Networking White Papers

Results 301 - 325 of 2731Sort Results By: Published Date | Title | Company Name
By: iNetU Managed Hosting     Published Date: Mar 06, 2014

Putting together an effective post-breach response plan can greatly reduce the costs and damage to the business inflicted by a breach. The following guide can help organizations get started.

Tags : managed hosting, cloud hosting, inetu, inet manahed hosting, data centers, blades, racks, rack
    
By: Webroot Inc     Published Date: Mar 05, 2014

Learn the top 5 malware trends for 2014 and how your organization can best protect against hackers and cyber thieves.

Tags : malware, security, cyber thieves, malware trends, security systems, webroot, networking, wireless
    
By: Webroot Inc     Published Date: Mar 05, 2014

In this white paper we will summarize the decline of Phishing 1.0, discuss how phishing has turned toward business and become more costly, outline the structure of new Phishing 2.0 attacks, delineate how the new campaigns evade standard antiphishing countermeasures, and describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.

Tags : phishing, campaigns, antiphishing, security, social media, malware, block, network
    
By: Webroot Inc     Published Date: Mar 05, 2014

In this paper we look at 3 new approaches that can make antivirus effective and practical again, including client/cloud architecture, behavior recognition, and journaling and rollback Together, these three approaches represent a major rethinking of antivirus technology, a major shift in antivirus that creates a new type of technology that is able to detect and counter today’s Malware.

Tags : antivirus, journaling. rollback, behavior recognition, client/cloud, client/cloud architecture, antivirus technology, malware, networking
    
By: Code 42     Published Date: Mar 04, 2014

Valuable enterprise data lives on endpoint devices, changes constantly and flows freely throughout organizations. But what happens when that data is inappropriately shared or breached because a business user adopts an unsafe consumer-based sync and share tool?

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: nettime solutions     Published Date: Mar 04, 2014

This whitepaper covers the best practices, methods and standards for time off accruals that are affecting PTO policies and will explain how a customizable, automated time and attendance platform can provide workforce analytics and labor management solutions.

Tags : nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform
    
By: Oracle     Published Date: Mar 04, 2014

In This Paper • Internal technology services that lack resources, rigor or efficiencies are prime candidates for the cloud • Understand the business and regulatory requirements around the data to be moved to the cloud • Know your cloud provider’s security and privacy commitments, and what responsibilities you retain

Tags : oracle, oracle cloud services, security, cloud provider, privacy, cloud computing
    
By: FireEye     Published Date: Feb 28, 2014

Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.

Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
By: Smarsh     Published Date: Feb 27, 2014

Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.

Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
    
By: IBM     Published Date: Feb 27, 2014

Why should we bother automating deployments in the first place? What should the scope of the automation effort be? How do we get started? This white paper provides a solid introduction to these topics.

Tags : ibm, ibm software, deployment automation, manual deployments, automation, change management, automated solution, automated investments
    
By: Limelight Networks     Published Date: Feb 20, 2014

Just 400 milliseconds - the blink of an eye - is too long for users to wait for a webpage to load. Discover the website performance bottlenecks that push visitors to your competition, and mitigation strategies that will drive marketing success.

Tags : limelight, webpage speed, acceleration, load time, marketing, internet marketing, website performance, application performance
    
By: Limelight Networks     Published Date: Feb 20, 2014

IT organizations need a new, better way to achieve superior website performance that will enhance, instead of undermine, customer engagement. This eGuide offers 7 principles for scaling your web infrastructure to meet availability and performance SLAs.

Tags : limelight, website availability, site speed, user experience, acceleration, web performance, capex, web infrastructure
    
By: Limelight Networks     Published Date: Feb 20, 2014

A slow website will impact the success of your marketing programs. This eGuide offers tips for marketing pros to bridge the gap between marketing strategy and IT reality to improve web performance and user experience.

Tags : limelight, website speed, website performance, user experience, lag time, conversions, content delivery, internet marketing
    
By: Limelight Networks     Published Date: Feb 20, 2014

An evolving Internet architecture, the growth of dynamic content, and billions of connected devices are having a dramatic impact on web performance. This paper offers a new look at how content delivery and front-end acceleration can improve performance.

Tags : limelight, internet architecture, static content, dynamic content, devices, web performance, content delivery, front-end acceleration
    
By: Limelight Networks     Published Date: Feb 20, 2014

Your website’s performance has a direct, measurable impact on your business. To achieve Web performance SLAs, IT organizations need options that offer a good user experience on any device, from any location, without breaking the bank.

Tags : limelight, web performance, scalability, sla, user experience, website speed, availability, mobile device
    
By: Limelight Networks     Published Date: Feb 20, 2014

As websites complexity increases, organizations need to rethink how they measure digital experiences. Learn why current methods fall short and how to develop a more comprehensive measurement model. Plus, get a peek at the future of predictive performance.

Tags : limelight, website performance, predictive performance, digital experience measurement, user experience, content delivery, cdn, content management
    
By: Limelight Networks     Published Date: Feb 20, 2014

Web performance is a multi-layered challenging, encompassing speed, reliability, scalability and mobile reach. By optimizing the end-to-end content delivery infrastructure, you can address those concerns and deliver superior online user experiences that drive business.

Tags : limelight, website performance, speed, content delivery infrastructure, user experience, content management, website availability, load time
    
By: Green Revolution Cooling     Published Date: Feb 20, 2014

This paper examines the advantages of liquid submersion cooling and, in particular, takes a closer look at GreenDEF™, the dielectric mineral oil blend used by Green Revolution Cooling, a global leader in submersion cooling technologies. Further, the paper will address concerns of potential adopters of submersion systems and explain why these systems can actually improve performance in servers and protect expensive data center investments.

Tags : green revolution, green revolution cooling, energy, power and cooling, servers, data center cooling, oem, power cooling
    
By: Dyn     Published Date: Feb 19, 2014

If your ads are slow to load, chances are, consumers aren’t going to wait around to see them. Just the smallest amount of latency can cost you thousands of views, clicks, and conversions. By following these 5 guidelines, you can reduce your overall network latency and keep those clicks coming.

Tags : dys, advertising, network, latency, advertising network latency, online advertising, delivery, display
    
By: Dyn     Published Date: Feb 19, 2014

DDoS, cache poisoning, footprinting, oh my! Who knew that there were so many ways to threaten the security of your DNS? Find out all of the scary details about these attacks and what you can do to prevent them.

Tags : dyn, dns, domain name system, dns security, security, ddos attacks, distributed denial of service, dns threats
    
By: ForeScout     Published Date: Feb 18, 2014

Commissioned by ForeScout and conducted by The Tolly Group, one of the world’s leading independent product testing labs, the competitive analysis covers 34 criteria points across key functional categories: deployment, interoperability, guest management, endpoint compliance, enforcement, remediation and scalability. Before spending considerable time and resources to perform your POC, download this in-depth, 24-page report.

Tags : forescout, counteract, network access control, nac, deployment, interoperability, guest management, endpoint compliance
    
By: ForeScout     Published Date: Feb 18, 2014

Find out how companies with hundreds to thousands of devices and distributed networks are managing security risks, enabling BYOD adoption, and supporting IT-GRC framework specifications. Download the Frost & Sullivan: Continuous Compliance and Next Generation NAC report. Click to download the report.

Tags : forescout, frost & sullivan, network access control, nac, deployment, interoperability, guest management, endpoint compliance
    
By: ForeScout     Published Date: Feb 18, 2014

Read the new Enterprise Strategy Report (ESG) analyst report. ESG projects that as NAC transforms into EVAS (Endpoint Visibility, Access & Security) it will become even more of a mainstream IT technology.

Tags : forescout, network access control, nac, enterprise strategy report, esg, endpoint visibility, access, security
    
By: BuyerZone     Published Date: Feb 18, 2014

This Phone Systems Buyer's Guide will help you understand the type of decisions you need to make, how to choose a business phone system, and how to find a phone system dealer.

Tags : buyerzone, phone system, phones, business phones, web conferences, headsets, communications, business communications
    
By: Xero     Published Date: Feb 18, 2014

Discover the benefits of alternative financing and how it can help grow your business. Find out how you can work directly with these innovative companies to gain access to working capital for your small business. Led by a panel of Xero Add-on Partners, BodeTree and Kabbage, and advised by Xero Partner David Tunstall, CPA, of The Tunstall Organization, you’ll walk away with a better understanding of your access to funding and tips for streamlining the application process.

Tags : xero, accounting, business financing, small business financing, small business networks, return on investment, total cost of ownership, spend management
    
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
242 Documents
Cloud Computing
826 Documents
Colocation and Web Hosting
225 Documents
Content Management
301 Documents
Convergence
255 Documents
Data Center
991 Documents
Data Center Design and Management
548 Documents
Data Management
1505 Documents
Distributed Computing
172 Documents
Enterprise Applications
1439 Documents
Ethernet Networking
180 Documents
Fibre Channel
143 Documents
Gigabit Networking
152 Documents
Governance
202 Documents
Green Computing
280 Documents
Grid Computing
167 Documents
Infrastructure
826 Documents
Internetworking Hardware
211 Documents
Interoperability
206 Documents
IP Networks
335 Documents
IP Telephony
312 Documents
IT Management
1656 Documents
Knowledge Management
647 Documents
Load Balancing
169 Documents
Local Area Networking
224 Documents
Migration
224 Documents
Monitoring
302 Documents
Network Architecture
420 Documents
Network Management
645 Documents
Network Performance
380 Documents
Network Performance Management
379 Documents
Network Provisioning
211 Documents
Network Security
503 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
241 Documents
Quality Of Service
171 Documents
Remote Access
280 Documents
Remote Network Management
237 Documents
Server Hardware
261 Documents
Servers
472 Documents
Small Business Networks
271 Documents
TCP/IP Protocol
175 Documents
Test And Measurement
184 Documents
Traffic Management
185 Documents
Tunneling
141 Documents
Utility Computing
154 Documents
VPN
216 Documents
Wide Area Networks
224 Documents
Wireless
361 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.