Exceed VA TurboX’s new web-based access portal, which provides centralized, managed access to all of your virtual desktops and applications. This webinar will cover both the end user and administrator experience, and will include topics such as: Launching and managing applications from the user dashboard Managing users, profiles, and security settings as an administrator Reporting and logging features System maintenance

Tags : access portal, user experience, exceed va turbox, applications, users, security settings, networking, security
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.

Tags : endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security
By: CDW-Trend Micro     Published Date: Mar 26, 2015

In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.

Tags : endpoint security, data security, endpoint protection, enterprise protection, technology, networking, security, it management
By: CDW-Trend Micro     Published Date: Mar 26, 2015

New business models and employee work styles are adding pressure on existing endpoint security strategies. A recent survey shows most companies are dissatisfied with current approaches to endpoint security. As a result, most companies are eyeing vendor changes in the coming year. Download this infographic to learn more.

Tags : endpoint security, security policy, mobile devices, networking, security, it management
By: CDW-Trend Micro     Published Date: Mar 26, 2015

As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.

Tags : cloud, date security, cloud security, virtualization, security, networking, it management
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Traditional security solutions can’t keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter today’s evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.

Tags : user protection, security, cloud, endpoint, application, network, networking, it management
By: CDW-Trend Micro     Published Date: Mar 26, 2015

The targeted attacks and advanced threats that are increasingly used to breach enterprise networks are purpose-built to evade traditional defenses. Enterprises require an advanced approach to protection that identifies these attacks and enables organizations to prevent breaches and their costly consequences. Read this white paper to learn how the Trend Micro Custom Defense can prevent the collateral damage associated with targeted attacks and advanced threats.

Tags : custom defense, security threats, enterprise networks, intellectual property, networking, security, it management
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro

Tags : security threats, trend micro, security solutions, mobile devices, network, networking, security, it management
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro

Tags : networking, security, it management
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro

Tags : trend micro, targeted attacks, security solutions, technology, networking, security, it management
By: CDW-Trend Micro     Published Date: Mar 26, 2015

Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro

Tags : mobile security, apps, cyber criminals, cyber security, trend micro, mobile devices, networking, security
By: CDW-Trend Micro     Published Date: Mar 26, 2015

A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro

Tags : security solution, cyber attack, mobile devices, business security, user protection, networking, security, it management
By: Rackspace     Published Date: Mar 25, 2015

Got cloud? If you’re an SMB, you’ve already been there, done that. But are you really extracting maximum value out of your cloud hosted solutions?

Tags : rackspace, smb cloud, small business networks, cloud strategy, blade servers, storage virtualization, it spending, total cost of ownership
By: Netapp EMEA     Published Date: Mar 24, 2015

This document describes the architecture of the NetApp Private Storage for Microsoft Azure solution and provides procedures for deploying and testing the solution.

Tags : netapp private storage, microsoft azure, infrastructure, cloud computing, solution architecture, azure expressroute, hybrid, equinix cloud exchange
By: Arbor Networks     Published Date: Mar 23, 2015

After a discussion of the costs of DDoS attacks and current mitigation solutions, this paper examines Arbor Cloud, a DDoS service from Arbor Networks. This Technology Spotlight also provides advice for organizations evaluating DDoS mitigation solutions.

Tags : arbor networks, arbor, ddos, denial of service, denial of service attacks, network security, network overload, internet security
By: Kyocera EMEA     Published Date: Mar 18, 2015

The college of North West London has introduced a new print solution to provide high quality printing facilities for staff and students at the lowers possible cost.

Tags : reduce print costs, north west london, kyocera, kyocera solutions, maximise print facilities, printer fleet, quality of service, servers
By: Kyocera EMEA     Published Date: Mar 18, 2015

This paper provides information on how an optimised print fleet and managed document services can address some of the specific challenges facing the legal industry.

Tags : mds, managed document solutions, management documents, document services, legal industry, documentation workflows, legal challenges, document management
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End

Related IT Whitepaper Topics

Active Directory
175 Documents
Bandwidth Management
270 Documents
Cloud Computing
1118 Documents
Colocation and Web Hosting
257 Documents
Content Management
331 Documents
266 Documents
Data Center
1159 Documents
Data Center Design and Management
695 Documents
Data Management
1948 Documents
Distributed Computing
199 Documents
Enterprise Applications
1889 Documents
Ethernet Networking
192 Documents
Fibre Channel
152 Documents
Gigabit Networking
162 Documents
207 Documents
Green Computing
297 Documents
Grid Computing
174 Documents
968 Documents
Internetworking Hardware
247 Documents
222 Documents
IP Networks
338 Documents
IP Telephony
313 Documents
IT Management
2471 Documents
Knowledge Management
981 Documents
Load Balancing
180 Documents
Local Area Networking
233 Documents
268 Documents
323 Documents
Network Architecture
529 Documents
Network Management
763 Documents
Network Performance
502 Documents
Network Performance Management
463 Documents
Network Provisioning
225 Documents
Network Security
565 Documents
143 Documents
Optical Networking
153 Documents
Power and Cooling
267 Documents
Quality Of Service
199 Documents
Remote Access
306 Documents
Remote Network Management
258 Documents
Server Hardware
273 Documents
517 Documents
Small Business Networks
293 Documents
TCP/IP Protocol
178 Documents
Test And Measurement
198 Documents
Traffic Management
194 Documents
149 Documents
Utility Computing
163 Documents
220 Documents
Wide Area Networks
240 Documents
482 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.