Networking White Papers

Results 326 - 350 of 2970Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Aug 15, 2014

Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, aet, ngfw
    
By: McAfee     Published Date: Aug 15, 2014

As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, aet, ngfw
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: McAfee     Published Date: Aug 14, 2014

Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.

Tags : network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
By: McAfee     Published Date: Aug 14, 2014

When done right, a next generation firewall with plug-and-play capabilities can typically be up and running within a few minutes. Find out how you can quickly deploy hundreds of firewalls remotely with the latest NGFW.

Tags : plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
By: McAfee     Published Date: Aug 14, 2014

What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.

Tags : next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.

Tags : sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

See how this next generation firewall performed in real-life. ESG Lab puts the McAfee NGFW through the paces in this recent report.

Tags : esg, esg lab, firewall evaluation, firewall lab report, firewall test, next generation firewall, mcafee ngfw, security
    
By: Box     Published Date: Aug 13, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: ClickSoftware     Published Date: Aug 13, 2014

This report looks into how context aware services are changing the way consumers interact with businesses.

Tags : context aware services, mobile experience, smartphone trends, tracking mobile activity, mobile computing, mobile data systems, mobile workers, workforce management
    
By: ClickSoftware     Published Date: Aug 13, 2014

This business paper discusses the benefits of deploying an industry-specific, mobile workforce management solution along with a comparison to generic solutions

Tags : mobile resource management, choosing the best path, mobile workforce management, mobile computing, mobile data systems, mobile workers, employee performance, productivity
    
By: ClickSoftware     Published Date: Aug 13, 2014

This paper highlights the how field service performance and timely issue resolution impacts customer experience and details how Best-in-Class organizations are creating an environment centered on delivering exceptional customer service.

Tags : optimize field service, the imapct of customer service, cloud, mobile computing, mobile data systems, mobile workers, customer relationship management, customer satisfaction
    
By: ClickSoftware     Published Date: Aug 13, 2014

This paper focuses on how mobile apps from ClickSoftware can help engage and connect your field techs.

Tags : engaging field techs, mobile workforce management, mobile app engagement, timesaving tools, mobile computing, mobile data systems, mobile workers, employee performance
    
By: NEC     Published Date: Aug 12, 2014

As virtualization technology evolves and improves, the server performance and power requirements for supporting a virtualized data center increase. Your aging servers are struggling to meet increasing virtual workload demands. These older, lower-performing servers further tax your data center by consuming valuable space and power. You want to update, upgrade, and consolidate to a powerful new server solution that will provide an excellent virtualization platform. In this white paper, you’ll learn how the NEC Express5800/A2040b enterprise server, powered by the Intel® Xeon® processor E7-4890 v2, offers just that.

Tags : consolidation, lab validation, report, servers, virtualization, analytics, application owners, system integrators
    
By: NEC     Published Date: Aug 12, 2014

We consolidated nine legacy servers into one NEC Express5800/A2040b enterprise server, and proved real benefits of doing so. In this infographic, you’ll learn how the NEC Express5800/A2040b enterprise server, powered by the Intel® Xeon® processor E7-4890 v2, offers just that.

Tags : consolidation, lab validation, report, servers, virtualization, analytics, application owners, system integrators
    
By: NEC     Published Date: Aug 12, 2014

Without a doubt, performance is the database professional’s number one concern when it comes to virtualizing Microsoft SQL Server. While virtualizing SQL Server is nothing new, even today there are some people who still think that SQL Server is too resource-intensive to virtualize. That’s definitely not the case. However, there are several tips and best practices that you need to follow to achieve optimum performance and availability for your virtual SQL Server instances. In this whitepaper, you’ll learn about the best practices, techniques, and server platform for virtualizing SQL Server to obtain the maximum virtualized database performance. In this white paper, you’ll learn about the best practices, techniques, and server platform for virtualizing SQL Server to obtain the maximum virtualized database performance.

Tags : sql, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators
    
By: HP     Published Date: Aug 12, 2014

HP's Peter Mansell, reveals why HP decided to build CloudSystem around open standards and APIs, and Freeform Dynamics' Dale Vile, who explains how you can avoid building yourself into a silo.

Tags : cloudsystem, avoid building yourself into a silo, cloud migration, cloud administration, backup and recovery, network attached storage, storage management, application integration
    
By: HP     Published Date: Aug 08, 2014

Looking beyond storage, HP Converged Infrastructure solutions enable your business to unleash the potential of your data center and reduce risk. Overcome IT sprawl with simplified management and implementation, enhanced performance, improved availability, and the economies of open standards and connectivity. For the business, this means faster time to revenue, increased agility, lesser risk, and lower cost of operation. HP delivers better value of convergence than other vendors do.

Tags : backup, recovery solutions, lower costs, speed recovery, infrastructure, risk, simplified management, performance
    
By: HP     Published Date: Aug 08, 2014

The deduplication is one of the fastest growing segments in storage. Accordingly, every vendor is telling their version of the deduplication story. With emerging technologies, it is difficult for IT managers to determine what the true IT benefits vs. marketing spin are. This brief document discusses several key areas of deduplication and uncovers six NetApp “challenges” customers should understand when evaluating HP StoreOnce Backup Systems and NetApp as their deduplication solution of choice.

Tags : data, storeonce, deduplication, storage, it benefits, backup systems, challenges, challenges
    
By: OnX     Published Date: Aug 07, 2014

Learn about SDN and the 5 key steps to identify the right adoption strategy.

Tags : software defined networking, sdn, network architecture, network management, network performance, network performance management, network provisioning, networking
    
By: Coho Data     Published Date: Aug 04, 2014

In this webinar an expert panel will examine the pros and cons of SDN powered scale-out storage architecture.

Tags : coho data, sdn, storage architecture, storage, storage applications, storage power, network architecture, backup and recovery
    
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End

Related IT Whitepaper Topics

Active Directory
168 Documents
Bandwidth Management
248 Documents
Cloud Computing
954 Documents
Colocation and Web Hosting
240 Documents
Content Management
308 Documents
Convergence
260 Documents
Data Center
1052 Documents
Data Center Design and Management
600 Documents
Data Management
1651 Documents
Distributed Computing
180 Documents
Enterprise Applications
1581 Documents
Ethernet Networking
184 Documents
Fibre Channel
147 Documents
Gigabit Networking
157 Documents
Governance
203 Documents
Green Computing
287 Documents
Grid Computing
171 Documents
Infrastructure
859 Documents
Internetworking Hardware
221 Documents
Interoperability
210 Documents
IP Networks
332 Documents
IP Telephony
308 Documents
IT Management
1881 Documents
Knowledge Management
734 Documents
Load Balancing
175 Documents
Local Area Networking
228 Documents
Migration
231 Documents
Monitoring
305 Documents
Network Architecture
447 Documents
Network Management
662 Documents
Network Performance
409 Documents
Network Performance Management
398 Documents
Network Provisioning
217 Documents
Network Security
506 Documents
OLAP
138 Documents
Optical Networking
147 Documents
Power and Cooling
250 Documents
Quality Of Service
177 Documents
Remote Access
288 Documents
Remote Network Management
241 Documents
Server Hardware
267 Documents
Servers
495 Documents
Small Business Networks
277 Documents
TCP/IP Protocol
177 Documents
Test And Measurement
190 Documents
Traffic Management
190 Documents
Tunneling
146 Documents
Utility Computing
160 Documents
VPN
214 Documents
Wide Area Networks
234 Documents
Wireless
390 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.