Networking White Papers

Results 326 - 350 of 2974Sort Results By: Published Date | Title | Company Name
By: BMC Software     Published Date: Aug 18, 2014

IT as a Service (ITaaS) will transform future IT operations and service delivery. In the interim, Hybrid IT offers a rational, gradual approach in which some services move to SaaS while others remain on-premise. This white paper provides a strategy to move part or all of your ITSM suite to the cloud as a stepping stone to ITaaS.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: Aug 18, 2014

Increasingly, enterprise organizations are moving to the cloud for IT Service Management (ITSM)—but is cloud delivery right for your business? Learn about the changing face of ITSM and gain the perspective needed to make the right ITSM decision for your organization. Get the free white paper from Enterprise Management Associates.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: Aug 18, 2014

IT is embracing this new world of consumerized technology with a focus on its own employees as internal customers. Explore how customer-first policies can make use of social, mobile and cloud technologies to give workers the freedom and flexibility they desire to drive company productivity.

Tags : customer, cloud technology, internal, productivity, networking, it management, customer relationship management, customer satisfaction
    
By: Cisco     Published Date: Aug 18, 2014

Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.

Tags : email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
By: Cisco     Published Date: Aug 18, 2014

Dive into the key factors that enable Cisco Unified Computing System, powered by the Intel Xeon® processor, to change the way IT organizations work. Download the brief to learn how Cisco UCS can help IT become an integrated, strategic part of your organization.

Tags : servers, data, innovative, data center, architecture, performance, processors, blade
    
By: Cisco     Published Date: Aug 18, 2014

Cisco continues to improve the industry's most innovative and leading data center architecture, and now makes it easy to save when you trade up to the record-setting performance of Cisco UCS M3 Blade Servers with the latest Intel® Xeon® processors. UCS Advantage* is a limited time program that allows customers with qualified Cisco UCS M1/M2 and HP servers and blade chassis to refresh legacy equipment and get credit toward new Cisco UCS M3 Blade Servers and infrastructure.

Tags : servers, data, innovative, data center, architecture, performance, processors, blade
    
By: Cisco     Published Date: Aug 18, 2014

IT can be one of the biggest concerns for businesses today. Security, compliance, enablement, cost control and scalability must all be considered. Additionally, with insurgent trends such as mobility changing the face of business, choosing a partner who is able to consultatively deliver multiple services and solutions is increasingly important. We have now strengthened the scope of our Unified Computing System by expanding our data centre management capabilities. Fill in your details to the right to download your free white paper and learn how we have become the key supplier of converged technology and services in this space.

Tags : ucs, scope, cisco, security, compliance, servers, data, innovative
    
By: Cisco     Published Date: Aug 18, 2014

The Cisco Unified Computing System (Cisco UCS), powered by the Intel® Xeon® processor, is easier to deploy and more cost-effective than the competition. Results show that with Cisco UCS, you can: Deploy and manage with less hardware Eliminate the need for additional software licensing Reduce your capital expenditure by as much as 22.1%

Tags : comparison, flex system, cost-effective, servers, data, innovative, data center, architecture
    
By: Cisco     Published Date: Aug 18, 2014

Start planning your deployment of the Cisco Unified Computing System (Cisco UCS), powered by the Intel® Xeon® processor, with this useful, step-by-step design guide. The Cisco UCS Technology Design Guide simplifies the steps to a successful deployment. Four modules guide you through a Cisco engineer-tested framework that addresses typical data center and server issues.

Tags : design guide, deployment, computing, servers, data, innovative, data center, architecture
    
By: Plex Systems     Published Date: Aug 15, 2014

There’s a disconnect in the way most software companies, even cloud-based SaaS companies, license their systems. And it is all about the concept of "seats" or use licenses. Learn how the Plex Manufacturing Cloud licensing model paves the way for your success with unlimited seats.

Tags : cloud, software, cloud manufacturing, saas, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

The right ERP systems contains ease-of-use and value for manufacturers by providing consistent design and security features, reduced burden of manual data entry and simpfiled communications with other systems, partners and devices.

Tags : erp systems, security, manufacturing, communications. data entry, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

The Plex Manufacturing Cloud is providing a revolutionary approach to ERP upgrades by using a continuous update process that is unique to cloud-only software. Remove the need to do manually ERP uprgrades that are disruptive to an orgranization and can cost millions of dollars.

Tags : erp, cloud software, manufacturing, revolutionary approach, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

There are a number of benefits beyond total cost of ownership to deploy cloud ERP, including increased flexibility, deployment, busines continuity and usability. Plex was in the Cloud before Cloud was cool - helping manufacturers run their business from the shop floor to the top floor.

Tags : erp, cloud, cloud erp, manufacturers, flexibility, total cost, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

If your current ERP isn't doing the job for you now, its not likely going to do so in the future. If you are a manufacturer that is not running your operations on a modern , technology-enabled, fully functional ERP solution, you are probably feeling the pain of inefficiencies and you are not optimizing your business.

Tags : erp systems, security, manufacturing, communications. data entry, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

There has been no shortage of high profile recalls over the past several years. Suppliers are being required to provide more robust quality management systems, provide better real-time visablity into manufacturing data, and may even be held accountable for additional charge-back and warranty claims. Take a next generation approach to quality management.

Tags : networking
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, network security, application security, web service security
    
By: McAfee     Published Date: Aug 15, 2014

À medida que a tecnologia de firewall de próxima geração (NGFW, next-generation firewall) se populariza, é necessário analisar as funções e os recursos avançados que separam os “líderes” dos “atrasados”. Nos termos mais básicos, o consenso sobre a definição do NGFW incluiria as seguintes capacidades: recursos de firewall padrão como conversão de endereços de rede e inspeção com monitoramento de estado, prevenção de intrusões integrada, reconhecimento de aplicativos e algum nível de inteligência e integração com bancos de dados de vulnerabilidades e reputações.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, aet, ngfw
    
By: McAfee     Published Date: Aug 15, 2014

As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, aet, ngfw
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: McAfee     Published Date: Aug 14, 2014

Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.

Tags : network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
By: McAfee     Published Date: Aug 14, 2014

When done right, a next generation firewall with plug-and-play capabilities can typically be up and running within a few minutes. Find out how you can quickly deploy hundreds of firewalls remotely with the latest NGFW.

Tags : plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End

Related IT Whitepaper Topics

Active Directory
169 Documents
Bandwidth Management
249 Documents
Cloud Computing
956 Documents
Colocation and Web Hosting
242 Documents
Content Management
311 Documents
Convergence
261 Documents
Data Center
1072 Documents
Data Center Design and Management
604 Documents
Data Management
1686 Documents
Distributed Computing
180 Documents
Enterprise Applications
1622 Documents
Ethernet Networking
185 Documents
Fibre Channel
148 Documents
Gigabit Networking
158 Documents
Governance
204 Documents
Green Computing
289 Documents
Grid Computing
172 Documents
Infrastructure
860 Documents
Internetworking Hardware
223 Documents
Interoperability
211 Documents
IP Networks
334 Documents
IP Telephony
310 Documents
IT Management
1936 Documents
Knowledge Management
762 Documents
Load Balancing
176 Documents
Local Area Networking
229 Documents
Migration
232 Documents
Monitoring
306 Documents
Network Architecture
451 Documents
Network Management
664 Documents
Network Performance
410 Documents
Network Performance Management
399 Documents
Network Provisioning
218 Documents
Network Security
507 Documents
OLAP
140 Documents
Optical Networking
148 Documents
Power and Cooling
252 Documents
Quality Of Service
178 Documents
Remote Access
289 Documents
Remote Network Management
242 Documents
Server Hardware
268 Documents
Servers
498 Documents
Small Business Networks
277 Documents
TCP/IP Protocol
178 Documents
Test And Measurement
191 Documents
Traffic Management
191 Documents
Tunneling
147 Documents
Utility Computing
161 Documents
VPN
215 Documents
Wide Area Networks
235 Documents
Wireless
395 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.